Close Menu
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
What's Hot

Genesis Wallet Dormant Since 2015 Transfers 790 ETH Worth $1.78 Million

May 14, 2026

Google warns hackers are using AI to build zero-day exploit for planned mass cyberattack

May 13, 2026

Metaplanet delays preferred share listing amid challenging Japanese market structure

May 13, 2026
Facebook X (Twitter) Instagram
Recession Profit AlertsRecession Profit Alerts
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
Recession Profit AlertsRecession Profit Alerts
Home»Security»Google warns hackers are using AI to build zero-day exploit for planned mass cyberattack
Security

Google warns hackers are using AI to build zero-day exploit for planned mass cyberattack

May 13, 2026No Comments2 Mins Read

Cyber criminals and state-backed hackers are increasingly using generative AI to accelerate exploit development, automate malware operations and scale cyber campaigns, Google’s threat intelligence division (GTIG) said in a report published on Monday.

The findings show a shift from limited AI experimentation to large-scale operational deployment, with adversaries using AI to power attacks even as AI infrastructure and software ecosystems become targets themselves.

For the first time, GTIG has identified a real-world zero-day exploit developed with AI assistance.

According to the report, criminal actors built a 2FA bypass targeting a popular open-source web administration tool ahead of a planned mass exploitation operation. The campaign was disrupted before deployment after GTIG collaborated with the vendor on responsible disclosure.

Researchers noted that China- and North Korea-linked threat actors have shown sustained interest in AI-supported vulnerability research, including the use of persona-based prompting, automated exploit analysis and agentic frameworks designed to scale reconnaissance and testing activities.

PROMPTSPY and AI-driven malware

On the malware front, the report highlighted PROMPTSPY, an Android backdoor that embeds an autonomous agent feeding the device’s user interface state to Google’s Gemini API, receiving structured commands in return, and executing them (clicking, swiping, navigating) without human oversight.

It can capture biometric data, replay authentication gestures, and even prevent its own uninstallation by rendering an invisible overlay over the “Uninstall” button that silently swallows touch events.

Researchers also documented AI-assisted obfuscation techniques in malware linked to Russia-aligned operations, including dynamically generated code and AI-produced decoy logic intended to bypass detection systems.

Google warned that attackers are building professionalized infrastructure to obtain anonymized, large-scale access to premium AI models through proxy relays, automated account creation and trial-abuse schemes.

See also  Hong Kong victims lose a combined $4.7 million to crypto scams

At the same time, adversaries are targeting the AI software supply chain itself, including open-source AI tooling and model integration layers, to gain initial access to enterprise systems and steal credentials for ransomware and extortion operations.

The company said it is deploying AI defensively through tools such as Big Sleep and CodeMender to identify and patch vulnerabilities, while expanding safeguards across Gemini and related services.

Source link

build CyberAttack Exploit Google hackers Mass Planned Warns ZeroDay

Related Posts

FBI Director says AI now powers crime-fighting as crypto scams grow

May 13, 2026

Physical “wrench attacks” have led to over $100 million in losses since January alone

May 13, 2026

“Attention Altcoin Users! Hackers Have Found a New Method!”

May 13, 2026

Ink Finance Treasury on Polygon Drained in $140K Exploit, Blockaid Reports

May 13, 2026
Top Posts

Chainalysis Details ‘Shadow Crypto Economy’ Exposure as Grinex Suspends Operations

April 18, 2026

Lululemon Founder Blasts Board Again Amid Stock Collapse

February 28, 2026

Google Cloud Pushes Deeper Into Blockchain Data, Adding 11 Networks Including Polygon

September 23, 2023

Type above and press Enter to search. Press Esc to cancel.