Google Threat Intelligence Group Reports First AI-Developed Zero-Day Exploit Bypassing 2FA
The Google Threat Intelligence Group (GTIG) has published a report detailing a concerning trend: attackers are now using AI across almost every area of cybercrime, including developing at least one zero-day exploit from scratch. The exploit in question is a Python script that bypasses two-factor authentication (2FA) in a popular open-source, web-based system administration tool. According to GTIG, the code shows 'all the hallmarks of AI usage' and abuses a logic flaw in the authorization flow.
GTIG notes that while current LLMs still 'struggle to navigate complex enterprise logic,' they excel at contextual reasoning. This capability allows them to read source code, validate developer intent versus actual implementation, and quickly identify unconsidered corner cases that lead to vulnerabilities.
The report also highlights other malicious AI applications:
- Self-morphing malware: Malware that can modify its own source code, create exploit payloads dynamically, and even generate decoy code to evade detection.
- Gemini-powered backdoors: Attackers are leveraging Google's Gemini model to create backdoors, though specific implementation details are not yet disclosed.
The findings suggest a new era of cybercrime where AI automates not just exploit delivery but the discovery and creation of vulnerabilities themselves. The zero-day exploit is particularly notable as it marks the first recorded instance of a fully AI-developed exploit bypassing 2FA.
For security teams, this underscores the need to assume that 2FA alone is insufficient against AI-augmented adversaries. Logic flaws in authentication flows, especially in open-source tools, will be increasingly targeted. Code review processes should incorporate automated reasoning checks to catch such flaws before deployment.
📖 Read the full source: HN AI Agents
👀 See Also

Security Alert for Local OpenClaw Instances Without Sandboxing
A Reddit post warns that running vanilla OpenClaw instances locally without proper isolation can lead to exposed API keys, accidental file deletion, and data leaks. The source recommends sandboxing bash tools or using a managed service.

Threat data from 91K AI agent interactions: Tool abuse up 6.4%, new multimodal attacks
Analysis of 91,284 AI agent interactions from February 2026 shows tool/command abuse increased 6.4% to 14.5%, with tool chain escalation as the dominant pattern. RAG poisoning shifted to metadata attacks (12.0%), and multimodal injection via images/PDFs emerged at 2.3%.

AI Agent Security: Beyond Jailbreaks to Tool Misuse and Prompt Injection
AI agents that browse the web, execute commands, and trigger workflows face security risks from prompt injection and tool misuse, where untrusted content redirects legitimate tools like shell execution and HTTP requests.

AgentSeal Security Scan Finds AI Agent Risks in Blender MCP Server
AgentSeal scanned the Blender MCP server (17k stars) and identified several security issues relevant to AI agents, including arbitrary Python execution, potential file exfiltration chains, and prompt injection patterns in tool descriptions.