Google says criminal hackers used AI to find software flaw

Google says criminal hackers used AI to find software flaw

Security researchers at Alphabet Inc’s Google said they believe a cybercrime group used artificial intelligence to create a hacking tool that can bypass defences in a widely used tool to administer computer systems.The scheme, which was foiled when Google alerted the tool developer, would mark the first time that Google’s Threat Intelligence Group caught a hacker using an AI-generated “zero-day” in such a way, according to a report published Monday. Zero-day vulnerabilities are flaws unknown to the developer, leaving defenders no time to patch before they can be exploited. Google said it has “high confidence” that AI was used to help discover and weaponise the exploit.The company declined to name the cybercrime group, the impacted software or the large language model that was used in the attempted attack. However, a spokesperson said researchers don’t believe the exploit was created using Anthropic PBC’s Mythos or Google’s own model, Gemini.The company also wouldn’t say when the exploit was discovered other than it was “recent”. Anthropic said in April it wouldn’t widely release its new model, Mythos, as the way it used AI to exploit software flaws posed a national security risk. Since then, White House has moved to address potential malicious use of large language models, and officials have held emergency meetings with technology and industry leaders.Google researchers said their findings suggest such threats are already a reality.The hacking group used an AI model to find a previously unknown flaw in the tool. That flaw could be used to bypass multi-factor authentication, a security protection often added in addition to a password, to gain access to the internal networks of organisations using the software.Google alerted the tool’s developer, who fixed the issue before hackers could deploy it against users, the report said.Businesses use web-based system administration tools to configure and manage servers, websites and applications remotely. This includes managing security settings , employee accounts and permissions the accounts have to access systems and data. This is Bloomberg story.

  • Related Posts

    Keir Starmer vows to bring UK, EU closer amid exit calls

    British Prime Minister Sir Keir Starmer (AP photo) LONDON: PM Keir Starmer pledged Monday to prove “doubters” in his own party and among the electorate as a whole wrong as…

    Portrait looted by Nazis found in home of Dutch SS leader’s family: Art sleuth

    THE HAGUE: An artwork plundered by the Nazis from the world-famous Goudstikker collection has surfaced in the family of a notorious SS collaborator in the Netherlands, Dutch art detective Arthur…

    Leave a Reply

    Your email address will not be published. Required fields are marked *

    You Missed

    Top stocks to buy or sell today: Stock market recommendations for May 12, 2026 – check list

    Top stocks to buy or sell today: Stock market recommendations for May 12, 2026 – check list

    MP SET result 2026 released at mppsc.mp.gov.in: Direct link to download here

    MP SET result 2026 released at mppsc.mp.gov.in: Direct link to download here

    Sienna Miller becomes a mum at 44, welcomes second child with actor Oli Green |

    Sienna Miller becomes a mum at 44, welcomes second child with actor Oli Green |

    Mysore Palace: Inside India’s most spectacular royal residence

    Mysore Palace: Inside India’s most spectacular royal residence

    A Tiger’s Safari

    A Tiger’s Safari

    INICET aspirants flag portal crash, far-off exam centres | India News

    INICET aspirants flag portal crash, far-off exam centres | India News