{"id":382014,"date":"2026-05-12T00:01:42","date_gmt":"2026-05-11T22:01:42","guid":{"rendered":"https:\/\/prostartup.it\/div-google-says-it-likely-thwarted-effort-by-hacker-group-to-use-ai-for-mass-exploitation-event-div\/"},"modified":"2026-05-12T00:01:42","modified_gmt":"2026-05-11T22:01:42","slug":"div-google-says-it-likely-thwarted-effort-by-hacker-group-to-use-ai-for-mass-exploitation-event-div","status":"publish","type":"post","link":"https:\/\/prostartup.it\/ru\/div-google-says-it-likely-thwarted-effort-by-hacker-group-to-use-ai-for-mass-exploitation-event-div\/","title":{"rendered":"Google says it likely thwarted effort by hacker group to use AI for &#8216;mass exploitation event&#8217;"},"content":{"rendered":"<div>\n<div><img decoding=\"async\" src=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/ywAAAAAAQABAAACAUwAOw==\" fifu-lazy=\"1\" fifu-data-sizes=\"auto\" fifu-data-srcset=\"https:\/\/i0.wp.com\/image.cnbcfm.com\/api\/v1\/image\/108101915-1739436673937-gettyimages-924759658-dsc_7267.jpeg?v=1759110094&w=1920&h=1080&ssl=1&w=75&resize=75&ssl=1 75w, https:\/\/i0.wp.com\/image.cnbcfm.com\/api\/v1\/image\/108101915-1739436673937-gettyimages-924759658-dsc_7267.jpeg?v=1759110094&w=1920&h=1080&ssl=1&w=100&resize=100&ssl=1 100w, https:\/\/i0.wp.com\/image.cnbcfm.com\/api\/v1\/image\/108101915-1739436673937-gettyimages-924759658-dsc_7267.jpeg?v=1759110094&w=1920&h=1080&ssl=1&w=150&resize=150&ssl=1 150w, https:\/\/i0.wp.com\/image.cnbcfm.com\/api\/v1\/image\/108101915-1739436673937-gettyimages-924759658-dsc_7267.jpeg?v=1759110094&w=1920&h=1080&ssl=1&w=240&resize=240&ssl=1 240w, https:\/\/i0.wp.com\/image.cnbcfm.com\/api\/v1\/image\/108101915-1739436673937-gettyimages-924759658-dsc_7267.jpeg?v=1759110094&w=1920&h=1080&ssl=1&w=320&resize=320&ssl=1 320w, https:\/\/i0.wp.com\/image.cnbcfm.com\/api\/v1\/image\/108101915-1739436673937-gettyimages-924759658-dsc_7267.jpeg?v=1759110094&w=1920&h=1080&ssl=1&w=500&resize=500&ssl=1 500w, https:\/\/i0.wp.com\/image.cnbcfm.com\/api\/v1\/image\/108101915-1739436673937-gettyimages-924759658-dsc_7267.jpeg?v=1759110094&w=1920&h=1080&ssl=1&w=640&resize=640&ssl=1 640w, https:\/\/i0.wp.com\/image.cnbcfm.com\/api\/v1\/image\/108101915-1739436673937-gettyimages-924759658-dsc_7267.jpeg?v=1759110094&w=1920&h=1080&ssl=1&w=800&resize=800&ssl=1 800w, https:\/\/i0.wp.com\/image.cnbcfm.com\/api\/v1\/image\/108101915-1739436673937-gettyimages-924759658-dsc_7267.jpeg?v=1759110094&w=1920&h=1080&ssl=1&w=1024&resize=1024&ssl=1 1024w, https:\/\/i0.wp.com\/image.cnbcfm.com\/api\/v1\/image\/108101915-1739436673937-gettyimages-924759658-dsc_7267.jpeg?v=1759110094&w=1920&h=1080&ssl=1&w=1280&resize=1280&ssl=1 1280w, https:\/\/i0.wp.com\/image.cnbcfm.com\/api\/v1\/image\/108101915-1739436673937-gettyimages-924759658-dsc_7267.jpeg?v=1759110094&w=1920&h=1080&ssl=1&w=1600&resize=1600&ssl=1 1600w\" fifu-data-src=\"https:\/\/i0.wp.com\/image.cnbcfm.com\/api\/v1\/image\/108101915-1739436673937-gettyimages-924759658-dsc_7267.jpeg?v=1759110094&w=1920&h=1080&ssl=1\" class=\"ff-og-image-inserted\"><\/div>\n<p><span class=\"HighlightShare-hidden\" style=\"top:0;left:0\"><\/span><\/p>\n<div class=\"RelatedQuotes-relatedQuotes\" id=\"RegularArticle-RelatedQuotes\">\n<div class=\"RelatedQuotes-quotesContainer\">\n<div class=\"RelatedQuotes-titleAndTime undefined\">\n<p class=\"RelatedQuotes-text\">In this article<\/p>\n<\/div>\n<ul class=\"RelatedQuotes-list\">\n<li class=\"QuoteItem-item\" aria-label=\"Quote for null\"><span class=\"QuoteItem-symbol\">GOOGL<\/span><span class=\"AddToWatchlistButton-watchlistContainer\" id=\"RegularArticle-WatchlistDropdown\" data-analytics-id=\"RegularArticle-WatchlistDropdown\"><button class=\"AddToWatchlistButton-watchlistButton\" aria-label=\"Add To Watchlist\" data-testid=\"dropdown-btn\"><span class=\"AddToWatchlistButton-addWatchListFromTag\"><\/span><\/button><\/span><\/li>\n<\/ul>\n<\/div>\n<div