Check Point Research shows AI web assistants with browsing can be abused as covert C2 relays (AI as a proxy) via Grok and Copilot, enabling bidirectional data flow and AI-driven malware decision-making without credentials.
![]()
AI in the Middle: Turning Web-Based AI Services into C2 Proxies & The Future Of AI Driven Attacks - Check Point Research
Key Points Introduction AI is rapidly becoming embedded in day-to-day enterprise workflows, inside browsers, collaboration suites, and developer tooling. As a result, AI service domains increasingly blend into normal corporate traffic, often allowed by default and rarely treated as sensitive...research.checkpoint.com