Google says it likely thwarted effort by hacker group to use AI for 'mass exploitation event'

robot
Abstract generation in progress

In this article

  • GOOGL

Follow your favorite stocksCREATE FREE ACCOUNT

Boonchai Wedmakawand | Moment | Getty Images

Google’s Threat Intelligence Group said in a report on Monday that it thwarted an effort by hackers to use artificial intelligence models to “plan a mass vulnerability exploitation operation.”

The group, known by the acronym GTIG, said it has “high confidence” that it recorded hackers using an AI model to find and exploit a zero-day vulnerability, or software flaw unknown to developers, creating a way to bypass two-factor authentication.

“The criminal threat actor planned to use it in a mass exploitation event but our proactive counter discovery may have prevented its use,” Google wrote in the post, without disclosing the name of the hacker group. Google said it does not believe that its homegrown Gemini model was used.

The findings underscore how hackers are using available AI tools like OpenClaw to exploit software flaws in ways that can be particularly damaging to companies, government agencies and other organizations even as cybersecurity firms pump billions of dollars into bolstering their defenses.

In April, Anthropic delayed the rollout of its Mythos model, citing worries that criminals and adversaries could use the tool to identify and prey on decades-old software vulnerabilities. The concerns sent shockwaves through the industry and led to White House meetings with technology and business leaders. Anthropic has since released the model to a select group of testers, including Apple, CrowdStrike, Microsoft and Palo Alto Networks.

Last week, OpenAI announced that GPT-5.5-Cyber, a variation of its latest model, is rolling out in a limited preview capacity to vetted cybersecurity teams.

In Monday’s report, Google highlighted several examples of how hackers are already using tools such as OpenClaw to find vulnerabilities, launch cyberattacks and develop malware. Groups linked to China and North Korea “demonstrated significant interest in capitalizing on AI for vulnerability discovery,” the report said.

WATCH: Era of AI-enabled cyberattack orchestration arrives

watch now

VIDEO1:2201:22

Era of AI-enabled cyberattack orchestration arrives

Power Lunch

Choose CNBC as your preferred source on Google and never miss a moment from the most trusted name in business news.

This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
Add a comment
Add a comment
No comments
  • Pin