class=\"RelatedQuotes-cfaButtonContainer\"><button id=\"ArticlePageTickerCreateAccountButton\" class=\"CreateFreeAccountButton-buttonContainer\"><span class=\"CreateFreeAccountButton-buttonText\"><span>Follow your favorite stocks<\/span><span class=\"CreateFreeAccountButton-buttonTextBold\">CREATE FREE ACCOUNT<\/span><\/span><\/button><\/div>\n<\/div>\n<div class=\"InlineImage-imageEmbed\" id=\"ArticleBody-InlineImage-108101915\" data-test=\"InlineImage\">\n<div class=\"InlineImage-wrapper\">\n<div class=\"InlineImage-imagePlaceholder\" style=\"padding-bottom:55.55555555555556%\">\n<div style=\"height:100%\" class=\"lazyload-placeholder\"><\/div>\n<\/div>\n<div>\n<div class=\"InlineImage-imageEmbedCaption\"><\/div>\n<div class=\"InlineImage-imageEmbedCredit\">Boonchai Wedmakawand | Moment | Getty Images<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"group\">\n<p><span class=\"QuoteInBody-quoteNameContainer\" data-test=\"QuoteInBody\" id=\"RegularArticle-QuoteInBody-1\">Google&#8217;s<span class=\"QuoteInBody-inlineButton\"><span class=\"AddToWatchlistButton-watchlistContainer\" id=\"-WatchlistDropdown\" data-analytics-id=\"-WatchlistDropdown\"><button class=\"AddToWatchlistButton-watchlistButton\" aria-label=\"Add To Watchlist\" data-testid=\"dropdown-btn\"><span class=\"AddToWatchlistButton-addWatchListFromTag\"><\/span><\/button><\/span><\/span><\/span> Threat Intelligence Group said in a report on Monday that it thwarted an effort by hackers to use artificial intelligence models to\u00a0&#8220;plan a mass vulnerability exploitation operation.&#8221;<\/p>\n<p>GTIG said it has &#8220;high confidence&#8221; that it recorded hackers using an AI model to find and exploit a zero-day vulnerability, or a software flaw unknown to developers, creating a way to bypass two-factor authentication. <\/p>\n<div style=\"height:100%\" class=\"lazyload-placeholder\"><\/div>\n<p>&#8220;The criminal threat actor planned to use it in a mass exploitation event but our proactive counter discovery may have prevented its use,&#8221; Google wrote in the post, without disclosing the name of the hacker group. Google said it does not believe that its homegrown Gemini model was used. <\/p>\n<p>The findings underscore how hackers are using available AI tools like OpenClaw to exploit software flaws in ways that can be particularly damaging to companies, government agencies and other organizations even as cybersecurity firms pump billions of dollars into bolstering their defenses. <\/p>\n<p>In April, Anthropic delayed the rollout of its Mythos model, citing worries that criminals and adversaries could use the tool to identify and prey on decades-old software vulnerabilities. The concerns sent shockwaves through the industry and led to White House meetings with technology and business leaders. Anthropic has since released the model to a select group of testers, including <span class=\"QuoteInBody-quoteNameContainer\" data-test=\"QuoteInBody\" id=\"RegularArticle-QuoteInBody-6\">Apple<span class=\"QuoteInBody-inlineButton\"><span class=\"AddToWatchlistButton-watchlistContainer\" id=\"-WatchlistDropdown\" data-analytics-id=\"-WatchlistDropdown\"><button class=\"AddToWatchlistButton-watchlistButton\" aria-label=\"Add To Watchlist\" data-testid=\"dropdown-btn\"><span class=\"AddToWatchlistButton-addWatchListFromTag\"><\/span><\/button><\/span><\/span><\/span>, <span class=\"QuoteInBody-quoteNameContainer\" data-test=\"QuoteInBody\" id=\"RegularArticle-QuoteInBody-7\">CrowdStrike<span class=\"QuoteInBody-inlineButton\"><span class=\"AddToWatchlistButton-watchlistContainer\" id=\"-WatchlistDropdown\" data-analytics-id=\"-WatchlistDropdown\"><button class=\"AddToWatchlistButton-watchlistButton\" aria-label=\"Add To Watchlist\" data-testid=\"dropdown-btn\"><span class=\"AddToWatchlistButton-addWatchListFromTag\"><\/span><\/button><\/span><\/span><\/span>, <span class=\"QuoteInBody-quoteNameContainer\" data-test=\"QuoteInBody\" id=\"RegularArticle-QuoteInBody-8\">Microsoft<span