Google claims that hackers use Gemini AI to launch problems.

In order to increase productivity and to do research on potential facilities for attacks or reconnaissance on targets, several state-sponsored organizations are experimenting with the AI-powered Gemini associate from Google.

Google’s Threat Intelligence Group&nbsp, ( GTIG ) detected government-linked advanced persistent threat ( APT ) groups using Gemini&nbsp, primarily for productivity gains rather than to develop or conduct novel AI-enabled cyberattacks that can bypass traditional defenses.

Concern actors have been attempting to use AI tools for their attacks with varying degrees of success, with the goal being that these tools can at least reduce the amount of time needed to prepare.

Google has identified Gemini action linked to APT organizations from more than 20 nations, with Iran and China being the most well-known of them.

Among the most common cases were assistance with coding tasks for developing tools and scripts, research on publicly disclosed vulnerabilities, checking on technologies ( explanations, translation ), finding details on target organizations, and searching for methods to evade detection, escalate privileges, or run internal reconnaissance in a compromised network.

APTs using Gemini

Google says APTs from Iran, China, North Korea, and Russia, have all experimented with Gemini, exploring the product’s potential in helping them learn protection spaces, escape detection, and plan their post-compromise activities. These are summarized as follows:

    Egyptian threat actors were the heaviest users of Gemini, leveraging it for a wide range of activities, including surveillance on defence organizations and international experts, research into publicly known vulnerabilities, growth of phishing campaigns, and content generation for influence operations. Unmanned aerial vehicles ( UAVs ) and missile defense systems were also used by them for translation and technical explanations related to cybersecurity and military technologies.

  • China-backed threat actors primarily utilized Gemini for reconnaissance on U. S. military and government organizations, vulnerability research, scripting for lateral movement and privilege escalation, and post-compromise activities such as evading detection and maintaining persistence in networks. Additionally, they looked into using password hashes and reverse-engineer security tools like Carbon Black EDR to gain access to Microsoft Exchange.
  • North Korean APTs used Gemini to support multiple phases of the attack lifecycle, including researching free hosting providers, conducting reconnaissance on target organizations, and assisting with malware development and evasion techniques. A significant portion of their activity focused on North Korea’s clandestine IT worker scheme, using Gemini to draft job applications, cover letters, and proposals to secure employment at Western companies under false identities.
  • Russian threat actors had minimal engagement with Gemini, most usage being focused on scripting assistance, translation, and payload crafting. Their tasks included rewriting publicly accessible malware into various programming languages, adding encryption to malicious code, and learning how particular pieces of public malware function. The limited use might indicate that Russian actors favor Russian AI models developed there or are avoiding Western AI platforms for operational security reasons.

Google also mentions having seen instances where threat actors aimed to hack into Gemini using public jailbreaks or changing their prompts to circumvent the platform’s security measures. These attempts were reportedly unsuccessful.

Google’s most recent report confirms the widespread misuse of generative AI tools by threat actors of all levels, following OpenAI’s release of a in October 2024.

Although the majority of AI products have security breaches and jailbreaks, the AI market is gradually flooded with AI models without adequate protections to prevent abuse. Unfortunately, some of them with restrictions that are trivial to bypass are also enjoying increased popularity.

The firm KELA, a provider of cybersecurity intelligence, recently revealed the details of the lax security measures in place for , , and Qwen 2 and are vulnerable to prompt injection attacks that could stifle malicious use.

Researchers at Unit 42 also demonstrated effective jailbreaking methods , demonstrating that the models are susceptible to being abused for nefarious purposes.

DNS checker

Leave a Comment