Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Google Reports State-Backed Hackers Using Gemini AI for Recon and Attack Support
    Cybersecurity

    Google Reports State-Backed Hackers Using Gemini AI for Recon and Attack Support

    adminBy adminFebruary 12, 2026No Comments5 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Google Reports State-Backed Hackers Using Gemini AI for Recon and Attack Support
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Ravie LakshmananFeb 12, 2026Cyber Espionage / Artificial Intelligence

    Google on Thursday said it observed the North Korea-linked threat actor known as UNC2970 using its generative artificial intelligence (AI) model Gemini to conduct reconnaissance on its targets, as various hacking groups continue to weaponize the tool for accelerating various phases of the cyber attack life cycle, enabling information operations, and even conducting model extraction attacks.

    “The group used Gemini to synthesize OSINT and profile high-value targets to support campaign planning and reconnaissance,” Google Threat Intelligence Group (GTIG) said in a report shared with The Hacker News. “This actor’s target profiling included searching for information on major cybersecurity and defense companies and mapping specific technical job roles and salary information.”

    The tech giant’s threat intelligence team characterized this activity as a blurring of boundaries between what constitutes routine professional research and malicious reconnaissance, allowing the state-backed actor to craft tailored phishing personas and identify soft targets for initial compromise.

    UNC2970 is the moniker assigned to a North Korean hacking group that overlaps with a cluster that’s tracked as Lazarus Group, Diamond Sleet, and Hidden Cobra. It’s best known for orchestrating a long-running campaign codenamed Operation Dream Job to target aerospace, defense, and energy sectors with malware under the guise of approaching victims under the pretext of job openings.

    GTIG said UNC2970 has “consistently” focused on defense targeting and impersonating corporate recruiters in their campaigns, with the target profiling including searches for “information on major cybersecurity and defense companies and mapping specific technical job roles and salary information.”

    UNC2970 is far from the only threat actor to have misused Gemini to augment their capabilities and move from initial reconnaissance to active targeting at a faster clip. Some of the other hacking crews that have integrated the tool into their workflows are as follows –

    • UNC6418 (Unattributed), to conduct targeted intelligence gathering, specifically seeking out sensitive account credentials and email addresses.
    • Temp.HEX or Mustang Panda (China), to compile a dossier on specific individuals, including targets in Pakistan, and to gather operational and structural data on separatist organizations in various countries.
    • APT31 or Judgement Panda (China), to automate the analysis of vulnerabilities and generate targeted testing plans by claiming to be a security researcher.
    • APT41 (China), to extract explanations from open-source tool README.md pages, as well as troubleshoot and debug exploit code.
    • UNC795 (China), to troubleshoot their code, conduct research, and develop web shells and scanners for PHP web servers.
    • APT42 (Iran), to facilitate reconnaissance and targeted social engineering by crafting personas that induce engagement from the targets, as well as develop a Python-based Google Maps scraper, develop a SIM card management system in Rust, and research the use of a proof-of-concept (PoC) for a WinRAR flaw (CVE-2025-8088).

    Google also said it detected a malware called HONESTCUE that leverages Gemini’s API to outsource functionality generation for the next-stage, along with an AI-generated phishing kit codenamed COINBAIT that’s built using Lovable AI and masquerades as a cryptocurrency exchange for credential harvesting. Some aspects of COINBAIT-related activity have been attributed to a financially motivated threat cluster dubbed UNC5356.

    “HONESTCUE is a downloader and launcher framework that sends a prompt via Google Gemini’s API and receives C# source code as the response,” it said. “However, rather than leveraging an LLM to update itself, HONESTCUE calls the Gemini API to generate code that operates the ‘stage two’ functionality, which downloads and executes another piece of malware.”

    The fileless secondary stage of HONESTCUE then takes the generated C# source code received from the Gemini API and uses the legitimate .NET CSharpCodeProvider framework to compile and execute the payload directly in memory, thereby leaving no artifacts on disk.

    Google has also called attention to a recent wave of ClickFix campaigns that leverage the public sharing feature of generative AI services to host realistic-looking instructions to fix a common computer issue and ultimately deliver information-stealing malware. The activity was flagged in December 2025 by Huntress.

    Lastly, the company said it identified and disrupted model extraction attacks that are aimed at systematically querying a proprietary machine learning model to extract information and build a substitute model that mirrors the target’s behavior. In a large-scale attack of this kind, Gemini was targeted by over 100,000 prompts that posed a series of questions aimed at replicating the model’s reasoning ability across a broad range of tasks in non-English languages.

    Last month, Praetorian devised a PoC extraction attack where a replica model achieved an accuracy rate of 80.1% simply by sending a series of 1,000 queries to the victim’s API and recording the outputs and training it for 20 epochs.

    “Many organizations assume that keeping model weights private is sufficient protection,” security researcher Farida Shafik said. “But this creates a false sense of security. In reality, behavior is the model. Every query-response pair is a training example for a replica. The model’s behavior is exposed through every API response.” 

    Attack Gemini Google hackers Recon Reports Statebacked Support
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleArgentina Blocks Pirate Streaming Services Magis TV and Xuper TV, VPN Usage Skyrockets * TorrentFreak
    Next Article Removing stock apps on Android is simple if you know this trick
    admin
    • Website

    Related Posts

    University of Mississippi Medical Center reopens clinics after ransomware attack

    March 3, 2026

    Google AI Overview Citations From Top-Ranking Pages Drop Sharply

    March 2, 2026

    Fake Google Security site uses PWA app to steal credentials, MFA codes

    March 2, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    11 Best Small Business Checking Accounts of March 2026

    March 3, 2026

    Voice Search Ads Are Changing Google’s Search Term Report

    March 3, 2026

    7 new horror movies on Netflix, Shudder, HBO Max, and more in March 2026

    March 3, 2026

    Intel aims advanced Xeon 6+ at AI edge computing

    March 3, 2026
    Categories
    • Blogging (32)
    • Cybersecurity (564)
    • Privacy & Online Earning (77)
    • SEO & Digital Marketing (353)
    • Tech Tools & Mobile / Apps (701)
    • WiFi / Internet & Networking (102)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    11 Best Small Business Checking Accounts of March 2026

    March 3, 2026

    Voice Search Ads Are Changing Google’s Search Term Report

    March 3, 2026

    7 new horror movies on Netflix, Shudder, HBO Max, and more in March 2026

    March 3, 2026
    Most Popular
    • 11 Best Small Business Checking Accounts of March 2026
    • Voice Search Ads Are Changing Google’s Search Term Report
    • 7 new horror movies on Netflix, Shudder, HBO Max, and more in March 2026
    • Intel aims advanced Xeon 6+ at AI edge computing
    • University of Mississippi Medical Center reopens clinics after ransomware attack
    • Google AI Overview Citations From Top-Ranking Pages Drop Sharply
    • Why I’m sticking with 7B models for my local dev environment (and you should too)
    • Fake Google Security site uses PWA app to steal credentials, MFA codes
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.