{"id":34740,"date":"2026-05-11T15:01:11","date_gmt":"2026-05-11T15:01:11","guid":{"rendered":"https:\/\/www.europesays.com\/ai\/34740\/"},"modified":"2026-05-11T15:01:11","modified_gmt":"2026-05-11T15:01:11","slug":"google-researchers-uncover-criminal-zero-day-exploit-likely-built-with-ai","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/ai\/34740\/","title":{"rendered":"Google researchers uncover criminal zero-day exploit likely built with AI"},"content":{"rendered":"<p>Google\u2019s threat intelligence researchers have linked a zero-day exploit to AI-assisted development by a criminal group.<\/p>\n<p>The exploit targeted a popular open-source web-based system administration tool. It allowed attackers to bypass two-factor authentication once they had valid user credentials. The flaw stemmed from a semantic logic error, a case where a developer hardcoded a trust assumption that contradicted the application\u2019s authentication enforcement. Google Threat Intelligence Group (GTIG) worked with the impacted vendor to disclose the vulnerability before the planned mass exploitation campaign could be executed.<\/p>\n<p>Researchers identified the AI connection through the exploit\u2019s structure. The script contained educational docstrings, a hallucinated CVSS score, and a clean, textbook-style Python format characteristic of large language model output. GTIG said it does not believe Google\u2019s Gemini was involved.<\/p>\n<p>\u201cCybercriminals do use zero-days, frequently in fast mass exploitation events, like the one this actor planned. Because cybercriminals have to alter their targets for extortion, using zero-days for a prolonged period is harder; therefore, their best option is rapid deployment,\u201d <a href=\"https:\/\/www.linkedin.com\/in\/john-hultquist-76226478\/\" target=\"_blank\" rel=\"nofollow noopener\">John Hultquist<\/a>, Chief Analyst at Google Threat Intelligence Group, told Help Net Security.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.europesays.com\/ai\/wp-content\/uploads\/2026\/05\/google-AI-vulnerability-exploitation.webp\" class=\"aligncenter\" alt=\"AI vulnerability exploitation\" title=\"LLM vulnerability discovery capabilities compared with other discovery mechanisms\"\/><\/p>\n<p class=\"text-center\">LLM vulnerability discovery capabilities compared with other discovery mechanisms (Source: Google)<\/p>\n<p>AI-assisted malware gets harder to detect<\/p>\n<p>Beyond vulnerability discovery, AI is embedded in malware development in ways that complicate detection.<\/p>\n<p>Russia-nexus actors have deployed two malware families, CANFAIL and LONGSTREAM, that use AI-generated decoy code to obscure their malicious functionality. CANFAIL contains LLM-authored comments explicitly describing blocks of code as unused filler, indicating the threat actor requested that the model generate large volumes of inert code for obfuscation. LONGSTREAM contains 32 separate instances of code querying the system\u2019s daylight saving time status, a repetitive and functionally irrelevant pattern designed to make the script appear benign to analysts.<\/p>\n<p>A separate PRC-linked actor, APT27, used Google\u2019s Gemini to accelerate development of a network management application supporting an operational relay box network. The tool was configured with a three-hop routing parameter and listed mobile routers as supported device types, indicating an intent to route traffic through residential IP addresses.<\/p>\n<p>PROMPTSPY expands autonomous attack capability<\/p>\n<p>An Android backdoor called <a href=\"https:\/\/www.helpnetsecurity.com\/2026\/02\/19\/promptspy-android-malware-generative-ai\/\" rel=\"nofollow noopener\" target=\"_blank\">PROMPTSPY<\/a> takes AI integration further. The malware, first identified by ESET, contains an autonomous agent module that sends the device\u2019s live user interface layout to Google\u2019s Gemini API and receives back precise tap coordinates and gesture commands. The malware can simulate clicks, swipes, and other physical interactions without human involvement.