Tech Product Reviews, How To, Best Ofs, deals and Advice
Google says hackers are abusing Gemini to speed up cyberattacks, and it isn’t limited to cheesy phishing spam. In a new Google Threat Intelligence Group report, it says state-backed groups have used Gemini across multiple phases of an operation, from early target research to post-compromise work.
The activity spans clusters linked to China, Iran, North Korea, and Russia. Google says the prompts and outputs it observed covered profiling, social engineering copy, translation, coding help, vulnerability testing, and debugging when tools break during an intrusion. Fast help on routine tasks can still change the outcome. AI help, same old playbook Google’s researchers frame the use of AI as acceleration, not magic. Attackers already run recon, draft lures, tweak malware, and chase down errors. Gemini can tighten that loop, especially when operators need quick rewrites, language support, or code fixes under pressure. Recommended Videos The report describes Chinese-linked activity where an operator adopted an expert cybersecurity persona and pushed Gemini to automate vulnerability analysis and produce targeted test plans in a made-up scenario. Google also says a China-based actor repeatedly used Gemini for debugging, research, and technical guidance tied to intrusions. It’s less about new tactics, more about fewer speed bumps. The risk isn’t just phishing The big shift is tempo. If groups can iterate faster on targeting and tooling, defenders get less time between early signals and real damage. That also means fewer obvious pauses where mistakes, delays, or repeated manual work might surface in logs. Google also flags a different threat that doesn’t look like classic scams at all, model extraction and knowledge distillation. In that scenario, actors with authorized API access hammer the system with prompts to replicate how it performs and reasons, then use that knowledge to train another model. Google frames it as commercial and intellectual property harm, with potential downstream risk if it scales, including one example involving 100,000 prompts aimed at replicating behavior in non-English tasks. What you should watch next Google says it has disabled accounts and infrastructure tied to documented Gemini abuse, and it has added targeted defenses in Gemini’s classifiers. It also says it continues testing and relies on safety guardrails. For security teams, the practical takeaway is to assume AI-assisted attacks will move quicker, not necessarily smarter. Track sudden improvements in lure quality, faster tooling iteration, and unusual API usage patterns, then tighten response runbooks so speed doesn’t become the attacker’s biggest advantage.
Ai APT Cybersecurity Gemini Google Hacking Malware Model Extraction Phishing Threat Intelligence
United States Latest News, United States Headlines
Similar News:You can also read news stories similar to this one that we have collected from other news sources.
Texas Tech HC Announces Chase Adams, Freddie Johnson as Texas Tech Scouting DirectorsTexas Tech football head coach Joey McGuire announced the addition of Chase Adams and Freddie Johnson.
Read more »
Google pushes AI shopping features in search and Gemini chatbotGoogle is adding a way for consumers to buy things while seeking artificial intelligence-powered answers on search and in its Gemini chatbot, part of a plan to make money more directly from consume…
Read more »
Ethereum developers suggest using ZK tech to anonymize AI useThe most recent news about crypto industry at Cointelegraph. Latest news about bitcoin, ethereum, blockchain, mining, cryptocurrency prices and more
Read more »
Google: Gemini hit with 100,000+ prompts in cloning attemptKevin Collier is a reporter covering cybersecurity, privacy and technology policy for NBC News.
Read more »
Google says attackers used 100,000+ prompts to try to clone AI chatbot GeminiGoogle says private companies and researchers are trying to copy Gemini’s capabilities by repeatedly prompting it at scale.
Read more »
5 New Cars That Are Locking Major Features Behind Premium SubscriptionsAs a tech enthusiast, Alvin started a personal tech blog in 2018 and began his professional writing career a year later, in 2019, when he worked as a contributor for Kenyan-based TechTrendsKE and Tech Arena, writing news, features, how-to guides, and reviews in the consumer tech space.
Read more »
