{"id":14682,"date":"2026-05-12T00:55:43","date_gmt":"2026-05-12T00:55:43","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=14682"},"modified":"2026-05-12T00:55:43","modified_gmt":"2026-05-12T00:55:43","slug":"google-says-hackers-used-ai-to-develop-a-zero-day-exploit","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=14682","title":{"rendered":"Google Says Hackers Used AI to Develop a Zero-Day Exploit"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p class=\"is-style-cnvs-paragraph-callout\">Google researchers have found the primary proof of hackers utilizing AI to develop zero-day exploits, autonomous Android backdoors, and automatic provide chain assaults in opposition to GitHub and PyPI.<\/p>\n<p>Hackers have lengthy used AI fashions to create phishing pages and determine safety vulnerabilities. However in line with a brand new report launched at this time by Google Menace Intelligence Group (GTIG), attackers at the moment are additionally utilizing synthetic intelligence to develop <a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/unc5820-exploits-fortimanager-zero-day-vulnerability\/\" data-type=\"post\" data-id=\"121862\">zero-day exploits<\/a>.<\/p>\n<h3 id=\"identifying-ai-clues-in-malware\" class=\"wp-block-heading\"><strong>Figuring out AI Clues in Malware<\/strong><\/h3>\n<p>GTIG researchers recognized an assault situation the place attackers dodged <a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/tycoon-2fa-phishing-platform-shut-down-bypass-mfa\/\">2FA<\/a> utilizing a Python script on a web-based administration software, and had been shocked to search out that this was a zero-day exploit. Whereas it was suspected that <a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/discord-access-anthropic-claude-mythos-ai-breach\/\">Claude Mythos<\/a> was used, the staff says that is unlikely.<\/p>\n<p>\u201cFor the primary time, GTIG has recognized a risk actor utilizing a zero-day exploit that we imagine was developed with AI.\u201d<\/p>\n<p>Additional investigation revealed that the code had clear indicators of being made by a machine. People usually write code with particular habits, however these scripts had \u201can abundance of academic docstrings\u201d and even a pretend, \u201challucinated however non-existent CVSS rating.\u201d<\/p>\n<p>Researchers famous within the <a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" rel=\"noopener\" href=\"https:\/\/cloud.google.com\/blog\/topics\/threat-intelligence\/ai-vulnerability-exploitation-initial-access\">weblog submit<\/a> that teams from the Folks\u2019s Republic of China (<a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/chinese-state-hackers-brickstorm-vmware-systems\/\">PRC<\/a>) and the Democratic Folks\u2019s Republic of Korea (<a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/us-men-sentenced-north-korean-hackers-hack-us-firms\/\">DPRK<\/a>) are main these exams. Teams like <a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/pakistan-apt36-indian-govt-networks-ai-vibeware\/\">APT45<\/a> and UNC2814 use AI to scan for flaws utilizing instruments like \u2018wooyun-legacy,\u2019 a group of 85,000 outdated safety circumstances, to coach AI fashions to assume like professional auditors.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/05\/Google-Reveals-First-Case-of-AI-Created-Zero-Day-Exploit-and-Autonomous-Malware-Attacks.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"257\" src=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/05\/Google-Reveals-First-Case-of-AI-Created-Zero-Day-Exploit-and-Autonomous-Malware-Attacks.png\" alt=\"\" class=\"wp-image-145157\" srcset=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/05\/Google-Reveals-First-Case-of-AI-Created-Zero-Day-Exploit-and-Autonomous-Malware-Attacks.png 1000w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/05\/Google-Reveals-First-Case-of-AI-Created-Zero-Day-Exploit-and-Autonomous-Malware-Attacks-300x77.png 300w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/05\/Google-Reveals-First-Case-of-AI-Created-Zero-Day-Exploit-and-Autonomous-Malware-Attacks-768x197.png 768w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/05\/Google-Reveals-First-Case-of-AI-Created-Zero-Day-Exploit-and-Autonomous-Malware-Attacks-380x98.png 380w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/05\/Google-Reveals-First-Case-of-AI-Created-Zero-Day-Exploit-and-Autonomous-Malware-Attacks-800x206.png 800w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\"\/><\/a><figcaption class=\"wp-element-caption\">Assault Chain (Supply: Google)<\/figcaption><\/figure>\n<\/div>\n<h3 id=\"autonomous-agents\" class=\"wp-block-heading\"><strong>Autonomous Brokers<\/strong><\/h3>\n<p>Hackers are additionally utilizing LLMs for goal scouting to enhance phishing lures. They immediate fashions to map out firm hierarchies or determine particular {hardware} utilized by a goal. This \u2018environmental fingerprinting\u2019 helps them customise their assaults. <\/p>\n<p>Researchers additionally discovered rising choice for \u2018agentic workflows\u2019 the place instruments like Hexstrike and Strix are used to execute multi-stage duties. For instance, a PRC-nexus actor used these instruments alongside the Graphiti reminiscence system to assault a Japanese expertise agency.