Skip to content
Tech News
← Back to articles

Google: Hackers used AI to develop zero-day exploit for web admin tool

read original get Cybersecurity AI Detection Tool → more articles
Why This Matters

This incident highlights the growing use of AI by threat actors to develop sophisticated zero-day exploits, posing new challenges for cybersecurity defenses. It underscores the urgent need for the industry to adapt to AI-driven attack methods and enhance detection strategies to protect critical systems and data.

Key Takeaways

Researchers at Google Threat Intelligence Group (GTIG) say that a zero-day exploit targeting a popular open-source web administration tool was likely generated using AI.

The exploit could be leveraged to bypass the two-factor authentication (2FA) protection in a popular open-source, web-based system administration tool that remains unnamed.

Although the attack was foiled before the mass exploitation phase, the incident shows that threat actors are relying more on AI assistance for their vulnerability discovery and exploitation efforts.

Based on the structure and content of the Python exploit code, Google has high confidence that the adversary used an AI model to find and weaponize the vulnerability.

"For example, the script contains an abundance of educational docstrings, including a hallucinated CVSS score, and uses a structured, textbook Pythonic format highly characteristic of LLMs training data," GTIG says in a report today.

The large language model (LLM) used for the malicious task remains unclear, but Google rules out the possibility that Gemini was involved in the process.

Additional evidence suggesting the use of LLM tools in the discovery process is the nature of the flaw - a high-level semantic logic bug that AI systems excel at identifying, rather than memory corruption or input sanitization issues typically uncovered through fuzzing or static analysis.

Source: Google

Google notified the software developer about the significant threat and timely action to disrupt the attack.

“For the first time, GTIG has identified a threat actor using a zero-day exploit that we believe was developed with AI,” GTIG researchers say.

... continue reading