Google Reveals State-Sponsored Hackers' Attempts to Exploit Gemini AI

9 Sources

Share

Google's Threat Intelligence Group reports on how state-sponsored hackers from various countries are experimenting with Gemini AI to enhance their cyberattacks, but have not yet developed novel capabilities.

News article

Google Reveals State-Sponsored Hackers' Use of Gemini AI

Google's Threat Intelligence Group (GTIG) has released a comprehensive report detailing how state-sponsored hackers are experimenting with the company's AI assistant, Gemini, to enhance their cyberattacks. The report highlights that while these threat actors are finding productivity gains, they have not yet developed novel capabilities using AI

1

.

Scope of Misuse

Over 57 distinct threat actors from more than 20 countries, primarily from China, Iran, North Korea, and Russia, have been observed using Gemini for various purposes

5

. These state-sponsored groups are utilizing the AI tool to:

  1. Conduct reconnaissance on potential targets
  2. Research publicly known vulnerabilities
  3. Assist with coding and scripting tasks
  4. Develop tools and payloads
  5. Plan post-compromise activities

Country-Specific Activities

Different countries have shown varying patterns of Gemini usage:

  • Iran: Focused on crafting phishing campaigns, conducting reconnaissance on defense experts and organizations, and generating cybersecurity content

    5

    .
  • China: Primarily used for troubleshooting code, scripting, and development, as well as researching methods to gain deeper access to target networks

    3

    .
  • North Korea: Utilized Gemini across various attack lifecycle phases, from research to development. They also explored topics of strategic interest, such as the South Korean military and cryptocurrency

    3

    .
  • Russia: Limited use, mainly for converting publicly available malware and adding encryption layers to existing code

    5

    .

Attempted Jailbreaks and Security Measures

Google reported unsuccessful attempts by threat actors to jailbreak Gemini using publicly available prompts and basic measures like rephrasing or repeatedly sending the same prompt

3

. The company emphasized that these attempts were unsuccessful, with Gemini providing safety-filtered responses

1

.

Impact on Cybersecurity Landscape

While AI tools like Gemini are being misused, experts suggest that they have not yet become game-changers for threat actors. Kent Walker, president of global affairs at Alphabet (Google), stated, "In other words, the defenders are still ahead, for now"

1

.

However, cybersecurity professionals warn that the use of AI in crafting phishing emails and other attacks has made traditional detection methods less effective

4

.

Future Concerns and Mitigation Strategies

As AI capabilities continue to evolve, there are growing concerns about potential threats:

  1. Direct exploitation of AI agents, which Google highlighted as a significant risk

    1

    .
  2. The need for adaptive, real-time security measures to protect AI-driven systems

    1

    .
  3. Risks to data confidentiality within AI agent systems

    1

    .

To address these challenges, researchers and companies are exploring various defense mechanisms, including sandboxing techniques and training LLMs to follow only original prompt instructions

1

.

Google emphasizes the need for heightened public-private collaboration to strengthen cyber defenses and disrupt threats, stating, "American industry and government need to work together to support our national and economic security"

5

.

TheOutpost.ai

Your Daily Dose of Curated AI News

Don’t drown in AI news. We cut through the noise - filtering, ranking and summarizing the most important AI news, breakthroughs and research daily. Spend less time searching for the latest in AI and get straight to action.

© 2025 Triveous Technologies Private Limited
Instagram logo
LinkedIn logo