{"id":6429,"date":"2026-01-05T17:24:05","date_gmt":"2026-01-05T17:24:05","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=6429"},"modified":"2026-01-05T17:24:05","modified_gmt":"2026-01-05T17:24:05","slug":"several-countries-investigate-elon-musks-grok-after-sexualized-deepfakes-on-women-and-children","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=6429","title":{"rendered":"Several countries investigate Elon Musk\u2019s Grok after sexualized deepfakes on women and children"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>France and Malaysia have launched investigations against Elon Musk\u2019s AI chatbot Grok, after it generated sexualized <a href=\"https:\/\/www.csoonline.com\/video\/508864\/what-is-a-deepfake-how-to-prepare-for-and-respond-to-this-cyber-attack.html\">deepfakes<\/a> of women and minors, <a href=\"https:\/\/techcrunch.com\/2026\/01\/04\/french-and-malaysian-authorities-are-investigating-grok-for-generating-sexualized-deepfakes\/\" target=\"_blank\" rel=\"noopener\">Techcrunch<\/a> reports.<\/p>\n<p>India has also demanded that X restrict Grok\u2019s ability to generate \u201cobscene, pornographic or pedophilic\u201d images within 72 hours, or risk losing its legal protection against user-generated content.<\/p>\n<p>Grok, developed by Musk\u2019s company xAI and hosted on the X (formerly Twitter) platform, has published a <a href=\"https:\/\/x.com\/grok\/status\/2006525486021705785\" target=\"_blank\" rel=\"noopener\">message<\/a> in which it \u201capologizes\u201d for creating and sharing an AI image of two girls aged 12-16 in sexual poses.<\/p>\n<p>However, critics say that a system like Grok cannot be held truly accountable, making the apology meaningless. Elon Musk writes on <a href=\"https:\/\/x.com\/elonmusk\/status\/2007475612949102943\" target=\"_blank\" rel=\"noopener\">X<\/a> that users who produce illegal content through Grok will be treated as if they uploaded it themselves.<\/p>\n<p>More on deepfakes:<\/p>\n<p><a href=\"https:\/\/www.csoonline.com\/article\/565933\/deepfake-videos-how-and-why-they-work.html\">How and why deepfake videos work \u2014 and what is at risk<\/a><\/p>\n<p><a href=\"https:\/\/www.csoonline.com\/article\/3633099\/the-deepfake-threat-just-got-a-little-more-personal.html\">The deepfake threat just got a little more personal<\/a><\/p>\n<p><a href=\"https:\/\/www.csoonline.com\/article\/3529639\/deepfakes-break-through-as-business-threat.html\">Deepfakes break through as business threat<br \/><\/a><a href=\"https:\/\/www.csoonline.com\/article\/3633099\/the-deepfake-threat-just-got-a-little-more-personal.html\"><br \/><\/a><a href=\"https:\/\/www.csoonline.com\/article\/565933\/deepfake-videos-how-and-why-they-work.html\"><br \/><\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>France and Malaysia have launched investigations against Elon Musk\u2019s AI chatbot Grok, after it generated sexualized deepfakes of women and minors, Techcrunch reports. India has also demanded that X restrict Grok\u2019s ability to generate \u201cobscene, pornographic or pedophilic\u201d images within 72 hours, or risk losing its legal protection against user-generated content. Grok, developed by Musk\u2019s [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":6430,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-6429","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/6429"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6429"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/6429\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/6430"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6429"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=6429"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=6429"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}