Google Warns AI-Powered Hackers Are Bypassing 2FA Security

Google Warns AI-Powered Hackers Are Bypassing 2FA Security

Last Updated:
Google Warns AI-Powered Hackers Are Bypassing 2FA Security
  • Google warned hackers are using AI to build advanced exploits that bypass multi-factor security.
  • State-linked cyber groups are reportedly using AI tools to automate malware and phishing attacks.
  • Google is deploying AI defense systems to detect threats and patch vulnerabilities faster.

Google has warned that hackers are now using artificial intelligence to develop advanced zero-day exploits capable of bypassing multi-factor authentication systems. The findings, released through its Threat Intelligence Group, show that attackers are already using large language models in real cyber operations affecting systems worldwide.

As per the report, the tools are helping cybercriminals find software weaknesses faster, automate parts of their attacks, and improve methods such as phishing and malware creation. As a result, attackers can now identify and exploit security gaps that were previously harder to detect.

Google also pointed to a real case where hackers bypassed two-factor authentication using a Python-based zero-day exploit. The company further linked this activity to rising state-linked cyber operations and growing misuse of AI tools in underground hacking networks.

AI Becomes a Weapon in Cyber Attacks

Google said hackers are now using artificial intelligence at almost every stage of a cyberattack. Instead of just writing phishing emails, attackers use it to collect information, develop malware, and spot weaknesses in software that older security tools often miss. This shift is also making attacks more complex and harder to detect.

The report said that groups linked to China and North Korea were among the first to use these methods. They use carefully crafted prompts to get useful security information from the system. In some cases, they also pretend to be cybersecurity experts while checking firmware and embedded devices for possible weaknesses.

Attackers are also using large collections of past security flaws to train their methods. These databases include thousands of known vulnerabilities and exploit examples. By learning from this data, systems can pick out patterns that help identify new weaknesses. 

AI-Driven Exploits and Defense Response

Google said that cybercrime groups used artificial intelligence to develop a working exploit that bypasses two-factor authentication. The attack still required valid login details, which means the flaw came from how the system was designed rather than a technical bug in the software.

Apart from hacking into the computer system, hackers also use artificial intelligence to conceal malicious actions. Hackers create fake codes, mutate payloads, and dynamic scripts to evade detection. In certain instances, AI-powered systems can send commands to compromised computers in real time.

In response, Google said it is strengthening its own AI-based defenses. Systems like Big Sleep and CodeMender now help identify vulnerabilities and automatically fix them. At the same time, safeguards built into Gemini are being used to block suspicious activity across user accounts.

Related: PayPal and Google Cloud Say Crypto Is Only Viable Payment Layer for AI Agent Economy

Disclaimer: The information presented in this article is for informational and educational purposes only. The article does not constitute financial advice or advice of any kind. Coin Edition is not responsible for any losses incurred as a result of the utilization of content, products, or services mentioned. Readers are advised to exercise caution before taking any action related to the company.