AI platforms can be abused for stealthy malware communication
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内,并且不需要特定的开头。首先,我得仔细阅读文章,理解其主要观点。 文章讲的是网络安全公司Check Point的研究人员发现,像Grok和微软Copilot这样的AI助手可以被滥用作为命令与控制(C2)活动的中介。攻击者利用这些AI服务在C2服务器和目标机器之间传递通信,从而发送指令和窃取数据。 研究人员还创建了一个概念验证,展示了如何通过WebView2组件与AI服务交互,并指出即使目标系统缺少该组件,攻击者也可以将其嵌入到恶意软件中。此外,他们提到AI作为代理的优势在于匿名性和难以追踪,因为不需要API密钥或账户。 总结时,我需要抓住关键点:AI助手被滥用作为C2中介、攻击者利用WebView2组件、匿名性和难以追踪的特点。同时要确保语言简洁明了,控制在100字以内。 最后,检查一下是否符合用户的要求,没有使用“文章内容总结”之类的开头,并且准确传达了文章的核心信息。 </think> 研究人员发现AI助手如Grok和Copilot可被滥用作为命令与控制(C2)活动的中介。攻击者利用这些AI服务在C2服务器和目标机器之间传递通信,从而发送指令和窃取数据。研究人员通过WebView2组件展示了如何实现这一机制,并指出即使目标系统缺少该组件,攻击者也可以将其嵌入到恶意软件中。此外,他们提到AI作为代理的优势在于匿名性和难以追踪。 2026-2-18 20:30:19 Author: www.bleepingcomputer.com(查看原文) 阅读量:1 收藏

AI platforms can be abused for stealthy malware communication

AI assistants like Grok and Microsoft Copilot with web browsing and URL-fetching capabilities can be abused to intermediate command-and-control (C2) activity.

Researchers at cybersecurity company Check Point discovered that threat actors can use AI services to relay communication between the C2 server and the target machine.

Attackers can exploit this mechanism to deliver commands and retrieve stolen data from victim systems.

Wiz

The researchers created a proof-of-concept to show how it all works and disclosed their findings to Microsoft and xAI.

AI as a stealthy relay

Instead of malware connecting directly to a C2 server hosted on the attacker's infrastructure, Check Point’s idea was to have it communicate with an AI web interface, instructing the agent to fetch an attacker-controlled URL and receive the response in the AI’s output.

In Check Point's scenario, the malware interacts with the AI service using the WebView2 component in Windows 11. The researchers say that even if the component is missing on the target system, the threat actor can deliver it embedded in the malware.

WebView2 is used by developers to show web content in the interface of native desktop applications, thus eliminating the need of a full-featured browser.

The researchers created "a C++ program that opens a WebView pointing to either Grok or Copilot." This way, the attacker can submit to the assistant instructions that can include commands to be executed or extract information from the compromised machine.

Interaction flow
Malware to AI agent interaction flow
Source: Check Point

The webpage responds with embedded instructions that the attacker can change at will, which the AI extracts or summarizes in response to the malware’s query.

The malware parses the AI assistant's response in the chat and extracts the instructions.

Grok and Copilot summarize the C2's encrypted data response
Grok and Copilot summarize the C2's encrypted data response
Source: Check Point

This creates a bidirectional communication channel via the AI service, which is trusted by internet security tools and can thus help carry out data exchanges without being flagged or blocked.

Check Point’s PoC, tested on Grok and Microsoft Copilot, does not require an account or API keys for the AI services, making traceability and primary infrastructure blocks less of a problem.

“The usual downside for attackers [abusing legitimate services for C2] is how easily these channels can be shut down: block the account, revoke the API key, suspend the tenant,” explains Check Point.

“Directly interacting with an AI agent through a web page changes this. There is no API key to revoke, and if anonymous usage is allowed, there may not even be an account to block.”

The researchers explain that safeguards exist to block obviously malicious exchanges on the said AI platforms, but these safety checks can be easily bypassed by encrypting the data into high-entropy blobs.

CheckPoint argues that AI as a C2 proxy is just one of multiple options for abusing AI services, which could include operational reasoning such as assessing if the target system is worth exploiting and how to proceed without raising alarms.

BleepingComputer has contacted Microsoft to ask whether Copilot is still exploitable in the way demonstrated by Check Point and the safeguards that could prevent such attacks. A reply was not immediately available, but we will update the article when we receive one.

tines

The future of IT infrastructure is here

Modern IT infrastructure moves faster than manual workflows can handle.

In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.


文章来源: https://www.bleepingcomputer.com/news/security/ai-platforms-can-be-abused-for-stealthy-malware-communication/
如有侵权请联系:admin#unsafe.sh