Google identifies first AI-developed zero-day exploit and thwarts planned mass exploitation event



TL;DR

Google identified the first zero-day exploit it believes was developed with AI and thwarted a planned mass exploitation event. The GTIG report documents state-sponsored actors from China, North Korea, and Russia using AI for vulnerability research, autonomous malware using Google’s Gemini API, and supply chain attacks targeting the AI software ecosystem.

 

Google has identified the first zero-day exploit it believes was developed with artificial intelligence. The criminal threat actor that built it planned to use it in a mass exploitation event. Google’s Threat Intelligence Group discovered the vulnerability before it was deployed, worked with the affected vendor to patch it, and disrupted the operation. The exploit, a Python script that bypasses two-factor authentication on a popular open-source system administration tool, contained hallucinated CVSS scores, educational docstrings, and the structured textbook formatting characteristic of large language model output. Google has high confidence that an AI model was used to find and weaponise the flaw.

The disclosure comes in a report published on Monday by the Google Threat Intelligence Group that documents a maturing transition from experimental AI-enabled hacking to what GTIG calls the “industrial-scale application of generative models within adversarial workflows.” State-sponsored actors from China and North Korea are using AI for vulnerability research. Russia-nexus threat actors are deploying AI-generated decoy code against Ukrainian targets. An Android malware called PROMPTSPY uses Google’s own Gemini API to autonomously navigate victim devices, capture biometric data, and block its own uninstallation. The AI cybersecurity arms race that experts warned about is no longer theoretical. It is in Google’s incident response logs.

The zero-day

The exploit targeted a semantic logic flaw, not a memory corruption bug or an input sanitisation error, but a high-level design mistake where the developer hardcoded a trust assumption into the two-factor authentication logic. Traditional vulnerability scanners and fuzzers are optimised to detect crashes and data-flow sinks. They miss this category of flaw. Large language models do not. Frontier models can perform contextual reasoning, reading the developer’s intent and correlating the authentication enforcement logic with hardcoded exceptions that contradict it. The model surfaced a dormant logic error that appeared functionally correct to every traditional scanner but was strategically broken from a security perspective.

GTIG worked with the impacted vendor to responsibly disclose the vulnerability. It does not believe Gemini was used. The criminal group behind the exploit has, according to Google, “a strong record of high-profile incidents and mass exploitation.” The planned mass exploitation event was prevented by proactive counter-discovery. The implication is that AI has crossed a threshold. It can now find vulnerabilities that humans and traditional tools miss, and it is being used by criminal actors to do so at scale.

The autonomous malware

PROMPTSPY is an Android backdoor first identified by ESET in February 2026. Initial reporting focused on its use of the Gemini API to maintain persistence by navigating the Android user interface to pin the malicious application in the recent apps list. Google’s analysis revealed capabilities that go significantly further.

The malware contains an autonomous agent module called GeminiAutomationAgent. It serialises the device’s visible user interface hierarchy into an XML-like format via the Accessibility API and sends it to the gemini-2.5-flash-lite model. The model returns structured JSON responses containing action types and spatial coordinates, which PROMPTSPY parses to simulate physical gestures: clicks, swipes, and navigation. The AI interprets the device’s state and generates commands in real time without human supervision.

PROMPTSPY can capture victim biometric data to replay authentication gestures and regain access to compromised devices. If a victim tries to uninstall it, the malware identifies the on-screen coordinates of the uninstall button and renders an invisible overlay that intercepts touch events, making the button appear unresponsive. Its command and control infrastructure, including Gemini API keys and VNC relay servers, can be updated dynamically at runtime, meaning that blocking specific endpoints does not disable the backdoor. Google has disabled the assets associated with this activity and confirmed that no apps containing PROMPTSPY are found on Google Play.

The state actors

Chinese and North Korean state-sponsored threat actors are using AI for vulnerability research with increasing sophistication. GTIG observed UNC2814, a Chinese-linked group, directing Gemini to act as a “senior security auditor” and “C/C++ binary security expert” to support vulnerability research into TP-Link firmware and file transfer protocol implementations. North Korea’s APT45 sent thousands of repetitive prompts that recursively analysed different CVEs and validated proof-of-concept exploits, building an arsenal of exploit capabilities that would be impractical to manage without AI assistance.

Chinese threat actors experimented with a specialised vulnerability repository called wooyun-legacy, a Claude code skill plugin containing a distilled knowledge base of more than 85,000 real-world vulnerability cases collected by the Chinese bug bounty platform WooYun between 2010 and 2016. By priming an AI model with this vulnerability data, the actors enabled in-context learning that steered the model to approach code analysis like an experienced researcher and identify logic flaws the base model would otherwise miss.

