Attackers Abuse AI Assistants As C2 Proxies
Check Point Research on Feb. 19, 2026 disclosed a novel attack technique that repurposes AI assistants xAI's Grok and Microsoft Copilot as covert command-and-control relays. The method tunnels malicious traffic through web-browsing and allowed outbound connections on trusted platforms, enabling stealthy malware communication. Enterprises that permit these services by default may need to update egress policies and detection controls.
Scoring Rationale
High operational impact and credible Check Point research, tempered by limited public technical detail in this summary.
Practice interview problems based on real data
1,500+ SQL & Python problems across 15 industry datasets — the exact type of data you work with.
Try 250 free problems

