Google: Google says criminals used AI-built zero-day in planned mass hack spree

Google: Google says criminals used AI-built zero-day in planned mass hack spree

Google Thwarts AI-Generated Zero-Day Exploit in Early Cybercrime Campaign

Google’s Threat Intelligence Group (GTIG) has uncovered what it believes to be the first real-world case of cybercriminals using AI to discover and weaponize a zero-day vulnerability. The flaw a two-factor authentication (2FA) bypass in a widely used open-source web administration platform was identified and exploited by attackers as part of a planned mass-exploitation campaign.

According to Google’s report, shared ahead of publication on Monday, the attackers leveraged an AI model to both pinpoint the vulnerability and develop a functional exploit. The company collaborated with the unnamed vendor to patch the issue before the campaign could escalate, potentially disrupting the operation before it gained momentum.

The exploit’s code exhibited telltale signs of AI involvement, including "educational docstrings," a hallucinated CVSS score, and a polished structure resembling LLM-generated output. The flaw stemmed from a hardcoded trust exception in the authentication flow, a type of high-level logic error that modern AI models are increasingly adept at identifying.

Google emphasized that AI-driven vulnerability discovery is no longer a future threat but an active reality. John Hultquist, chief analyst at GTIG, warned that for every AI-linked zero-day detected, many more likely remain undetected. Threat actors both state-backed and criminal are already using AI to accelerate attack development, improve malware, and automate reconnaissance.

The report also highlighted broader AI-driven cyber threats, including North Korea’s APT45 using AI to bulk-test exploits, Chinese state-linked groups experimenting with AI for vulnerability hunting, and malware incorporating AI-generated obfuscation to evade analysis. Additionally, Russian influence operations have integrated AI-generated audio into propaganda efforts.

While the intercepted exploit contained flaws that hindered its effectiveness, Google cautioned that such early-stage missteps may not persist as attackers refine their techniques. The incident underscores the growing role of AI in cybercrime and espionage, marking a shift in the threat landscape.

Source: https://www.theregister.com/ai-ml/2026/05/11/google-says-criminals-used-ai-built-zero-day-in-planned-mass-hack-spree/5237982

Google Research cybersecurity rating report: https://www.rankiteo.com/company/googleresearch

"id": "GOO1778516874",
"linkid": "googleresearch",
"type": "Cyber Attack",
"date": "5/2026",
"severity": "25",
"impact": "1",
"explanation": "Attack without any consequences"
{'affected_entities': [{'industry': 'Technology/Software',
                        'name': 'Unnamed open-source web administration '
                                'platform vendor',
                        'type': 'Software Vendor'}],
 'attack_vector': 'AI-driven vulnerability discovery and exploit development',
 'description': 'Google’s Threat Intelligence Group (GTIG) uncovered a '
                'cybercriminal campaign leveraging AI to discover and '
                'weaponize a zero-day vulnerability—a 2FA bypass in a widely '
                'used open-source web administration platform. The exploit was '
                'intercepted before mass exploitation could occur, with '
                'AI-generated indicators detected in the attack code.',
 'impact': {'systems_affected': 'Open-source web administration platform '
                                '(unnamed)'},
 'investigation_status': 'Completed (exploit intercepted and patched)',
 'lessons_learned': 'AI-driven vulnerability discovery is an active threat, '
                    'and early detection is critical to preventing mass '
                    'exploitation. Attackers are increasingly using AI to '
                    'accelerate attack development and improve malware.',
 'motivation': 'Mass exploitation campaign (potential financial gain or data '
               'theft)',
 'post_incident_analysis': {'corrective_actions': 'Patch issued for the 2FA '
                                                  'bypass vulnerability; '
                                                  'collaboration with Google’s '
                                                  'Threat Intelligence Group',
                            'root_causes': 'AI-driven vulnerability discovery '
                                           'and exploit development; hardcoded '
                                           'trust exception in authentication '
                                           'flow'},
 'recommendations': 'Organizations should enhance monitoring for AI-generated '
                    'exploit indicators, collaborate with vendors for rapid '
                    'patching, and invest in AI-driven threat detection to '
                    'counter emerging risks.',
 'references': [{'source': 'Google’s Threat Intelligence Group (GTIG) Report'}],
 'response': {'containment_measures': 'Collaboration with vendor to patch the '
                                      'vulnerability',
              'remediation_measures': 'Patch issued for the 2FA bypass '
                                      'vulnerability',
              'third_party_assistance': 'Google’s Threat Intelligence Group '
                                        '(GTIG)'},
 'threat_actor': 'Cybercriminals (unspecified group)',
 'title': 'Google Thwarts AI-Generated Zero-Day Exploit in Early Cybercrime '
          'Campaign',
 'type': 'Zero-Day Exploit',
 'vulnerability_exploited': 'Hardcoded trust exception in authentication flow '
                            '(2FA bypass)'}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.