Skip to content
Aging

Google Catches First AI-Built Zero-Day Exploit Before Mass Attack

Read in other languages: 한국어日本語
AI May 17, 2026 By Insights AI 1 min read 4 views Source

A Historic First

Google's Threat Intelligence Group (GTIG) announced on May 11 that it detected and stopped the first confirmed zero-day exploit developed with AI assistance. A criminal group had planned a mass exploitation campaign targeting widely deployed open-source software—but Google intercepted the attack before it launched.

How the Exploit Worked

The weapon was a Python script targeting a logic flaw in the authentication flow of an unnamed but widely deployed open-source web administration tool. Developers had hard-coded a trust exception into the 2FA verification step, creating a bypass that attackers could exploit. The attack required valid user credentials—a privilege-escalation technique, not a cold-start login bypass.

GTIG says it has high confidence the exploit was AI-authored. Three tell-tale signs: textbook Pythonic structure typical of LLM training data, extensive educational docstrings, and a hallucinated CVSS score that does not correspond to any real CVE entry.

Threat Actors

Chinese state-linked operators and North Korea's APT45 have been observed using AI to automate vulnerability checks at scale. GTIG believes the criminal group behind this exploit was planning a mass exploitation event. Google worked with the vendor to patch the vulnerability before the campaign launched.

Why This Matters

Zero-day discovery and exploit development have historically required deep human expertise. With AI now autonomously performing this process, the cost and skill barrier for zero-day development has dropped significantly. Faster patching cycles, stricter AI model access controls for cybersecurity tasks, and updated vulnerability disclosure policies are now urgent priorities.

Source: CNBC

Share: Long

Related Articles

Comments (0)

No comments yet. Be the first to comment!

Leave a Comment