Answer Brief
Google's Threat Intelligence Group (GTIG) has reported the first observed instances of hackers using AI to discover zero-day vulnerabilities and generate exploit tools for large-scale attacks. The activity involved several notorious hacking groups collaborating to bypass two-factor authentication (2FA) in open-source network management tools.

Executive Summary: Google's Threat Intelligence Group (GTIG) has reported the first observed instances of hackers using AI to discover zero-day vulnerabilities and generate exploit tools for large-scale attacks. The activity involved several notorious hacking groups collaborating to bypass two-factor authentication (2FA) in open-source network management tools.
Why It Matters
The intersection of AI and offensive cybersecurity has reached a critical milestone with Google's confirmation of AI-driven zero-day discovery. This shift indicates that threat actors are moving beyond simple phishing automation toward sophisticated vulnerability research and exploit generation, specifically targeting foundational network management infrastructure. The collaboration between different hacking groups to weaponize AI-generated Python scripts for 2FA bypass marks a significant escalation in threat capabilities. Simultaneously, the 'Mini Shai-Hulud' supply chain attack demonstrates the failure of traditional trust frameworks like SLSA Level 3 to prevent the distribution of malicious NPM packages. For global security teams, the signal from East Asia and international reports highlights a dual-front risk: the weaponization of AI by adversaries and the exposure of 'Vibe Coding'—AI-generated applications—which often lack basic authentication. Defensive strategies are pivoting toward AI-native protection, as seen with OpenAI's 'Daybreak' and the integration of Post-Quantum Cryptography (PQC) by Cloudflare and Red Hat to preempt future decryption risks.
Event Type: security
Importance: high
Affected Companies
- Checkmarx
- Cloudflare
- OpenAI
- Red Hat
- SailPoint
- Skoda
Affected Sectors
- Artificial Intelligence
- Automotive
- Cloud Infrastructure
- Cybersecurity
- Software Supply Chain
Key Numbers
- Impacted Organizations in VENOMOUS#HELPER Campaign: 80+
- Vulnerable Vibe Coding Apps Exposed: 5,000
- Redis Critical Vulnerabilities Disclosed: 5
- CVSS Severity Score for LiteLLM SQLi: 7.7
Timeline
- Earliest recorded activity of the Mr_Rot13 threat group targeting cPanel systems.
- Start of VENOMOUS#HELPER phishing campaign using modified RMM tools.
- Unauthorized access detected in SailPoint's GitHub repositories.
- Exploitation of CVE-2026-41940 observed distributing Filemanager RAT.
- Checkmarx reports supply chain compromise of Jenkins AST plugin.
- Apple and Google announce E2EE support for cross-platform RCS messaging in iOS 26.5.
- Google GTIG reveals AI-powered zero-day exploitation; OpenAI launches Daybreak defense solution.