Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Hackers Use AI for Exploit Development, Attack Automation
    Cybersecurity

    Hackers Use AI for Exploit Development, Attack Automation

    adminBy adminMay 11, 2026No Comments5 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Hackers Use AI for Exploit Development, Attack Automation
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Threat actors are abusing AI tools in increasingly sophisticated ways, including exploit development and attack orchestration.

    Google today published new research tracking how adversaries leverage AI in their cyber operations. Since large language model (LLM) tools became widely available, threat actors have leveraged the technology in a wide range of ways, such as crafting phishing lures, coding malware, and conducting reconnaissance. They are also using AI, as Google detailed, for vulnerability research and exploit development.

    This research arrives as defenders contemplate how Anthropic’s Claude Mythos model (and by extension Project Glasswing) will reshape the security ecosystem for years to come, as Anthropic claims Mythos is capable of finding critical zero-day vulnerabilities using natural language instruction. 

    While this report doesn’t claim threat actors are using anything like Mythos, Google’s Threat Intelligence Group (GTIG) covers some of the cutting-edge ways attackers are using AI today.

    Related:After Replacing TeamPCP Malware, ‘PCPJack’ Steals Cloud Secrets

    No Mythos Needed: Exploit Developed With AI

    For example, GTIG said it identified a threat actor using a zero-day exploit the company believes was developed with AI – possibly the first of its kind. According to the report, the vulnerability is “implemented in a Python script that enables the user to bypass two-factor authentication (2FA) on a popular open-source, web-based system administration tool.” The vulnerability requires valid user credentials to exploit.

    Although the threat actor was (or possibly is) planning to use the vulnerability on a massive scale, GTIG disclosed the bug to the appropriate vendor in the hopes of disrupting potential threat activity. 

    “Although we do not believe Gemini was used, based on the structure and content of these exploits, we have high confidence that the actor likely leveraged an AI model to support the discovery and weaponization of this vulnerability,” the report read. “For example, the script contains an abundance of educational docstrings, including a hallucinated CVSS score, and uses a structured, textbook Pythonic format highly characteristic of LLMs training data (e.g., detailed help menus and the clean _C ANSI color class).”

    Threat actors associated with China and North Korea have shown particular interest in using LLMs for vulnerability research. For example, GTIG has observed suspected Chinese actor UNC2814 prompting Gemini to take on the role of a network security researcher conducting vulnerability research into embedded devices like TP-Link firmware. The actor tells the AI they are “auditing it for pre-authentication remote code execution (RCE) vulnerabilities.”

    Related:If AI’s So Smart, Why Does It Keep Deleting Production Databases?

    North Korean actor Silent Chollima, also known as APT45, has been observed “sending thousands of repetitive prompts that recursively analyze different CVEs and validate PoC exploits.” This, Google said, facilitates more robust exploit capabilities than the model would have otherwise. Threat actors have similarly trained on a specialized vulnerability repository known as “wooyun-legacy” with more than 85,000 real world vulnerability cases collected by the Chinese bug bounty platform WooYun between 2010 and 2016. 

    Threat actors are also experimenting with agentic tools like OpenClaw and OneClaw to assist in vulnerability research. 

    AI-Powered Attack Orchestration

    But one of the most striking use cases detailed in the report involved the use of AI in orchestrating attacks, as detailed with a malware family known as “PromptSpy.” This is an Android backdoor first detailed by ESET, which abuses Gemini by prompting it to ensure the malicious app remains in the “recent apps” list. 

    GTIG’s analysis found that the backdoor used AI for other purposes, primarily “centered around navigating the Android user interface and autonomously interpreting real-time user activity for follow-on actions.” For example, it can capture biometric data to replay authentication gestures to regain access to a compromised device. 

    Related:TeamPCP Hits SAP Packages With ‘Mini Shai-Hulud’ Attack

    Moreover, threat actors are using agentic workflows to “operationalize autonomous frameworks to execute multi-stage security tasks.” A China-nexus actor deployed agentic tools in an attack against a Japanese technology firm and an East Asian cybersecurity platform, according to the report. Agentic tools like Hextrike and Strix were used to maintain persistence across the attack surface and to both automate and validate vulnerabilities. 

    “This combination of autonomous reconnaissance and automated verification suggests a transition toward AI-driven frameworks that can scale discovery activities with minimal human oversight,” GTIG said.

    While slight and in limited cases, it is noteworthy to see threat actors move from heavily human-focused operations to campaigns where the AI takes more control. This mirrors the progression of AI in the defender space, where some organizations are moving away from human-in-the-loop thinking and toward human-on-the-loop, where agents are the primary AI orchestrators making moment-to-moment decisions and humans only intervene when necessary.

    Don’t miss the latest Dark Reading Confidential podcast, How the Story of a USB Penetration Test Went Viral. Two decades ago Dark Reading posted its first blockbuster piece — a column by a pen tester who sprinkled rigged thumb drives around a credit union parking lot and let curious employees do the rest. This episode looks back at the history-making piece with its author, Steve Stasiukonis. Listen now!

    Attack automation Development exploit hackers
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleEFF Stands in Solidarity With RightsCon and the Global Digital Rights Community
    Next Article Adthena launches ChatGPT ads intelligence platform
    admin
    • Website

    Related Posts

    Encryption Consulting launches CertSecure Manager v3.3 with zero-touch certificate renewals

    May 20, 2026

    GitHub confirms breach of 3,800 repos via malicious VSCode extension

    May 20, 2026

    Grafana GitHub Breach Exposes Source Code via TanStack npm Attack

    May 20, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Mueller Explains Why Google Uses Markdown On Dev Docs

    May 21, 2026

    Google Marketing Live 2026: Everything you need to know

    May 21, 2026

    Google unveils Gemini 3.5 Flash and a redesigned ‘intelligent Search box’

    May 21, 2026

    12 Awesome Custom Google Analytics Reports Created by the Experts

    May 20, 2026
    Categories
    • Blogging (82)
    • Cybersecurity (1,955)
    • Privacy & Online Earning (223)
    • SEO & Digital Marketing (1,214)
    • Tech Tools & Mobile / Apps (1,796)
    • WiFi / Internet & Networking (306)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Mueller Explains Why Google Uses Markdown On Dev Docs

    May 21, 2026

    Google Marketing Live 2026: Everything you need to know

    May 21, 2026

    Google unveils Gemini 3.5 Flash and a redesigned ‘intelligent Search box’

    May 21, 2026
    Most Popular
    • Mueller Explains Why Google Uses Markdown On Dev Docs
    • Google Marketing Live 2026: Everything you need to know
    • Google unveils Gemini 3.5 Flash and a redesigned ‘intelligent Search box’
    • 12 Awesome Custom Google Analytics Reports Created by the Experts
    • Selector targets the network visibility gap in multi-cloud infrastructure
    • How to Persuade Your Boss to Send You to Ahrefs Evolve in San Diego
    • Key AEO & Content Trends for 2026
    • Google adds llms.txt check to Chrome Lighthouse
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.