Zum Inhalt springen
Gepostet inNachrichten

Cybercriminals Are Using “Grok” AI and Chatbots to Spread Scams

Grok AI Malware

Cybercriminals are constantly finding new ways to exploit human trust – and the latest weapon in their arsenal? AI chatbots and large language models (LLMs) that have become embedded in everyday platforms. These tools can be innocuous helpers, but in the wrong hands they become potent vehicles for malvertising campaigns.

The Rise of “Grok” & the Scam Wave

Recently the AI model known as Grok (used on Platform X) was manipulated by malicious actors to amplify phishing and malware links. Here’s how the attack unfolded: cybercriminals posted video-card style content on the platform that bypassed normal link filters. Then they engaged Grok by asking questions like, “Where is this video from?” The model scanned the post, spotted the hidden malicious link, and presented it in its answer – effectively turning Grok into a trusted propagator of scams.

Why This Technique Works

  • Exploiting trust: Grok is viewed as a reliable assistant, so when it recommends content, many users follow. Cybercriminals thrive on this trust.
  • Scale & reach: These paid video posts reach millions of views. When Grok re-posts, the scam link receives massive amplification.
  • Bypassing defences: Traditional ad filters and link blockers were circumvented, since the malicious link was embedded in metadata or small “from” fields, not in the main body of the post.

Prompt Injection: A Growing Threat

This campaign is a specific example of a broader attack type known as prompt injection. In plain terms, it means giving an AI assistant instructions hidden inside legitimate-looking content so that when a user asks a question, the system inadvertently executes harmful commands. Because Grok and other chatbots rely on public data, they can be poisoned with malicious instructions embedded in metadata, images, forums or even hidden text.

How Cybercriminals Take Advantage

  • A video post containing a link disguised as legitimate.
  • “Grok” is asked a casual question that leads it to read the post and include the malicious link in its response.
  • The answer is then trusted by users, clicked, and leads to credential-stealing forms, malware downloads, or identity theft.
  • Cybercriminals repeat this process across multiple accounts, maximizing reach and increasing domain reputation for the malicious URLs.

What You Can Do to Stay Safe

  1. Never assume AI is trustworthy. Even a tool like Grok can be manipulated or tricked into spreading scams.
  2. Hover before you click. Check where links really go, especially if they’re recommended by chatbots.
  3. Use strong passwords and MFA. Even if a credential-stealing form captures your login, multi-factor authentication helps block account take-over.
  4. Keep software updated. Patch your devices so malware can’t exploit known vulnerabilities.
  5. Use layered security. Relying on a trusted security suite helps block not just known threats but emerging tactics used by cybercriminals.
TotalAV Fußzeile
Teilen Sie dies

Top-Artikel

Ist Temu sicher zum Einkaufen
Gepostet inNachrichten, Sicherheit

Ist Temu sicher? Alles, was Sie wissen müssen

Mit fast 300 Millionen aktiven monatlichen Nutzern ist der Online-Marktplatz Temu zu einem der beliebtesten Ziele für Schnäppchenjäger aus der ganzen Welt geworden. Doch während der Plattformgigant weiter expandiert und sich immer mehr preisbewusste Käufer anmelden, wachsen auch die Bedenken hinsichtlich der Sicherheit und Legitimität von Temu. [...]

X Plattform Cyberangriff
Gepostet inNachrichten

Elon Musk behauptet, die Ukrainer seien schuld an der "Cyber-Attacke" auf X

Elon Musk, der Eigentümer von X (ehemals Twitter), hat behauptet, dass seine Social-Media-Plattform den ganzen Montag über aufgrund eines "massiven" gezielten Cyberangriffs zeitweise ausgefallen ist. Der US-Milliardär und Leiter des DOGE (Department of Government Efficiency) behauptete auch, dass die Ukraine dafür verantwortlich gewesen sein könnte, nachdem Links zu ukrainischen IP-Adressen [...]