Malicious Ads on X Exploiting Grok AI to Spread Malware & Scams
A concerning new tactic is being exploited on X (formerly Twitter) where malicious actors are leveraging the platform’s AI chatbot, Grok, to amplify the reach of harmful advertisements.This technique, dubbed “Grokking” by security researcher Nati Tal, bypasses X’s existing security measures adn exposes users to scams, malware, and perhaps devastating information theft. Here’s a detailed breakdown of how it works and what you need to know.
How the “Grokking” technique Works
This sophisticated scheme relies on a loophole in how X handles ad metadata and utilizes Grok’s trusted status. Here’s a step-by-step look:
- Sketchy Video Ads Appear: Advertisers are deploying video ads with potentially adult content designed to attract clicks.
- Hidden malicious Links: Crucially, these ads avoid including a direct link to the advertised site within the visible ad content. Rather, they conceal the malicious URL within the less-scrutinized “From:” metadata field under the video.
- Grok is Prompted: Attackers then reply to the ad,posing a seemingly innocent question like “Where is this video from?” or “What is the link to this video?”
- Grok Reveals the Link: Grok,parsing the hidden “From:” field,dutifully replies with the full,clickable malicious link.
- Credibility Boost: Because Grok is a verified system account on X, its response lends a false sense of legitimacy to the link, substantially increasing the likelihood users will click it.
- Malicious Payloads: These links lead to a variety of threats,including fake CAPTCHA tests,malware downloads designed to steal your information,and other harmful websites.
Essentially,X isn’t blocking these malicious links; it’s promoting them through its own AI assistant.
Why This is So Effective
Several factors contribute to the success of this attack:
Bypassing Security: the “From:” field appears to be largely unmonitored by X’s security systems.
Grok’s Trust: Users inherently trust responses from a verified system account like Grok.
Amplified Reach: Grok’s post boosts the link’s visibility,SEO ranking,and overall reach,potentially exposing millions of users.
Shady Ad Networks: Many of these links funnel through obscure ad networks, making tracking and attribution difficult.
What You Can Do to Protect Yourself
While X is ultimately responsible for fixing this issue, you can take steps to minimize your risk:
Be Skeptical of Ads: Exercise extreme caution when clicking on links in X ads, especially those that seem too good to be true or are suggestive in nature.
Hover Before Clicking: before clicking any link, hover your mouse over it (on desktop) to preview the URL. If it looks suspicious or doesn’t match the advertised content, do not click.
Report Suspicious Ads: Report any ads you suspect are malicious to X.
Keep Software Updated: Ensure your operating system, browser, and antivirus software are up to date with the latest security patches.
Use a Reputable Ad blocker: Consider using a browser extension that blocks malicious ads.
What X Needs to Do
Security researcher Nati Tal has identified several potential solutions:
Scan All Fields: X needs to scan all metadata fields associated with ads, not just the visible content.
Block Hidden Links: Implement measures to block links hidden in unconventional fields like the “From:” metadata.
Grok Context Sanitization: Modify Grok to filter and verify links before responding to user queries. the AI should not blindly echo links but should instead check them against known blocklists.
Tal has reportedly contacted X about this issue and received confirmation that their engineering team is aware of the problem. though, as of publication, BleepingComputer reports that X has not provided a public response or timeline for a fix.
This “Grokking” technique represents a serious security vulnerability on X. It highlights the challenges of combating malicious





![Men’s College Basketball Power Rankings: Top 25 Updated – Kentucky, [Date] Men’s College Basketball Power Rankings: Top 25 Updated – Kentucky, [Date]](https://a3.espncdn.com/combiner/i?img=%2Fphoto%2F2025%2F1224%2Fr1593223_1296x729_16%2D9.jpg)



