SecurityState Spies Exploit Google Gemini AI, With Iran Leading the Charge

State Spies Exploit Google Gemini AI, With Iran Leading the Charge

Google has identified state-sponsored hackers from Iran, China, Russia, and North Korea using its Gemini AI for espionage, although its safeguards have blocked malware generation.

Key Points at a Glance:
  • Google reports Iranian, Chinese, Russian, and North Korean operatives leveraging Gemini AI for various intelligence activities.
  • Iranian actors accounted for 75% of all observed misuse, with APT42 notably crafting phishing content.
  • North Korea’s hackers used Gemini for job applications to infiltrate Western IT firms.
  • Google states its AI models blocked attempts to generate malware or exploit its services.
  • Concerns grow over AI’s role in cyber operations and the need for stricter regulations.

Google has revealed that state-backed hackers from Iran, China, Russia, and North Korea have been using its Gemini AI for intelligence gathering, with Iran being the most frequent user among them. According to Google’s Threat Intelligence Group (TIG), these actors have attempted to manipulate the AI for activities such as crafting phishing lures, researching vulnerabilities, and developing cyber strategies. However, Google asserts that its security measures have successfully blocked attempts to generate malware or execute direct cyberattacks.

Iranian cyber groups were identified as the most aggressive users of Gemini, accounting for 75% of all observed activity among these four nations. Google’s report highlights that at least ten Iran-backed hacking groups, including APT42, used the AI for reconnaissance, Android-related security research, and phishing content development. APT42 alone contributed to 30% of Iranian-linked AI activity, primarily using Gemini to create highly tailored social engineering campaigns.

Chinese state-sponsored hackers were also caught leveraging Gemini AI for intelligence gathering, particularly in researching U.S. government institutions and Microsoft-related systems. Google identified 20 Chinese cyber groups using the AI model, often focusing on content creation and translation for espionage purposes. While China remains an active user of AI for cyber operations, it is unclear whether it relies on domestic LLMs alongside Gemini.

North Korean cyber operatives, known for their cyber heists and espionage, used Gemini AI in a different manner—crafting job applications for IT professionals. This aligns with North Korea’s ongoing efforts to insert its operatives into Western companies for intelligence and financial exploitation. Additionally, Google reports that North Korean actors sought information on freelancer forums, South Korean military research, and nuclear technology.

Russian cyber groups were noted as relatively low users of Gemini AI, with only three identified operations. Google speculates that Russian hackers may be relying on domestic AI systems or employing stricter operational security measures to avoid detection. Interestingly, 40% of Russia’s AI-related activity was linked to operatives associated with the late oligarch Yevgeny Prigozhin, including groups tied to the Wagner Group. These actors reportedly used Gemini to rewrite content for influence campaigns and pro-Kremlin propaganda, tactics previously employed by Russia’s Internet Research Agency.

Despite these activities, Google maintains that its AI model is not a game-changer for cyber operations. The company asserts that while AI can enhance threat actors’ efficiency, it has not enabled them to develop novel cyber capabilities beyond their existing expertise. Google claims its AI guardrails have successfully blocked malicious code generation, even when attackers attempted to circumvent safeguards using known jailbreak techniques.

Google has also detected efforts to abuse its AI for researching ways to exploit other Google services, but these attempts were reportedly blocked. The company emphasized that it continues to refine its security measures and that its DeepMind division is working on new defenses against AI misuse. One such measure includes an evaluation framework to test the AI’s vulnerability to indirect prompt injection attacks.

The revelations from Google’s report underscore the evolving role of AI in cyber operations and raise concerns about how nation-state actors may seek to exploit AI-powered tools. As AI models become more sophisticated, the cybersecurity community is calling for increased transparency, stricter regulations, and international cooperation to prevent AI misuse in cyber warfare. Google’s findings serve as a reminder that while AI holds great promise for innovation, it also poses new challenges in global cybersecurity.

Jacob Reed
Jacob Reed
A practical analyst specializing in cybersecurity. Delivers technical expertise with clarity and focus.

Subscribe

Get a weekly newsletter with the most intriguing articles of the week, straight to your inbox.

More from author

More like this

Doomsday Clock Moves to 89 Seconds to Midnight—The Closest Ever

The symbolic Doomsday Clock has been moved to just 89 seconds before midnight, highlighting escalating global threats and unprecedented risks to humanity.

DeepSeek Database Left Open, Exposing Sensitive User Information

A major security lapse has left DeepSeek’s internal database exposed, raising concerns over data privacy and cybersecurity in AI-driven platforms.

Trump Directs Pentagon to Develop Plan for Space-Based Weapons

Former President Donald Trump has instructed the U.S. Department of Defense to explore the deployment of space-based weaponry, reigniting debates over the militarization of space.

Deepfake Scams: AI-Generated Videos Used in Blackmail Schemes

A new wave of online scams involves AI-generated fake news videos used to blackmail individuals, raising concerns about the misuse of deepfake technology.

Latest news

Polar Bear Population Decline Directly Linked to Prolonged Energy Deficit

New research from the University of Toronto Scarborough confirms that the ongoing decline in polar bear populations is a direct result of prolonged energy deficits caused by food scarcity.

New Study Links Chronic Itchy Rash to Previously Overlooked Immune Response

Researchers at UPMC have identified a unique immune pathway linked to persistent, unexplained itchy rashes, paving the way for new treatment options.

Origin Unknown: Why the COVID-19 Lab Leak Theory Still Matters

The ongoing debate over the origins of COVID-19 has resurfaced as the CIA asserts that the virus likely emerged from a Chinese laboratory, reigniting global discussions and geopolitical tensions.

Earliest Evidence of Lead Pollution Found From 5,200 Years Ago

Scientists have discovered traces of lead pollution dating back 5,200 years, providing new insights into early human industrial activity.

Neural Fossil: Human Ears Move Subtly When Listening, Scientists Discover

New research suggests that tiny movements in human ears while listening may be remnants of evolutionary traits linked to our animal ancestors.

Childhood Trauma and Adult Breakups Linked to Changes in Brain Size

New research suggests that experiencing childhood trauma followed by a significant breakup in adulthood may alter brain structure, affecting emotional regulation and stress response.

US Regulators Review Non-Opioid Painkiller Amid Rising Demand for Safer Alternatives

The FDA is evaluating Vertex Pharmaceuticals' experimental painkiller as the US seeks safer options beyond opioids.

Doomsday Clock Moves to 89 Seconds to Midnight—The Closest Ever

The symbolic Doomsday Clock has been moved to just 89 seconds before midnight, highlighting escalating global threats and unprecedented risks to humanity.

Eerie Features on Mars Stun Scientists With Their Unprecedented Formations

New high-resolution images from Mars reveal strange geological features unlike anything seen on Earth, challenging scientists' understanding of planetary geology.

Elon Musk vs. Government Tech Workers: Tensions Rise Over Public Sector Innovation

Elon Musk’s criticisms of government-run tech initiatives have sparked debate over the role of public sector innovation and the influence of private companies in shaping digital infrastructure.