'This is the tip of the iceberg': Google experts say they have seen hackers using AI to discover and weaponize…
- GTIG spotted threat actors using AI to identify and exploit a zero-day
- The vulnerability allowed for two-factor authentication bypass
- AI is capable of 'reading' developer intent, and can 'see' how hardcoded exceptions relate to security enforcement
Threat actors are leveraging AI at a new scale, marking a shift from small-scale AI-assisted attacks to ‘industrial-scale’ attacks, including using AI to discover and exploit a zero-day - the first recorded instance of its kind.
These are the findings of the Google Threat Intelligence Group’s AI Threat Tracker which explores how threat actors leverage AI in attacks.
The zero-day was likely planned to be used in a mass-exploitation attack of a popular open source, web-based system administration tool, with the vulnerability allowing the attackers to bypass two-factor authentication (2FA).
AI used to discover zero-day
The threat actors discovered that the built-in 2FA could be bypassed via a high-level semantic logic flaw stemming from...
Copyright of this story solely belongs to techradar.com. To see the full text click HERE