Google’s Threat Intelligence Group (GTIG) has published a major security report warning that artificial intelligence is now being weaponized by state-linked hackersGoogle’s Threat Intelligence Group (GTIG) has published a major security report warning that artificial intelligence is now being weaponized by state-linked hackers

Hackers Targeting Your Crypto Just Got An AI Upgrade — Google’s Report Is A Wake-Up Call

2026/05/12 17:03
3분 읽기
이 콘텐츠에 대한 의견이나 우려 사항이 있으시면 [email protected]으로 연락주시기 바랍니다

Google’s Threat Intelligence Group (GTIG) has published a major security report warning that artificial intelligence is now being weaponized by state-linked hackers and criminal threat actors at industrial scale — with autonomous malware, AI-generated zero-day exploits, and credential-targeting operations posing a direct and escalating threat to crypto users relying on standard security measures.

The May 11 report, published on the Google Cloud blog by GTIG and drawing on Mandiant incident response engagements, marks a significant escalation from the group’s February 2026 findings. Where that earlier report identified AI-assisted adversarial activity as nascent and experimental, the latest assessment describes a mature transition — one where generative models are now embedded in offensive workflows at scale, not as a curiosity but as operational infrastructure.

AI Writes Its First Zero-Day Exploit

The most significant disclosure in the report is unprecedented. For the first time, GTIG has identified a threat actor using a zero-day exploit believed to have been developed with AI assistance. According to the report, a criminal threat actor had planned to deploy the exploit in a mass exploitation event — a scenario that GTIG’s proactive counter-discovery may have prevented.

The report notes that state-linked actors associated with China and North Korea have separately demonstrated significant interest in using AI for vulnerability discovery. The implications for crypto users are direct: wallet interfaces, exchange login portals, and browser extension-based authentication tools all depend on the same underlying software layers that zero-day exploits target.

Polymorphic Malware And The Limits Of 2FA For Crypto Users

Beyond zero-day development, the report documents AI-accelerated development of polymorphic malware — code that rewrites its own structure to evade detection — linked to suspected Russia-nexus threat actors, per GTIG’s analysis. AI-generated decoy logic is being embedded in malware payloads to defeat signature-based security systems.

The most direct threat to crypto users, however, comes through a capability GTIG calls PROMPTSPY — an AI-enabled malware that signals a shift toward autonomous attack orchestration. According to the report, PROMPTSPY interprets system states dynamically and generates commands in real time to manipulate victim environments. Applied to credential theft, this class of malware can observe and respond to authentication flows in ways that static attack tools cannot — including timing attacks against SMS-based and app-based two-factor authentication systems during live sessions.

Standard 2FA, long considered a reliable security baseline for exchange and wallet access, operates on the assumption that an attacker cannot observe and respond to the authentication window in real time. Autonomous, AI-driven malware capable of interpreting system states changes that assumption materially.

A Threat Environment That Has Shifted

GTIG’s report frames the current moment as a dual-use inflection point — AI is simultaneously becoming a high-value target for attacks and a sophisticated engine driving them. For participants in the nascent digital asset sector, where a single compromised seed phrase or session token represents an irreversible loss, the implications are substantial.

The security practices that adequately protected crypto users two years ago are increasingly insufficient against an adversarial toolkit that now includes AI-generated exploits, self-modifying malware, and autonomous credential-harvesting operations operating faster than human defenders can respond.

Hardware security keys, air-gapped signing devices, and multi-signature wallet architectures represent the current frontier of meaningful protection — and the distance between those measures and standard 2FA has never been wider.

Cover image from Grok, ETHUSD chart from Tradingview

시장 기회
Gensyn 로고
Gensyn 가격(AI)
$0.03507
$0.03507$0.03507
+0.51%
USD
Gensyn (AI) 실시간 가격 차트
면책 조항: 본 사이트에 재게시된 글들은 공개 플랫폼에서 가져온 것으로 정보 제공 목적으로만 제공됩니다. 이는 반드시 MEXC의 견해를 반영하는 것은 아닙니다. 모든 권리는 원저자에게 있습니다. 제3자의 권리를 침해하는 콘텐츠가 있다고 판단될 경우, [email protected]으로 연락하여 삭제 요청을 해주시기 바랍니다. MEXC는 콘텐츠의 정확성, 완전성 또는 시의적절성에 대해 어떠한 보증도 하지 않으며, 제공된 정보에 기반하여 취해진 어떠한 조치에 대해서도 책임을 지지 않습니다. 본 콘텐츠는 금융, 법률 또는 기타 전문적인 조언을 구성하지 않으며, MEXC의 추천이나 보증으로 간주되어서는 안 됩니다.

No Chart Skills? Still Profit

No Chart Skills? Still ProfitNo Chart Skills? Still Profit

Copy top traders in 3s with auto trading!