<\/p>\n<p>PROMPTSPY can also capture biometric authentication data, including PINs and lock patterns, and replay them to regain access to a locked device. If a user attempts to uninstall it, the malware renders an invisible overlay over the uninstall button, silently intercepting touch inputs. Its command-and-control infrastructure, including API keys, can be updated remotely without redeploying the payload. Google said no apps containing PROMPTSPY are currently on <a href=\"https:\/\/www.helpnetsecurity.com\/2026\/04\/16\/google-play-store-policy-updates\/\" rel=\"nofollow noopener\" target=\"_blank\">Google Play<\/a>, and Android devices with Google Play Services are protected by Google Play Protect.<\/p>\n<p>Hultquist noted that comparable malware exists, and the question is whether any variant achieves meaningful scale. \u201cSimilar malware is in the wild, but it\u2019s mostly experimental. We\u2019re looking for threat actors to find something that works at scale. Then they\u2019ll probably lean into it. As <a href=\"https:\/\/www.helpnetsecurity.com\/2026\/01\/19\/review-ai-strategy-and-security\/\" rel=\"nofollow noopener\" target=\"_blank\">AI systems<\/a> become more ubiquitous they will become a target and a tool for actors inside the network to get what they want.\u201d<\/p>\n<p>Supply chain attacks reach AI infrastructure<\/p>\n<p>In March 2026, a cybercrime group called <a href=\"https:\/\/www.helpnetsecurity.com\/2026\/03\/30\/teampcp-supply-chain-attacks-ransomware\/\" rel=\"nofollow noopener\" target=\"_blank\">TeamPCP<\/a>, also tracked as UNC6780, compromised several GitHub repositories, including those tied to the <a href=\"https:\/\/www.helpnetsecurity.com\/2026\/03\/25\/teampcp-supply-chain-attacks\/\" rel=\"nofollow noopener\" target=\"_blank\">LiteLLM<\/a> AI gateway library and vulnerability scanner Trivy. The attackers embedded a credential stealer called SANDCLOCK in affected build environments, extracting cloud secrets including AWS keys and GitHub tokens. Those credentials were then used in partnerships with ransomware groups.<\/p>\n<p>The LiteLLM compromise is notable because the library is widely used to connect software applications to multiple AI providers. Exposure of API secrets from that package could give attackers access to an organization\u2019s AI environment, enabling reconnaissance and data collection at scale from within enterprise networks.<\/p>\n<p>Separately, state-sponsored and criminal actors are systematically bypassing AI platform billing controls. PRC-linked groups have used automated scripts to register and cancel premium LLM accounts, cycling through free-tier access at volume. One cluster deployed a relay service aggregating accounts across Gemini, Claude, and OpenAI to pool access and distribute costs across compromised credentials.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.europesays.com\/ai\/wp-content\/uploads\/2026\/04\/divider.gif\" class=\"aligncenter\"\/><\/p>\n<p>Download: <a href=\"https:\/\/helpnet.short.gy\/ajBk9L\" target=\"_blank\" rel=\"nofollow noopener\">Automating Pentest Delivery Guide<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"Google\u2019s threat intelligence researchers have linked a zero-day exploit to AI-assisted development by a criminal group. The exploit&hellip;\n","protected":false},"author":2,"featured_media":34741,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[22147,24,22148,4174,154,313,530,2408,132,2194,1430,22149,30,22150,21768],"class_list":{"0":"post-34740","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-google","8":"tag-0-day","9":"tag-ai","10":"tag-apt","11":"tag-attack","12":"tag-cybercrime","13":"tag-cybersecurity","14":"tag-exploit","15":"tag-gemini","16":"tag-google","17":"tag-google-cloud","18":"tag-google-gemini","19":"tag-mandiant","20":"tag-report","21":"tag-russian-federation","22":"tag-threats"},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts\/34740","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/comments?post=34740"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts\/34740\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/media\/34741"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/media?parent=34740"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/categories?post=34740"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/tags?post=34740"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}