Google recently released a report stating that its security research team has found for the first time that hackers have used artificial intelligence technology to develop an attack tool capable of bypassing widely used computer management software. This discovery has sparked widespread attention to new cyber security threats.

According to the report, the tool created by a cybercrime group can exploit a "zero-day" vulnerability. A "zero-day" vulnerability refers to a defect that developers have not yet discovered, meaning that the defenders have no time to fix it before the vulnerability is exploited. Google stated that they are "highly confident" that hackers used artificial intelligence technology to discover and weaponize this vulnerability.

After Google alerted the developers of the tool, the attack plan was foiled. Although Google did not reveal the name of the cybercrime group involved, the specific affected software, or the large language model used, they said that researchers believe the vulnerability was not generated by Anthropic PBC's Mythos or Google's own Gemini model.

The report mentioned that although Google did not provide the exact time of the discovery of the vulnerability, they referred to it as a "recent" event, emphasizing the new role that artificial intelligence may play in cyber attacks. With technological advancements, hackers' ability to use AI for attacks has significantly increased, making the cybersecurity landscape more complex and requiring software developers and security teams to strengthen their protective measures to address potential threats.

In today's online environment, businesses and individual users need to remain vigilant and take necessary security measures to protect their systems from such attacks. Google's discovery is undoubtedly a warning, reminding us that while we enjoy the convenience brought by technological progress, we must also be aware of potential security risks.

Key Points:

🌐 Google has found for the first time that hackers used an AI-developed attack tool that can bypass management software's defense mechanisms.  

⚠️ The attack used a "zero-day" vulnerability, which has not yet been discovered by the developer.  

🔍 Google is highly confident that artificial intelligence played a key role in this attack, reminding everyone to pay attention to cybersecurity risks.