class=\"QuoteInBody-inlineButton\"><span class=\"AddToWatchlistButton-watchlistContainer\" id=\"-WatchlistDropdown\" data-analytics-id=\"-WatchlistDropdown\"><button class=\"AddToWatchlistButton-watchlistButton\" aria-label=\"Add To Watchlist\" data-testid=\"dropdown-btn\"><span class=\"AddToWatchlistButton-addWatchListFromTag\"><\/span><\/button><\/span><\/span><\/span> and <span class=\"QuoteInBody-quoteNameContainer\" data-test=\"QuoteInBody\" id=\"RegularArticle-QuoteInBody-9\">Palo Alto Networks<span class=\"QuoteInBody-inlineButton\"><span class=\"AddToWatchlistButton-watchlistContainer\" id=\"-WatchlistDropdown\" data-analytics-id=\"-WatchlistDropdown\"><button class=\"AddToWatchlistButton-watchlistButton\" aria-label=\"Add To Watchlist\" data-testid=\"dropdown-btn\"><span class=\"AddToWatchlistButton-addWatchListFromTag\"><\/span><\/button><\/span><\/span><\/span>.<\/p>\n<p>Last week, OpenAI\u00a0announced\u00a0that GPT-5.5-Cyber, a variation of its latest\u00a0model, is rolling out in a limited preview capacity to vetted cybersecurity teams.<\/p>\n<p>In Monday&#8217;s report, Google highlighted several examples of how hackers are already using tools such as OpenClaw to find vulnerabilities, launch cyberattacks and develop malware. Groups linked to China and North Korea &#8220;demonstrated significant interest in capitalizing on AI for vulnerability discovery,&#8221; the report said.<\/p>\n<p><strong>WATCH:<\/strong> Era of AI-enabled cyberattack orchestration arrives<\/p>\n<\/div>\n<div role=\"region\" aria-labelledby=\"Placeholder-ArticleBody-Video-108304518\"><\/div>\n<div id=\"ArticleBody-MobileAdhesion\" class=\"MobileAdhesion-container\" data-module=\"mps-slot\"><\/div>\n<div class=\"ArticleBody-googlePreferredSourceContainer\" data-module=\"GooglePreferredSource\" data-id=\"RegularArticle-GooglePreferredSource-5\">\n<div class=\"ArticleBody-googlePreferredSourceBorder\"><\/div>\n<p>Choose CNBC as your preferred source on Google and never miss a moment from the most trusted name in business news.<\/p><\/div>\n<hr \/>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>In this article GOOGL Follow your favorite stocksCREATE FREE ACCOUNT Boonchai Wedmakawand | Moment | Getty Images Google&#8217;s Threat Intelligence Group said in a report<\/p>","protected":false},"author":1,"featured_media":382015,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/image.cnbcfm.com\/api\/v1\/image\/108101915-1739436673937-gettyimages-924759658-dsc_7267.jpeg","fifu_image_alt":"<div>Google says it likely thwarted effort by hacker group to use AI for 'mass exploitation event'<\/div>","footnotes":""},"categories":[11],"tags":[18,1551,247,2704,886,346,2239,792],"class_list":["post-382014","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-inv-business","tag-ai","tag-event","tag-google","tag-group","tag-likely","tag-says","tag-thwarted","tag-use"],"_links":{"self":[{"href":"https:\/\/prostartup.it\/ru\/wp-json\/wp\/v2\/posts\/382014","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/prostartup.it\/ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/prostartup.it\/ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/prostartup.it\/ru\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/prostartup.it\/ru\/wp-json\/wp\/v2\/comments?post=382014"}],"version-history":[{"count":0,"href":"https:\/\/prostartup.it\/ru\/wp-json\/wp\/v2\/posts\/382014\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/prostartup.it\/ru\/wp-json\/wp\/v2\/media\/382015"}],"wp:attachment":[{"href":"https:\/\/prostartup.it\/ru\/wp-json\/wp\/v2\/media?parent=382014"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/prostartup.it\/ru\/wp-json\/wp\/v2\/categories?post=382014"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/prostartup.it\/ru\/wp-json\/wp\/v2\/tags?post=382014"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}