Russia-nexus actors targeting Ukrainian organisations are deploying malware families called CANFAIL and LONGSTREAM, both of which use AI-generated decoy code to obfuscate their malicious functionality. CANFAIL’s source code contains developer comments that explicitly identify unused blocks as filler content designed to disguise malicious activity. LONGSTREAM contains 32 instances of code querying the system’s daylight saving status, a repetitive benign-looking operation that exists solely to camouflage the downloader’s real purpose. APT27, a Chinese-linked group, used Gemini to accelerate development of an operational relay box network management tool with multi-hop proxy configurations designed to obfuscate intrusion origins.

The supply chain

A cyber crime group called TeamPCP claimed responsibility for multiple supply chain compromises of popular GitHub repositories and associated GitHub Actions in late March 2026, including Trivy, Checkmarx, LiteLLM, and BerriAI. The attackers gained initial access through compromised PyPI packages and malicious pull requests, then embedded credential-stealing malware to extract AWS keys and GitHub tokens from affected build environments. The stolen credentials were monetised through partnerships with ransomware and data theft extortion groups.

The compromise of LiteLLM, an AI gateway utility used to integrate multiple large language model providers, is particularly significant. Because the package is widely deployed, the breach could expose AI API secrets across the software supply chain. GTIG notes that attackers who gain access to an organisation’s AI systems through compromised dependencies could leverage internal models to identify, collect, and exfiltrate sensitive information at scale, or perform reconnaissance to move deeper within the network. The AI software ecosystem has become both a tool for attackers and a target.

Google announced its agent infrastructure at Cloud Next 2026, positioning Gemini as the reasoning backbone for autonomous AI workflows across enterprise. The same company is now documenting how adversaries are using agentic workflows to orchestrate attacks. The GTIG report describes threat actors deploying tools called Hexstrike and Strix against a Japanese technology firm and an East Asian cybersecurity platform, with Hexstrike using a temporal knowledge graph to maintain persistent state of the attack surface and autonomously pivot between reconnaissance tools. The agents that Google is selling to enterprises are being mirrored by agents that adversaries are deploying against them.

The defence

Google’s response includes Big Sleep, an AI agent developed by Google DeepMind and Google Project Zero that searches for unknown security vulnerabilities in software. Big Sleep found the vulnerability that the criminal group planned to exploit before the attack was launched. Google also introduced CodeMender, an AI-powered agent that uses Gemini’s reasoning capabilities to automatically fix critical code vulnerabilities. The defensive AI found the flaw. The offensive AI created the exploit. Google’s proactive discovery arrived first.

Google has repositioned Chrome as an enterprise security platform with real-time data loss prevention and AI governance controls, reporting a 50 per cent reduction in unauthorised AI data transfers. The investment in defensive infrastructure reflects the scale of the threat GTIG is documenting: 308 petabytes of industry telemetry in 2025 across more than four million identities, endpoints, and cloud assets, producing nearly 30 million investigative leads. No human team can process that volume. The defensive AI is not optional. It is the only way to match the speed of the offensive AI.

The policy gap

The Trump administration blocked the expansion of Anthropic’s Mythos, the most powerful vulnerability-discovery AI ever built, even as the GTIG report documents criminal and state-sponsored actors using AI to find and exploit the same types of flaws that Mythos was designed to detect. The policy contradiction is that the US government is simultaneously restricting access to defensive AI and facing an adversary landscape in which offensive AI is being deployed at industrial scale.

UK banks received their Mythos briefing within days of the European access crisis, illustrating the scramble among governments and financial institutions to gain access to AI security tools that can match the capabilities GTIG describes. Euro-area finance ministers convened to discuss the fact that no EU government had access to the most advanced vulnerability-discovery AI while the adversaries documented in the GTIG report, state-sponsored actors from China, North Korea, and Russia, were already using AI to find zero-days, generate autonomous malware, and attack the AI software supply chain.

The GTIG report is 33 pages of evidence that the AI cybersecurity arms race has moved from hypothesis to operational reality. Criminal actors are using AI to discover zero-day vulnerabilities and plan mass exploitation events. State-sponsored groups are building AI-augmented exploit arsenals. Autonomous malware is using commercial AI APIs to navigate victim devices without human supervision. The supply chain that connects AI models to enterprise systems is under active attack. Google’s defensive AI found the zero-day before the attackers could deploy it. The question the report does not answer is how many zero-days have been found by actors whose work Google has not yet detected.



Source link

Leave a Reply

Subscribe to Our Newsletter

Get our latest articles delivered straight to your inbox. No spam, we promise.

Recent Reviews


The first time I encountered mesh Wi-Fi was when I went to university. One Wi-Fi password, but no matter where you roamed on campus you’ll stay connected. I’ve always thought of mesh networks as enterprise technology that you need an IT department to handle, but then router makers figured out how to make mesh easy enough for mere mortals.

