Google Threat Intelligence Group Detects First Known Instance of AI-Developed Zero-Day Exploit in Action

Google says the AI-developed zero-day exploit was planned to be used in a mass exploitation event.

Advertisement
Written by Akash Dutta, Edited by Ketan Pratap | Updated: 13 May 2026 12:15 IST
Highlights
  • GTIG was able to stop it using proactive counter discovery
  • Google says threat actors have shown a high interest in AI
  • Researchers believe AI-enabled malware can accelerate autonomous attacks

Google says threat actors are increasingly using AI for vulnerability discovery and cyberattacks

Photo Credit: Reuters

Google Threat Intelligence Group (GTIG) shared a series of developments in the cybercrime space on Tuesday. The group highlighted that, currently, artificial intelligence (AI) is being used both as an engine for adversary operations and as a high-value target for attacks. The most concerning development is the first known instance where a threat actor used an AI-developed zero-day exploit. While the attack was foiled by the tech giant, this raises fresh concerns over AI bolstering hackers and threat actors.

Google Says AI Is Becoming Part of Real-World Cyberattacks

In a blog post, Google's cybersecurity research arm revealed several developments in which AI is being used to carry out cyberattacks. GTIG says threat actors are no longer using AI only for simple phishing emails or text generation. Instead, attackers are now applying generative AI models to more advanced parts of cyber operations, including vulnerability research, exploit development, malware creation, and defence evasion.

Advertisement

One of the key findings in the report is a planned mass exploitation campaign involving a zero-day vulnerability. A zero-day is a software flaw unknown to the vendor at the time attackers begin exploiting it. GTIG said it identified a threat actor using a zero-day exploit that it believes was developed with assistance from AI tools. Google said it discovered the vulnerability before the attackers could use it at scale and worked with the affected vendor to patch the issue.

The exploit reportedly targeted a popular open-source web administration tool and allowed attackers to bypass two-factor authentication (2FA), a security system that normally requires a second verification step in addition to a password.

Advertisement

Google said signs within the exploit code suggested AI involvement. These included AI-style coding patterns, explanatory comments, and even a fabricated vulnerability severity score generated in a format commonly associated with large language models.

Beyond vulnerability discovery, GTIG said attackers are also using AI to accelerate malware development and improve operational efficiency. According to the report, AI-assisted coding is helping threat actors create more adaptable malware and obfuscation systems designed to evade security software.

Advertisement

Google specifically pointed to malware families such as PROMPTSPY, which the company described as an example of AI-enabled malware capable of interpreting system states and dynamically generating commands. In simpler terms, the malware can adapt its behaviour depending on the environment it encounters on an infected machine.

The report also said attackers linked to China, North Korea, and Russia have shown increasing interest in using AI models for vulnerability research and attack workflows. In some cases, threat actors reportedly used AI systems to analyse known vulnerabilities, validate proof-of-concept exploits, and improve malicious infrastructure.

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement
Popular Mobile Brands
  1. Motorola Razr Fold Launched in India With These Features
  2. Oppo Find N6 Review: A Great Foldable That You Might Never Experience
  3. Amazon Great Summer Sale 2026: Best Deals on Vivo and iQOO Smartphones
  4. Garmin Forerunner 70, Forerunner 170 Unveiled; India Launch Timeline Confirmed
  5. The Punisher: One Last Kill Now Streaming Online: What You Need to Know
  6. Sony Bravia 3II Series Debuts in India With a 120Hz 4K Display: See Prices
  7. Sony Xperia 1 VIII With 48-Megapixel Rear Cameras Arrives at This Price
  8. Oppo Find X9 Ultra Will Launch in India Alongside the Find X9s on This Date
  9. Sony's 'The ColleXion Headphones' Might Arrive With This Redesigned Hinge
  10. Google Says It Will Bring These Agentic Capabilities to Android Soon
  1. Kaalidas 2 Now Streaming on Prime Video, Lionsgate Play India, and More: Know Everything About Plot, Cast, and More
  2. Bitcoin Price Stabilises Around $81,000 Amidst Robust Investor Demand
  3. Xiaomi 17 Max Design, Colour Options Revealed as Company Confirms Launch in May
  4. The Punisher: One Last Kill Now Streaming Online: What You Need to Know About This Marvel Special
  5. Honor Pad 20 With 12.1-Inch 3K Display Teased, Snapdragon 7 Gen 3 Chip Confirmed
  6. Oppo Reno 16F 5G Appears on GCF Database Ahead of Anticipated Global Launch
  7. Oppo Find X9 Ultra India Launch Date Confirmed; Find X9s to Tag Along: Expected Specifications
  8. Google Threat Intelligence Group Detects First Known Instance of AI-Developed Zero-Day Exploit in Action
  9. Lies of P Sequel Has Entered 'Full-Scale Development' Stage, Says Neowiz
  10. Motorola Razr Fold Launched in India With Triple 50-Megapixel Cameras, 6,000mAh Battery: Price, Specifications
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.