Google Reports AI-Powered Hacking Reached Industrial Scale in 3 Months

✍️ OpenClawRadar📅 Published: May 11, 2026🔗 Source
Google Reports AI-Powered Hacking Reached Industrial Scale in 3 Months
Ad

Google's threat intelligence group released a report detailing that AI-powered hacking has exploded to industrial-scale in just three months. John Hultquist, the group's chief analyst, said: “There’s a misconception that the AI vulnerability race is imminent. The reality is that it’s already begun.”

Criminal groups and state-linked actors from China, North Korea, and Russia are widely using commercial models—including Gemini, Claude, and OpenAI tools—to refine and scale up attacks. The report highlights that AI enables threat actors to test operations, persist against targets, build better malware, and boost speed, scale, and sophistication.

Notably, a criminal group was recently on the verge of leveraging a zero-day vulnerability to conduct a mass exploitation campaign and appeared to be using an AI LLM that was not Anthropic's Mythos (which Anthropic declined to release after it found zero-days in every major OS and browser). The report also found groups are experimenting with OpenClaw, an AI agent tool that went viral in February for offering unguarded autonomy—including mass-deleting email inboxes.

Ad

Steven Murdoch, professor of security engineering at University College London, commented: “That’s why I’m not panicking. In general we have reached a stage where the old way of discovering bugs is gone, and it will now all be LLM-assisted.”

Separately, the Ada Lovelace Institute cautioned that productivity estimates driving government AI investments often rest on untested assumptions and may not translate to real-world outcomes like better services or worker well-being.

📖 Read the full source: HN AI Agents

Ad

👀 See Also

Supply-chain attack uses invisible Unicode code to bypass detection
Security

Supply-chain attack uses invisible Unicode code to bypass detection

Researchers discovered 151 malicious packages uploaded to GitHub from March 3-9 using invisible Unicode characters to hide malicious code. The attack targets GitHub, NPM, and Open VSX repositories with packages that appear legitimate but contain hidden payloads.

OpenClawRadar
Security probe results for OpenClaw, PicoClaw, ZeroClaw, IronClaw, and Minion AI agents
Security

Security probe results for OpenClaw, PicoClaw, ZeroClaw, IronClaw, and Minion AI agents

A security evaluation of five AI coding agents tested 145 attack payloads across 12 categories including prompt injection, jailbreaking, and data exfiltration. OpenClaw scored 77.8/100 with critical SQL injection vulnerabilities, while Minion improved from 81.2 to 94.4/100 after fixes.

OpenClawRadar
🦀
Security

AI Agent Security: Token Budget Determines Data Exfiltration Risk

A developer tested AI agents connected to Gmail: frontier models caught phishing, mid-tier was unstable, cheap models silently forwarded malicious emails. Architectural protections (sandboxing, permissions) stopped zero attempts.

OpenClawRadar
Claude Android App Reportedly Reads Clipboard Without Explicit User Action
Security

Claude Android App Reportedly Reads Clipboard Without Explicit User Action

A user reports that the Claude Android app analyzed code from their clipboard without them pasting it, with Claude identifying the file as pasted_text_b4a56202-3d12-43c8-aa31-a39367a9a354.txt. The behavior couldn't be reproduced in subsequent tests.

OpenClawRadar