Now I consider a mesh network the default for everyone, and if you’re still using a single non-mesh router you might want to know why. So let me explain.



















Quiz
8 Questions · Test Your Knowledge

Home Networking & Wi-Fi

Think you know your routers from your repeaters — put your home networking know-how to the ultimate test.

Wi-FiRoutersSecurityHardwareProtocols

What does the ‘5 GHz’ band in Wi-Fi offer compared to the ‘2.4 GHz’ band?

That’s right! The 5 GHz band delivers faster data rates but loses signal strength more quickly over distance and through walls. It’s ideal for devices close to the router that need maximum throughput, like streaming 4K video.

Not quite — the 5 GHz band actually offers faster speeds at the cost of range. The 2.4 GHz band travels farther and penetrates obstacles better, which is why smart home devices and older gadgets often prefer it.

Which Wi-Fi standard, introduced in 2021, is also known as Wi-Fi 6E and extends into a new frequency band?

Correct! 802.11ax is the technical name for Wi-Fi 6 and Wi-Fi 6E. The ‘E’ variant extends the standard into the 6 GHz band, offering a massive swath of new, less-congested spectrum for faster and more reliable connections.

The answer is 802.11ax — that’s Wi-Fi 6 and Wi-Fi 6E. Wi-Fi 6E adds support for the 6 GHz band, giving it far less congestion than the crowded 2.4 GHz and 5 GHz bands. 802.11be is actually the upcoming Wi-Fi 7 standard.

What is the default IP address most commonly used to access a home router’s admin interface?

Spot on! The vast majority of consumer routers use either 192.168.0.1 or 192.168.1.1 as the default gateway address. Typing either into your browser’s address bar will bring up the router’s login page — just make sure you’ve changed the default password!

The correct answer is 192.168.0.1 or 192.168.1.1. These are the most common default gateway addresses for home routers. The 255.x.x.x addresses are subnet masks, and 127.0.0.1 is your own machine’s loopback address, not a router.

Which Wi-Fi security protocol is considered most secure for home networks as of 2024?

Excellent! WPA3 is the latest and most robust Wi-Fi security protocol, introduced in 2018. It uses Simultaneous Authentication of Equals (SAE) to replace the older Pre-Shared Key handshake, making it far more resistant to brute-force attacks.

The answer is WPA3. WEP is completely broken and should never be used, WPA is outdated, and WPA2 with TKIP has known vulnerabilities. WPA3 offers the strongest protection, and if your router supports it, you should enable it right away.

What is the primary difference between a mesh Wi-Fi system and a traditional Wi-Fi range extender?

Exactly right! Mesh systems use multiple nodes that talk to each other intelligently, handing off your device seamlessly as you move around your home under one SSID. Traditional range extenders typically broadcast a separate network and can cut bandwidth in half as they relay the signal.

The correct answer is that mesh nodes form one intelligent, seamless network. Range extenders are actually the ones that often create separate SSIDs (like ‘MyNetwork_EXT’) and can significantly reduce speeds. Mesh systems are far superior for large homes with many devices.

What does DHCP stand for, and what is its main function on a home network?

Perfect! DHCP (Dynamic Host Configuration Protocol) is the unsung hero of home networking. Every time a device joins your network, your router’s DHCP server automatically hands it a unique IP address, subnet mask, and gateway info so it can communicate without manual configuration.

DHCP stands for Dynamic Host Configuration Protocol, and its job is to automatically assign IP addresses to devices on your network. Without it, you’d have to manually configure a unique IP address on every single phone, laptop, and smart device — a tedious nightmare!

What is ‘QoS’ (Quality of Service) used for in a home router?

That’s correct! QoS lets you tell your router which traffic gets priority. For example, you can prioritize video calls or gaming over a family member’s file download, ensuring your Zoom meeting doesn’t freeze just because someone is downloading a large update.

QoS — Quality of Service — is actually about traffic prioritization. By tagging certain data types (like VoIP calls or gaming packets) as high priority, your router ensures latency-sensitive applications get bandwidth first, even when the network is congested.

What does the ‘WAN’ port on a home router connect to?

Correct! WAN stands for Wide Area Network, and the WAN port is where your router connects to the outside world — typically to your cable modem, DSL modem, or ISP gateway. The LAN ports on the other side connect to devices inside your home network.

The WAN (Wide Area Network) port connects your router to your ISP’s modem or gateway — essentially your entry point to the internet. The LAN (Local Area Network) ports are for connecting devices inside your home. Mixing them up can cause your network to not function at all!

Challenge Complete

Your Score

/ 8

Thanks for playing!

