Google says hackers used AI to craft a zero-day 2FA bypass, raising new risks for crypto wallets, AI agents, and global security teams now.Google says hackers used AI to craft a zero-day 2FA bypass, raising new risks for crypto wallets, AI agents, and global security teams now.

Google flags first AI-assisted zero-day attack targeting 2FA

2026/05/12 13:30
3분 읽기
이 콘텐츠에 대한 의견이나 우려 사항이 있으시면 [email protected]으로 연락주시기 바랍니다

Google’s Threat Intelligence Group said it found a zero-day exploit that likely used artificial intelligence during discovery and weaponization. 

Summary
  • Google’s report links AI to a zero-day 2FA bypass targeting a popular admin tool today.
  • The exploit needed valid credentials first, but removed the second authentication barrier for attackers later.
  • Crypto users face added risk as AI agents, wallets, and connectors attract phishing attempts online.

The exploit targeted a popular open-source, web-based system administration tool and allowed attackers to bypass two-factor authentication after gaining valid login details.

The group said it worked with the affected vendor to disclose the flaw and stop the planned mass exploitation campaign. Google did not name the tool, the vendor, or the threat actor behind the operation.

Exploit needed valid credentials first

The flaw did not give attackers full access on its own. Google said the bypass required valid user credentials before the attacker could skip the second login step. That detail matters because two-factor authentication often protects crypto accounts, exchange logins, developer dashboards, and wallet-linked services.

Google said the weakness came from a logic error, not a common coding bug such as memory corruption or poor input handling. The company described it as a high-level semantic flaw, where a hardcoded trust assumption conflicted with the tool’s 2FA checks.

Moreover, Google said it had “high confidence” that the actor likely used an AI model to support discovery and weaponization of the vulnerability. The company said the exploit script included educational comments, a hallucinated CVSS score, and a clean Python format often linked to large language model output.

The company also said it does not believe Gemini was used in the operation. Its report noted that China and North Korea-linked actors have shown interest in AI-assisted vulnerability research, including prompt-based security testing and large-scale analysis of known flaws.

Crypto security risks widen

The warning adds to rising concern over AI tools in crypto security. Separate reports have tracked OpenClaw-related phishing, where attackers used cloned websites and malicious wallet prompts to target developers and drain crypto wallets.

Other security coverage has also warned that AI agents can create new weak points when they process outside content, connect to third-party tools, or act without enough human approval. Those risks are more serious when agents can access wallets, private files, browser data, or account credentials.

Google said threat actors are also testing AI for malware support, defense evasion, information operations, and access to AI systems. It named malware families such as PROMPTFLUX, HONESTCUE, and CANFAIL as examples of tools using LLMs for obfuscation or decoy code.

시장 기회
Gensyn 로고
Gensyn 가격(AI)
$0.03527
$0.03527$0.03527
+1.08%
USD
Gensyn (AI) 실시간 가격 차트
면책 조항: 본 사이트에 재게시된 글들은 공개 플랫폼에서 가져온 것으로 정보 제공 목적으로만 제공됩니다. 이는 반드시 MEXC의 견해를 반영하는 것은 아닙니다. 모든 권리는 원저자에게 있습니다. 제3자의 권리를 침해하는 콘텐츠가 있다고 판단될 경우, [email protected]으로 연락하여 삭제 요청을 해주시기 바랍니다. MEXC는 콘텐츠의 정확성, 완전성 또는 시의적절성에 대해 어떠한 보증도 하지 않으며, 제공된 정보에 기반하여 취해진 어떠한 조치에 대해서도 책임을 지지 않습니다. 본 콘텐츠는 금융, 법률 또는 기타 전문적인 조언을 구성하지 않으며, MEXC의 추천이나 보증으로 간주되어서는 안 됩니다.

No Chart Skills? Still Profit

No Chart Skills? Still ProfitNo Chart Skills? Still Profit

Copy top traders in 3s with auto trading!