{"id":8177,"date":"2026-05-12T17:42:42","date_gmt":"2026-05-12T17:42:42","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=8177"},"modified":"2026-05-12T17:42:42","modified_gmt":"2026-05-12T17:42:42","slug":"google-reports-first-ai-built-zero-day-exploit-as-cyber-model-fears-grow","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=8177","title":{"rendered":"Google Reports First AI-Built Zero-Day Exploit as Cyber Model Fears Grow"},"content":{"rendered":"<p>Google\u2019s Threat Intelligence Group reported Monday the first observed instance of a hacking group deploying an AI-generated zero-day exploit, which it says was built to bypass multifactor authentication systems.<\/p>\n<p>Zero-day exploits have been a key concern for security researchers, given the potential for advanced AI models to identify hundreds of them at a much faster pace than human experts. The recent limited releases of cybersecurity models by Anthropic and OpenAI, alongside industry buzz about their potential, have increased fears that AI could be used by cybercriminals and adversarial countries.<\/p>\n<p>Google did not disclose the hacking group responsible, nor the AI model used. In a follow-up comment to <a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2026-05-11\/hackers-used-ai-to-build-zero-day-attack-google-researchers-say?srnd=phx-technology\" target=\"_blank\" rel=\"noopener\">Bloomberg<\/a>, it said it did not believe the exploit was created by <a href=\"https:\/\/www.eweek.com\/news\/anthropic-mythos-ai-leak-cybersecurity-risks\/\">Mythos<\/a> or Google Gemini. Google has not launched its own advanced cyber model.<\/p>\n<h2 class=\"wp-block-heading\">Mythos and the future of cybersecurity<\/h2>\n<p>Anthropic stoked fears in the cybersecurity world last month with the limited launch of Mythos, following several weeks of warnings from the company about AI\u2019s potential impact on security. Around 40 organizations received limited access to the model, including public bodies, infrastructure providers, and financial institutions.<\/p>\n<p>From early tests of Mythos, it appears Anthropic was right to limit its release. Several of the 40 organizations have come forward to warn about Mythos\u2019 cybersecurity capabilities, while others have used the AI model to test their internal defenses and patch vulnerabilities it found.\u00a0<\/p>\n<p>Mozilla said it had <a href=\"https:\/\/www.techrepublic.com\/article\/news-mozilla-firefox-150-patched-271-security-flaws\/\" target=\"_blank\" rel=\"noopener\">patched 271 vulnerabilities identified by Mythos<\/a>, highlighting the model\u2019s ability to quickly spot bugs and provide fixes.<\/p>\n<p>The value of these AI models has also been highlighted by the Trump Administration\u2019s reversal on Anthropic. It had banned the use of Anthropic tools by state departments, while the Department of Defense signed agreements with most of its rivals after designating the company a supply-chain risk.\u00a0<\/p>\n<p>The launch of Mythos prompted several departments to seek access, <a href=\"https:\/\/www.eweek.com\/news\/nsa-anthropic-mythos-microsoft-vulnerabilities\/\">including the National Security Agency<\/a>, which has reportedly been using it to shore up its defenses.<\/p>\n<p>Bug hunting and security patching have never been as prominent as they are right now. Microsoft recently pushed out its second-largest monthly security update in its history, fixing 160 bugs, including two zero-day vulnerabilities. With Anthropic Mythos and other AI cyber tools, these companies may be on the front foot, but it is only a matter of time before the technology spreads to more bad actors.<\/p>\n<p>Mythos is only one of several AI models that hackers could use to build zero-day exploits. Its main rival, OpenAI, has been more lenient over who can access its <a href=\"https:\/\/www.eweek.com\/news\/openai-gpt-5-4-cyber\/\">cyber model<\/a>, even calling Anthropic\u2019s restricted access \u201cfear-based marketing\u201d before making its own cyber model limited access.\u00a0<\/p>\n<p>Anthropic has warned that <a href=\"https:\/\/www.techrepublic.com\/article\/news-anthropic-china-hackers-claude\/\" target=\"_blank\" rel=\"noopener\">Chinese AI model makers are about 12 months<\/a> behind the US leading edge, and that they could have tools of similar sophistication by 2027.<\/p>\n<p><strong>Also read: <\/strong><a href=\"https:\/\/www.eweek.com\/news\/google-april-2026-ai-announcements-gemini-agents\/\"><strong>Google\u2019s April AI announcements<\/strong><\/a><strong> covered Gemini agents, workplace automation, and defense-related AI updates.\u00a0<\/strong><\/p>\n<p>The post <a href=\"https:\/\/www.eweek.com\/news\/google-ai-generated-zero-day-mfa-exploit\/\">Google Reports First AI-Built Zero-Day Exploit as Cyber Model Fears Grow<\/a> appeared first on <a href=\"https:\/\/www.eweek.com\/\">eWEEK<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>Google\u2019s Threat Intelligence Group reported Monday the first observed instance of a hacking group deploying an AI-generated zero-day exploit, which it says was built to bypass multifactor authentication systems. Zero-day exploits have been a key concern for security researchers, given the potential for advanced AI models to identify hundreds of them at a much faster [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-8177","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/8177"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8177"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/8177\/revisions"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8177"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=8177"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=8177"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}