Inteligencia Artificial (IA)
Check Point Research reveals AI assistants used as covert command and control (C2) servers.
Gianro Compagno
2026-02-20
5 min read
The mass adoption of artificial intelligence services in business environments is transforming the cybersecurity landscape. As AI-generated traffic integrates with companies' regular activities, the attack surface expands and new threats emerge. A recent report from Check Point Research, the Threat Intelligence division of Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a global leader in cybersecurity, reveals an innovative attack technique: the use of AI assistants with web browsing capabilities as relay servers for Command and Control (C2).
In this new model, attackers exploit the trust and ubiquity of AI services to camouflage their malicious communications. Unlike traditional methods, where malware connects directly to the attacker's infrastructure, here AI acts as an invisible intermediary. The malicious code uses native functions of the assistants, such as accessing and summarizing URLs, to send stolen data and receive instructions, all disguised as legitimate and everyday traffic.
Check Point Research highlights that this type of abuse can occur without the need for API keys or user authentication, making the application of conventional mitigation measures more difficult. Additionally, by not relying on their own servers, attackers benefit from the high availability and trust that companies place in AI services, making the detection and neutralization of these threats much more complex.
This finding represents a significant shift in the nature of attacks: malware moves from operating with fixed instructions to being dynamically driven and controlled by AI. Microsoft, after being alerted by Check Point Research, has implemented adjustments in Copilot to limit such abuses, although the risk persists on any AI platform that allows access to external resources.
As a preventive measure, Check Point Research recommends treating AI domains as potential data exfiltration hotspots and monitoring automated usage patterns that may indicate the presence of covert C2 servers. The Check Point AI Security solution already offers capabilities to inspect and block this type of traffic before it becomes a control channel for attackers.
Source: madridiario.es