By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Tech Consumer JournalTech Consumer JournalTech Consumer Journal
  • News
  • Phones
  • Tablets
  • Wearable
  • Home Tech
  • Streaming
  • More Articles
Reading: Google Says It Found Evidence of Hackers Using AI to Discover a Zero-Day Vulnerability
Share
Sign In
Notification Show More
Font ResizerAa
Tech Consumer JournalTech Consumer Journal
Font ResizerAa
  • News
  • Phones
  • Tablets
  • Wearable
  • Home Tech
  • Streaming
  • More Articles
Search
  • News
  • Phones
  • Tablets
  • Wearable
  • Home Tech
  • Streaming
  • More Articles
Have an existing account? Sign In
Follow US
  • Contact
  • Blog
  • Complaint
  • Advertise
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Tech Consumer Journal > News > Google Says It Found Evidence of Hackers Using AI to Discover a Zero-Day Vulnerability
News

Google Says It Found Evidence of Hackers Using AI to Discover a Zero-Day Vulnerability

News Room
Last updated: May 12, 2026 3:27 am
News Room
Share
SHARE

As AI models continue to get more powerful, it’s not too surprising that some people are trying to use them for crime.

The Google Threat Intelligence Group said on Monday that it has identified, for the first time, a cybercrime group using a zero-day exploit that the company believes was discovered with the assistance of AI. A zero-day vulnerability refers to a major security flaw in software or hardware that is unknown to its developers, leaving them with “zero days” to patch it before attackers can exploit it.

The threat actor, which Google did not name but described as a “prominent” cybercrime group, was allegedly planning to use the flaw in a mass exploitation campaign. Google believes it prevented the exploit from being used.

According to the GTIG report, Google’s analysis of exploits tied to the campaign found a zero-day vulnerability built into a Python script. The exploit would have allowed hackers to bypass two-factor authentication on an unnamed but popular open-source, web-based system administration tool. Google noted that the hackers still would have needed valid user credentials for the exploit to work.

GTIG said it worked with the impacted vendor to disclose and address the security flaw.

The report goes on to say that Google has “high confidence,” based on the structure and content of the exploits, that the hackers likely used an AI model to help discover and weaponize the flaw.

“For example, the script contains an abundance of educational docstrings, including a hallucinated CVSS score, and uses a structured, textbook Pythonic format highly characteristic of LLMs training data (e.g., detailed help menus and the clean _C ANSI color class),” the report reads.

Google also notes that it does not believe its own Gemini model was used.

The news comes amid growing scrutiny over the cybersecurity threats posed by advanced AI models, especially following the limited release of Anthropic’s Mythos model. Anthropic has made Mythos available only to a select group of companies, organizations, and governments through a program meant to help them test and strengthen their cybersecurity.

The limited release caused enough of a stir that it prompted the Trump administration to consider dropping its beef with Anthropic and secure agreements with more AI companies to allow the government to review their models before public release.

Still, not everyone is convinced that Mythos is as big a deal as it has been made out to be.

In a blog post on Monday, Curl Lead Developer Daniel Stenberg characterized the hype around Mythos as mostly a “successful marketing stunt.”

Stenberg wrote that he participated in Anthropic’s Project Glasswing, which allows companies to submit their code to Anthropic to be analyzed by Mythos for security flaws.

The developer eventually received a report from Anthropic that listed five “confirmed security vulnerabilities.” But after closer inspection, Stenberg and his team determined that only one of them was a legitimate, unknown security issue.

“My personal conclusion can however not end up with anything else than that the big hype around this model so far was primarily marketing,” Stenberg wrote. “I see no evidence that this setup finds issues to any particular higher or more advanced degree than the other tools have done before Mythos.”

Read the full article here

You Might Also Like

Jonathan Hickman Returns to the X-Men With Marvel’s New ‘Midnight’ Universe

Remember Digg? It’s Back, in AI News Outlet Form

Why Jane Schoenbrun Wanted to Make a Queer-Focused Slasher Film

Amazon Stops Selling Fast E-Bikes To Californians

Someone Created a Version of ‘Elden Ring’ That Runs on a PS1

Share This Article
Facebook Twitter Copy Link Print
Previous Article Jonathan Hickman Returns to the X-Men With Marvel’s New ‘Midnight’ Universe
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1kLike
69.1kFollow
134kPin
54.3kFollow

Latest News

Activists Install Arcade Game Mocking Trump on the National Mall. You Can Play It in Your Browser Right Now
News
Lost Weight With a GLP-1? People Might Secretly Be Judging You, Study Finds
News
Jon Favreau Isn’t Sure Why He Was Asked to Make ‘The Mandalorian and Grogu,’ But He’s Sure Baby Yoda Had Something to Do With It
News
Elon Musk and Tim Cook Will Travel to China With Trump: Report
News
Wall Street’s Stablecoin Darling Raises $222 Million to Starve Ethereum
News
Over 100 People on Cruise Sickened by Norovirus
News
It Feels Weird to Say Goodbye to ‘Good Omens’ Now
News
Smart Glasses With Subscriptions Are As Bad as They Sound
News

You Might also Like

News

‘Mortal Kombat 2’ Fought Valiantly At the Box Office This Weekend

News Room News Room 2 Min Read
News

RIP Koji Suzuki, Author and Creator of ‘The Ring’

News Room News Room 3 Min Read
News

What Will It Take to Modernize the US Power Grid?

News Room News Room 12 Min Read
Tech Consumer JournalTech Consumer Journal
Follow US
2024 © Prices.com LLC. All Rights Reserved.
  • Privacy Policy
  • Terms of use
  • For Advertisers
  • Contact
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?