What Is a Zero-Day Hack? An AI-Powered Cyberattack Was in the Works—Google Thwarted a Major Attack..
In a recently published research report, Google revealed that a criminal hacking group attempted to launch a major cyberattack. The hacking group discovered a previously unknown software bug—one of which even the developers were unaware—and utilized Artificial Intelligence (AI) to achieve this feat. This hacker group was preparing to execute a large-scale cyberattack, but Google successfully thwarted their plot. This incident highlights the potential threats that AI poses to digital security.
**Preparing to Bypass Two-Factor Authentication**
Google's Threat Intelligence Group stated that they tracked the hackers, who were utilizing AI models to discover and exploit "zero-day vulnerabilities" in an attempt to bypass two-factor authentication.
**If a Cat Bites Its Owner, Here’s What It Really Means**
A report by *The New York Times* notes that security experts have long feared that hackers could use AI models to uncover hidden flaws within computer code, thereby enabling them to launch attacks. The company did not explicitly disclose when the attack occurred, who the intended target was, or which specific AI platform the hackers used; however, the company did state that they do not believe their own Gemini chatbot was utilized for this operation.
**What is a "Zero-Day Hack"?**
To explain a "zero-day attack" in simple terms: it is a cyberattack executed by exploiting a security flaw—or "vulnerability"—present in either hardware or software. The developers are typically unaware of this flaw, and hackers capitalize on this lack of knowledge to carry out their malicious schemes. A question that naturally arises is: why is it called a "zero-day" attack? The reason is that as soon as the hackers discover the vulnerability, they launch their attack immediately, leaving the developers with "zero days"—that is, absolutely no time—to fix the flaw.
Disclaimer: This content has been sourced and edited from TV9. While we have made modifications for clarity and presentation, the original content belongs to its respective authors and website. We do not claim ownership of the content.

