{"id":35925,"date":"2026-05-12T11:11:09","date_gmt":"2026-05-12T11:11:09","guid":{"rendered":"https:\/\/www.europesays.com\/ai\/35925\/"},"modified":"2026-05-12T11:11:09","modified_gmt":"2026-05-12T11:11:09","slug":"how-google-may-have-confirmed-anthropics-mythos-fears-that-sent-shock-waves-across-banks-and-financial-institutions","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/ai\/35925\/","title":{"rendered":"How Google may have confirmed Anthropic\u2019s Mythos fears that sent shock waves across banks and financial institutions"},"content":{"rendered":"<p> <img src=\"https:\/\/www.europesays.com\/ai\/wp-content\/uploads\/2026\/05\/1778584269_547_google.jpg\" alt=\"How Google may have confirmed Anthropic\u2019s Mythos fears that sent shock waves across banks and financial institutions\" title=\"Google\" decoding=\"async\" fetchpriority=\"high\"\/> <a href=\"https:\/\/gadgetsnow.indiatimes.com\/brands\/Google\" styleobj=\"[object Object]\" class=\"\" commonstate=\"[object Object]\" target=\"\" frmappuse=\"1\" rel=\"nofollow noopener\">Google<\/a>\u2019s Threat Intelligence Group (GTIG) recently revealed that it successfully blocked a massive cyberattack where criminals used artificial intelligence (AI) to discover and weaponise a previously unknown software flaw. Google\u2019s message is clear: The era of the \u2018AI-powered hacker\u2019 has officially arrived. The discovery effectively confirms the \u201cdoomsday\u201d warnings issued just weeks ago by AI startup Anthropic when it launched its powerful model, Mythos.<\/p>\n<p>What Google\u2019s team found<\/p>\n<p>Google reported \u201chigh confidence\u201d that a criminal group used a Large Language Model (LLM) to identify a \u201czero-day\u201d vulnerability \u2013 a software bug unknown to the developers themselves. This specific flaw allowed the hackers to bypass two-factor authentication (2FA), the very security layer most banks and businesses rely on to keep hackers out.\u201cThe criminal threat actor planned to use it in a mass exploitation event but our proactive counter discovery may have prevented its use,\u201d Google wrote in the post, without disclosing the name of the hacker group. Google said it does not believe that its homegrown Gemini model was used.Google says that while it disrupted the plot before it could turn into a \u201cmass exploitation event,\u201d the speed and precision with which the AI found the flaw have alarmed experts.\u201cIt\u2019s here. The era of AI-driven vulnerability and exploitation is already here,\u201d said John Hultquist, chief analyst at Google\u2019s threat intelligence arm.<\/p>\n<p>Why &#8216;Mythos&#8217; sent banks into panic<\/p>\n<p>The news validates the decision by AI firm Anthropic last month to delay the release of its Mythos model. Anthropic warned that Mythos was so powerful at hacking that it could prey on decades-old vulnerabilities hidden in the world&#8217;s critical infrastructure.The fear that a tool like Mythos could be used to systematically dismantle bank security led to a series of urgent White House meetings. Since then, Anthropic has only released the model to a &#8216;closed&#8217; group of partners, including JPMorgan Chase, Apple, and CrowdStrike, under a security initiative called Project Glasswing.According to Google, groups linked to China and North Korea are showing significant interest in using AI to supercharge their malware. Unlike government spies who move slowly, criminal hackers use AI to move at &#8220;lightning speed,&#8221; aiming to extort data or launch ransomware before a fix can even be written.<\/p>\n","protected":false},"excerpt":{"rendered":"Google\u2019s Threat Intelligence Group (GTIG) recently revealed that it successfully blocked a massive cyberattack where criminals used artificial&hellip;\n","protected":false},"author":2,"featured_media":35926,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[12409,22648,53,10716,22650,132,22072,22649,6452],"class_list":{"0":"post-35925","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-anthropic","8":"tag-ai-in-cybersecurity","9":"tag-ai-powered-hackers","10":"tag-anthropic","11":"tag-anthropic-mythos","12":"tag-banks-cyber-threats","13":"tag-google","14":"tag-google-threat-intelligence-group","15":"tag-mass-exploitation-event","16":"tag-zero-day-vulnerabilities"},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts\/35925","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/comments?post=35925"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts\/35925\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/media\/35926"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/media?parent=35925"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/categories?post=35925"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/tags?post=35925"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}