<\/p>\n<h3 id=\"supply-chain-threats-and-deepfakes\" class=\"wp-block-heading\"><strong>Provide Chain Threats and Deepfakes<\/strong><\/h3>\n<p>In early February 2026, the PROMPTSPY <a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/45k-attacks-53k-backdoor-china-cybercrime-operation\/\">Android backdoor<\/a> appeared. It makes use of a \u2018GeminiAutomationAgent\u2019 to observe cellphone screens and click on buttons. By late March 2026, a bunch referred to as <a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/teampcp-bitwarden-cli-dependabot-shai-hulud-malware\/\">TeamPCP<\/a> (aka UNC6780) attacked the software program provide chain by injecting malicious code into instruments like <a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/ai-firm-mercor-breach-hackers-4tb-data\/\">LiteLLM<\/a> and <a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/archipelo-and-checkmarx-announce-partnership-connecting-appsec-detection-with-devspm\/\">Checkmarx.<\/a> Utilizing the SANDCLOCK credential stealer, they stole AWS keys and GitHub tokens for extortion.<\/p>\n<p>Researchers, lastly, famous that AI is being utilized in data operations. A professional-Russia marketing campaign referred to as Operation Overload used AI voice cloning to impersonate journalists in pretend movies. Whereas these techniques are evolving, Google is utilizing instruments like Massive Sleep and CodeMender to search out and repair these flaws routinely.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/05\/google-reveals-first-case-of-ai-created-zero-day-exploit-and-autonomous-malware-attacks-1.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"601\" src=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/05\/google-reveals-first-case-of-ai-created-zero-day-exploit-and-autonomous-malware-attacks-1-1024x601.png\" alt=\"Google Reveals First Case of AI-Created Zero-Day Exploit and Autonomous Malware Attacks\" class=\"wp-image-145161\" style=\"width:644px;height:auto\" srcset=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/05\/google-reveals-first-case-of-ai-created-zero-day-exploit-and-autonomous-malware-attacks-1-1024x601.png 1024w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/05\/google-reveals-first-case-of-ai-created-zero-day-exploit-and-autonomous-malware-attacks-1-300x176.png 300w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/05\/google-reveals-first-case-of-ai-created-zero-day-exploit-and-autonomous-malware-attacks-1-768x451.png 768w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/05\/google-reveals-first-case-of-ai-created-zero-day-exploit-and-autonomous-malware-attacks-1-380x223.png 380w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/05\/google-reveals-first-case-of-ai-created-zero-day-exploit-and-autonomous-malware-attacks-1-800x469.png 800w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/05\/google-reveals-first-case-of-ai-created-zero-day-exploit-and-autonomous-malware-attacks-1.png 1045w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\"\/><\/a><figcaption class=\"wp-element-caption\"> (Supply: Google)<\/figcaption><\/figure>\n<\/div>\n<p>\n\t\t\t<\/div>\n<p><template id="LEwJpLfUFAq9Xj0YFJaq"></template><\/script><br \/>\n<br \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Google researchers have found the primary proof of hackers utilizing AI to develop zero-day exploits, autonomous Android backdoors, and automatic provide chain assaults in opposition to GitHub and PyPI. Hackers have lengthy used AI fashions to create phishing pages and determine safety vulnerabilities. However in line with a brand new report launched at this time [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":14684,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[1202,776,81,554,4218],"class_list":["post-14682","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-develop","tag-exploit","tag-google","tag-hackers","tag-zeroday"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/14682","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14682"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/14682\/revisions"}],"predecessor-version":[{"id":14683,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/14682\/revisions\/14683"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/14684"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14682"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=14682"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=14682"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-12 03:09:18 UTC -->