Mesh Wi-Fi solves a problem most homes already have

The internet is no longer confined to one spot in your home

In the early days of home internet, there was no real reason to have Wi-Fi coverage all over your home. You installed the router in your home office, or near the living room, and that was enough. People didn’t have smartphones, tablets, or smart home devices that all needed access to the LAN.

As Wi-Fi devices proliferated, that central router became a problem. There’s only so much power you can push into the antennas, and the inverse square law drains that signal of power in very short order.

It was a problem that had many suboptimal solutions. Wi-Fi repeaters destroy performance, access points need long Ethernet runs, and Powerline Ethernet only works well in ideal conditions. Most older homes can’t provide that with their aging wiring. In short, trying to expand a central router’s reach has usually involved some janky mishmash of solutions.

A modern mesh router kit just solved that problem without any fuss. The biggest problem you’ll have is how to position them. Everything else is usually just handled automatically.

Brand

eero

Range

1,500 sq. ft.

Mesh Network Compatible

Yes

The eero 6 mesh Wi-Fi router allows you to upgrade your home network without breaking the bank. Compatible with the wider eero ecosystem, you’ll find that this node can either start or expand your wireless network with ease.


Mesh systems prioritize consistency over peak speed

Good enough internet everywhere

Top view of the contents of the Netgear Nighthawk MK93S mesh system. Credit: Jordan Gloor / How-To Geek

I think it’s important to point out that with Wi-Fi it’s much more important to get consistent and reliable performance wherever you are in your home than to hit crazy peak speeds. Sure, if you buy an expensive router, you can blast data when you’ve got line of sight and are a few feet away, but then you might as well just connect to it with an Ethernet cable.

For the price of one very fast centralized router, you can buy an entry-level mesh router kit and have fast enough internet everywhere, and never have to think about it again. I’m still running a Wi-Fi 5 mesh system in my two-storey rental home and I get 200+ Mbps minimum anywhere. If I need more speed than that on a single device, it’s going on Ethernet.

As prices come down on Wi-Fi 6 and 7 mesh systems, we’ll all eventually get access to that gigabit or better wireless tier, but I’d rather have a few hundred Mbps everywhere rather than a few Gbps in just one place and zero internet elsewhere.

Setup and management are finally user-friendly

Your dog could do it if it had thumbs

TP-Link Deco Mesh Wi-Fi Puck sitting on a desk beside two stacked books Credit: TP-Link

It’s hard to overstate just how easy modern mesh routers are to set up. After you’ve got the first unit up, usually by using a mobile app, adding more is generally just a matter of turning them on close to any previously activated router and waiting a few seconds.

As for the actual management of the network, on my TP-Link system you can see the topology of your network, how the pods are doing in terms of bandwidth, and you can automatically optimize for network interference and signal strength. The days of cryptic and largely manual router configuration are over. Even port forwarding, which has always tripped me up on old routers, now just works with a few taps on my phone screen.

The price argument doesn’t hold up anymore

There’s something for every budget

The biggest reason I think people have avoided mesh systems is cost. That’s perfectly fair, because mesh systems are more expensive than a single router. The thing is, prices have come down significantly, especially for mesh on older Wi-Fi standards.

But, even if you want newer Wi-Fi like 6E or 7, you don’t have to start your mesh journey with a full kit. You can buy a single mesh router, use that as your primary, and then add more as you can afford it. Even better, if you’ve bought a new router recently, there’s a chance it already supports mesh technology. It doesn’t even have to be that recent, since some older routers have gained mesh capability thanks to firmware updates.

If you already have a router that’s mesh-capable, then extending your home network any other way would be silly. Also, keep in mind that all the routers in your mesh network don’t have to be identical. That’s a common misconception, but the only thing they need to have in common is support for the same mesh technology. Just keep in mind that your performance will only be as good as the slowest device in the chain.


Mesh is for everyone

The bottom line is that mesh network technology is now cheap enough, mature enough, and easy enough that I honestly think everyone should have a good reason not to use it rather than looking for reason to use it. Wi-Fi should be like water or electricity. You want everyone in your home to have easy access to it no matter where they are. Mesh will do that for you.

The Unifi Dream Router 7.

9/10

Brand

Unifi

Range

1,750 square feet

The Unifi Dream Router 7 is a full-fledged network appliance offering NVR capabilities, fully managed switching,a built-in firewall, VLANs, and more. With four 2.5G Ethernet ports (one with PoE+) and a 10G SFP+ port, the Unifi Dream Router 7 also features dual WAN capabilities should you have two ISP connections. It includes a 64GB microSD card for IP camera storage, but can be upgraded for more storage if needed. With Wi-Fi 7, you’ll be able to reach up to a theoretical 5.7 Gbps network speed when using the 10G SFP+ port, or 2.5 Gbps when using Ethernet. 




Source link