Using AI for Covert Command-and-Control Channels
Check Point Research identified a potential future attack technique in which AI assistants with web-browsing capabilities could be abused as covert command-and-control (C2) channels. As AI services become widely adopted and implicitly trusted, their network traffic increasingly blends into normal enterprise activity, expanding the attack surface. AI-enabled C2 could allow attacker communications to evade traditional detection by hiding inside legitimate-looking AI interactions. The same building blocks point toward a broader shift to AI-driven malware, where AI systems influence targeting, prioritization, and operational decisions rather than serving only as development tools. Check Point Research has identified a potential new abuse pattern: […]
The post Using AI for Covert Command-and-Control Channels appeared first on Check Point Blog.
目录
最新
- Introducing CPR Act: A Unified Approach for a Full‑Lifecycle Security
- Powering Cyber Resilience Across APAC: Celebrating Check Point’s APAC FY25 Partner Award Winners
- The Whitelist Illusion – When Your Trusted List Becomes a Billion Dollar Attack Path
- Silver Dragon: China Nexus Cyber Espionage Group Targeting Governments in Asia and Europe
- How Threat Intelligence and Multi-Source Data Drive Smarter Vulnerability Prioritization
- What Defenders Need to Know about Iran’s Cyber Capabilities
- National Cyber Resilience in the AI Era
- Check Point Researchers Expose Critical Claude Code Flaws