Google stops advanced AI attack designed to bypass two-factor authentication, here is how

HIGHLIGHTS

Google has revealed that it detected and stopped a cyberattack that appears to have been developed with the help of AI.

According to a report by Google Threat Intelligence Group (GTIG), cybercriminals were preparing to use a dangerous zero-day exploit.

Hackers are also using techniques like 'persona-driven jailbreaking.'

Google stops advanced AI attack designed to bypass two-factor authentication, here is how

Google has revealed that it detected and stopped a cyberattack that appears to have been developed with the help of AI. According to a report by Google Threat Intelligence Group (GTIG), cybercriminals were preparing to use a dangerous zero-day exploit to bypass two-factor authentication (2FA) on an unnamed open-source web-based system administration tool. ‘The criminal threat actor planned to use it in a mass exploitation event but our proactive counter discovery may have prevented its use,’ the tech giant said.

Digit.in Survey
✅ Thank you for completing the survey!

Google’s researchers found several signs that suggest that AI helped create the attack script. One of the biggest clues was a ‘hallucinated CVSS score’ inside the Python code. The researchers also noticed that the Python script had ‘structured, textbook’ formatting ‘highly characteristic of LLMs training data,’ as per the report. Google also clarified that it ‘do not believe Gemini was used.’

Also read: Apple brings encrypted RCS messaging to iPhones with iOS 26.5 

Google CEO Sundar Pichai

The exploit reportedly targeted a weakness in the platform’s 2FA system. According to the report, the vulnerability involved ‘a high-level semantic logic flaw where the developer hardcoded a trust assumption’ into the authentication process.

Google says it was able to successfully ‘disrupt’ the attack. Still, the company warned that hackers are increasingly using AI tools to discover and exploit software vulnerabilities faster than before.

Also read: OpenAI brings Daybreak to rival Claude Mythos: Here is what it can do 

‘GTIG has observed adversaries increasingly target the integrated components that grant AI systems their utility, such as autonomous skills and third-party data connectors,’ the report mentioned.

Hackers are also using techniques like ‘persona-driven jailbreaking,’ where AI models are tricked into behaving like cybersecurity experts to help identify weaknesses. Google added that some attackers are feeding entire vulnerability databases into AI models and using tools like OpenClaw to improve the reliability of AI-generated cyberattacks.

Also read: Singer Dua Lipa sues Samsung for USD 15 mn over alleged use of her image: Here is what happened  

Ayushi Jain

Ayushi Jain

Ayushi works as Chief Copy Editor at Digit, covering everything from breaking tech news to in-depth smartphone reviews. Prior to Digit, she was part of the editorial team at IANS. View Full Profile