Google identifies the first zero-day vulnerability developed with the help of an AI

Google Threat Intelligence Group (GTIG) has warned of what it considers to be the first use of artificial intelligence (AI) to develop a zero-day vulnerability, in addition to highlighting the use of this technology to exploit large-scale vulnerabilities, improve obfuscation capabilities and circumvent the safeguards of large language models (LLM).

Although this vulnerability presents “many signs of the use of AI”, GTIG researchers rule out the use of Gemini and Mythos in its development. They also report that they shared their discoveries with the company responsible for the affected service, which was able to distribute a patch and correct it.

Widespread use of the cybercrime industry

On the other hand, the report includes the use of artificial intelligence to drive attacks and exploit large-scale vulnerabilities, as identified in the case of the North Korean cybercriminal group APT45.

Agent artificial intelligence has also become a tool for cybercriminals. The GTIG report includes experimentation with agents such as OpenClaw and OneClaw in test environments, with the aim of perfecting their capabilities by orchestrating attacks.

Specifically, its use is cited to refine AI-generated payloads within controlled configurations to increase the reliability of the exploit before deployment.

To mitigate this use, the person responsible for OpenClaw has partnered with the Spanish company Virus Total to detect malicious programs in its marketplace by scanning the skills that are published there.

Additionally, cybercriminals use AI to create more advanced infrastructure and malware with better obfuscation and evasion capabilities. In this case, the China-linked cyber threat group APT27 is highlighted, which turned to Gemini to accelerate the development of a fleet management application to support the management of a network of operational relay boxes (ORBs) using multi-hop configurations.

For their part, the UNC6201 and UNC5673 threat groups have directed their activity to the violation of LLM with the aim of circumventing the safeguards that prevent their malicious use and payment methods to access the most advanced capabilities and take advantage of them in their campaigns.

The report highlights other uses of AI, for example, to create deepfakes for use in disinformation campaigns, to refine malicious software, and to persistently and autonomously probe for business vulnerabilities.

“Cybercriminals are using AI to increase the speed, scale and sophistication of their attacks” as this technology “allows them to test their operations, maintain persistence against their targets, create better malware and achieve many other improvements”, as explained by GTIG chief analyst, John Hultquist.

By Editor

One thought on “Google identifies the first zero-day vulnerability developed with the help of an AI”
  1. https://nexto.club/blogs/48459/Why-Winbox-Stands-Out-Among-Online-Casino-Platforms-in-2026
    https://steemit.com/winbox/@elisadecosta/the-evolution-of-digital-gaming-how-winbox-redefined-the-industry-standards
    https://znnews.online/exploring-the-diverse-entertainment-categories-available-at-winbox-for-novices/
    https://banglacaption.cloud/how-to-start-playing-real-money-casino-games-on-winbox-today/
    https://porbez.site/winbox-login-guide-how-to-sign-in-to-your-favorite-online-casino-platform/
    https://msnews.cfd/winbox-apk-vs-h5-winbox-which-one-should-you-use-in-2026/
    https://cbznews.cfd/how-to-make-the-most-of-your-winbox-free-credit-and-casino-bonuses/
    https://axiomag.icu/tips-and-strategies-to-improve-your-winning-chances-on-winbox/
    https://govtjob.space/why-signing-up-on-winbox-is-the-smartest-move-for-online-casino-fans/
    https://nytimez.blog/winbox-register-guide-how-to-create-your-account-and-start-playing-today/
    https://yoursocial.it.com/blogs/27742/Why-Winbox-Is-the-Go-To-Online-Casino-Platform-for
    https://writeupcafe.com/understanding-the-exclusive-benefits-of-the-winbox-vip-tiered-program
    https://nwacolorado.org/essential-steps-for-new-users-starting-their-journey-on-the-winbox-platform/
    https://cristianoronaldoclub.com/read-blog/26127
    https://zerfoon.net/read-blog/36081
    https://theavtar.in/read-blog/148958
    https://ivebo.co.uk/read-blog/310288
    https://local-biz.directory/listing/winbox-malaysia/
    http://choicebookmarks.com/listing/winbox-malaysia/
    https://www.homepros411.com/software-internet/winbox-malaysia
    https://www.helloneighbor.info/malaysia/kuala-lumpur/things-to-do/winbox-malaysia
    https://www.poconoweddingplannerdirectory.com/calligraphers/winbox-malaysia
    http://www.growplumbing.com/best-plumber-near-me/winbox-malaysia
    https://www.perrysplacepromotions.org/online-gaming/winbox-malaysia
    https://ok.ru/profile/910121498371/statuses/156662897051651

Leave a Reply