{"id":34989,"date":"2026-05-11T19:00:08","date_gmt":"2026-05-11T19:00:08","guid":{"rendered":"https:\/\/www.europesays.com\/ai\/34989\/"},"modified":"2026-05-11T19:00:08","modified_gmt":"2026-05-11T19:00:08","slug":"google-says-hackers-used-ai-to-exploit-zero-day-flaw","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/ai\/34989\/","title":{"rendered":"Google says hackers used AI to exploit \u2018zero-day\u2019 flaw"},"content":{"rendered":"<p>Google announced Monday that it identified a cyber threat it believes hackers developed using AI, meant to exploit networks on a large scale. File Photo by Sascha Steinbach\/EPA<\/p>\n<p>May 11 (UPI) &#8212; <a href=\"https:\/\/www.upi.com\/topic\/Google\/\" target=\"_blank\" title=\"Google\" class=\"tpstyle\" rel=\"nofollow noopener\">Google<\/a> announced Monday that it identified a cyber threat it believes hackers developed using artificial intelligence, meant to exploit networks on a large scale.<\/p>\n<p>Google Threat Intelligence Group said the hackers were <a href=\"https:\/\/cloud.google.com\/blog\/topics\/threat-intelligence\/ai-vulnerability-exploitation-initial-access\" target=\"_blank\" rel=\"nofollow noopener\">using a zero-day exploit<\/a>, a security vulnerability that is unknown to security companies, and planned to use it for mass exploitation.\n<\/p>\n<p>Google said this is the first time it has identified a threat with evidence that AI was used to develop it.<\/p>\n<p>&#8220;AI-enabled malware, such as PROMPTSPY, signal a shift toward autonomous attack orchestration, where models interpret system states to dynamically generate commands and manipulate victim environments,&#8221; Google Threat Intelligence Group said in a news release.<\/p>\n<p>Google&#8217;s AI Gemini and Claude Mythos were highlighted as AI models it does not believe were used in this threat attempt.<\/p>\n<p>If the threat was successful, hackers would have been <a href=\"https:\/\/www.nytimes.com\/2026\/05\/11\/us\/politics\/google-hackers-attack-ai.html\" target=\"_blank\" rel=\"nofollow noopener\">able to bypass<\/a> two-factor authentication on &#8220;a popular open-source, web-based system administration tool,&#8221; Google said. The attempt occurred within the last couple months but Google did not specify when exactly.<\/p>\n<p>AI is also being used for cybersecurity, as a tool to identify potential security risks. Google says Monday&#8217;s report shows criminal hacker groups are <a href=\"https:\/\/www.politico.com\/news\/2026\/05\/11\/google-hackers-ai-security-00913247\" target=\"_blank\" rel=\"nofollow noopener\">also interested in using AI<\/a> for their goals.\n<\/p>\n<p>&#8220;For every zero-day we can trace back to AI, there are probably more out there,&#8221; John Hultquist, chief analyst at Google Intelligence Group, said in a statement. &#8220;Threat actors are using AI to boost the speed, scale, and sophistication of their attacks.<\/p>\n","protected":false},"excerpt":{"rendered":"Google announced Monday that it identified a cyber threat it believes hackers developed using AI, meant to exploit&hellip;\n","protected":false},"author":2,"featured_media":34990,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[24,132,1429,134,1829,1129],"class_list":{"0":"post-34989","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-google","8":"tag-ai","9":"tag-google","10":"tag-google-ai","11":"tag-technology","12":"tag-top-stories","13":"tag-u-s"},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts\/34989","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/comments?post=34989"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts\/34989\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/media\/34990"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/media?parent=34989"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/categories?post=34989"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/tags?post=34989"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}