{"id":35887,"date":"2026-05-12T10:32:09","date_gmt":"2026-05-12T10:32:09","guid":{"rendered":"https:\/\/www.europesays.com\/ai\/35887\/"},"modified":"2026-05-12T10:32:09","modified_gmt":"2026-05-12T10:32:09","slug":"google-says-hacker-used-mythos-like-ai-for-software-tool-exploit-the-mercury-news","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/ai\/35887\/","title":{"rendered":"Google says hacker used Mythos-like AI for software tool exploit \u2013 The Mercury News"},"content":{"rendered":"<p>By Margi Murphy, Bloomberg<\/p>\n<p>Security researchers at <a href=\"https:\/\/www.mercurynews.com\/2026\/04\/22\/google-releases-new-ai-agents-to-challenge-openai-and-anthropic\/\" rel=\"nofollow noopener\" target=\"_blank\">Alphabet Inc.\u2019s Google<\/a> said they believe a cybercrime group used artificial intelligence to create a hacking tool that can bypass defenses in a widely-used tool to administer computer systems.<\/p>\n<p>The scheme, which was foiled when Google alerted the tool developer, would mark the first time that Google\u2019s Threat Intelligence Group caught a hacker using an AI-generated \u201czero-day\u201d in such a way, according to a report published Monday. Zero-day vulnerabilities are flaws unknown to the developer, leaving defenders no time to patch before they can be exploited.<\/p>\n<p>Google said it has \u201chigh confidence\u201d that AI was used to help discover and weaponize the exploit.<\/p>\n<p>The company declined to name the cybercrime group, the impacted software or the large language model that was used in the attempted attack. However, a spokesperson said researchers don\u2019t believe the exploit was created using Anthropic PBC\u2019s Mythos or Google\u2019s own model, Gemini.<\/p>\n<p>The company also wouldn\u2019t say when the exploit was discovered other than it was \u201crecent.\u201d<\/p>\n<p>Anthropic said in April it wouldn\u2019t widely release its new model, Mythos, because the way it used AI to identify and exploit software flaws posed a national security risk. Since then, the White House has moved to address potential malicious use of large language models, and government officials have held emergency meetings with technology and industry leaders.<\/p>\n<p>Google researchers said their findings suggest such threats are already a reality.<\/p>\n<p>The hacking group used a AI model to find a previously unknown flaw in the tool, according to the report. That flaw could be used to bypass multifactor authentication, a security protection often added in addition to a password, to gain access to the internal networks of organizations using the software.<\/p>\n<p>Google alerted the tool\u2019s developer, who fixed the issue before hackers could deploy it against users, the report said.<\/p>\n<p>Businesses use web-based system administration tools to configure and manage servers, websites and applications remotely. This includes managing security settings, employee accounts and the permissions those accounts have to access systems and data.<\/p>\n<p>Explainer: Why Are Cyberattacks on the Rise? What Can Be Done?<\/p>\n<p>More stories like this are available on <a href=\"https:\/\/www.bloomberg.com\" rel=\"nofollow noopener\" target=\"_blank\">bloomberg.com<\/a><\/p>\n<p>\u00a92026 Bloomberg L.P.<\/p>\n","protected":false},"excerpt":{"rendered":"By Margi Murphy, Bloomberg Security researchers at Alphabet Inc.\u2019s Google said they believe a cybercrime group used artificial&hellip;\n","protected":false},"author":2,"featured_media":35888,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[24,309,132,1429,315,2853,10432,1161,134],"class_list":{"0":"post-35887","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-google","8":"tag-ai","9":"tag-business","10":"tag-google","11":"tag-google-ai","12":"tag-hacking","13":"tag-latest-headlines","14":"tag-morning-wire","15":"tag-silicon-valley","16":"tag-technology"},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts\/35887","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/comments?post=35887"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts\/35887\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/media\/35888"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/media?parent=35887"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/categories?post=35887"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/tags?post=35887"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}