Close Menu
    X (Twitter) LinkedIn
    CapitalAI DailyCapitalAI Daily
    X (Twitter) LinkedIn
    • Markets & Investments
    • Big Tech & AI
    • AI & Cybercrime
    • Jobs & AI
    • Banks
    • Crypto
    Tuesday, March 31
    CapitalAI DailyCapitalAI Daily
    Home»AI & Cybercrime»Google Says China-Linked Hackers Are Misusing Gemini To Probe US Targets

    Google Says China-Linked Hackers Are Misusing Gemini To Probe US Targets

    By Henry KanapiFebruary 13, 20262 Mins Read
    Share
    Twitter LinkedIn

    Google says state-sponsored hackers are trying to use its AI chatbot to sharpen cyberattacks against American targets.

    In its latest Google Threat Intelligence Report, the company says that China-linked threat actors have been prompting Gemini to help with reconnaissance, phishing campaigns and even vulnerability testing against specific US-based organizations.

    According to the report, state-backed groups are attempting to use Gemini across multiple stages of their operations, including command-and-control development and data exfiltration. Google says some actors are also experimenting with so-called “agentic” AI capabilities, assigning the model expert personas or asking it to perform automated security analysis.

    Google says China-based threat actor APT31 took a highly structured approach, prompting Gemini with an expert cybersecurity persona to automate the analysis of system vulnerabilities and come up with targeted testing plans.

    “The PRC-based threat actor fabricated a scenario, in one case trialing Hexstrike MCP tooling, and directing the model to analyze remote code execution (RCE), web application firewall (WAF) bypass techniques, and SQL injection test results against specific US-based targets. This automated intelligence gathering to identify technological vulnerabilities and organizational defense weaknesses.”

    Google notes that this kind of activity blurs the line between routine cybersecurity queries and targeted malicious reconnaissance.

    In another case, a PRC-based actor labeled UNC795 relied heavily on Gemini throughout its attack lifecycle. The group used the tool to troubleshoot code, conduct research and generate technical capabilities for intrusion activity. Google says the actor engaged with Gemini multiple days a week.

    The company says its safety systems were triggered during these interactions and that Gemini did not comply with requests to create policy-violating capabilities. Google also says it has disabled the assets associated with the identified actors.

    Disclaimer: Opinions expressed at CapitalAI Daily are not investment advice. Investors should do their own due diligence before making any decisions involving securities, cryptocurrencies, or digital assets. Your transfers and trades are at your own risk, and any losses you may incur are your responsibility. CapitalAI Daily does not recommend the buying or selling of any assets, nor is CapitalAI Daily an investment advisor. See our Editorial Standards and Terms of Use.

    China Gemini Google Hacking
    Previous ArticleVC Says OpenAI Facing Consumer Headwinds As Gemini Grows to Over 50% of ChatGPT’s Monthly Active Users
    Next Article Anthropic Raises $30,000,000,000 As Run-Rate Revenue Grew 10x Annually Over Three Years

    Read More

    Apple Plans To Open Siri to Claude, Gemini and Other AI Assistants in Upcoming iOS Update: Report

    March 28, 2026

    Leaked Anthropic Documents Reveal ‘Claude Mythos’ as Firm’s Most Powerful AI Model Yet

    March 28, 2026

    Wells Fargo Raises Alphabet Price Target, Sees 45% Upside for GOOGL on ‘True Organic’ AI Revenue Shift

    March 28, 2026

    FTC Bans Air AI After Consumers Lose Up to $250,000 on Alleged False Earnings Promises and Guaranteed Refunds

    March 27, 2026

    Scam Farms Recruiting Real People As ‘AI Models’ for $7,000 a Month To Charm Victims, Says Malwarebytes

    March 25, 2026

    Scammer Drains $4,000 From Victim After Masquerading as FBI Agent Using AI: Report

    March 23, 2026
    X (Twitter) LinkedIn
    • About
    • Author
    • Editorial Standards
    • Contact Us
    • Privacy Policy
    • Terms of Service
    • Cookie Policy
    © 2025 CapitalAI Daily. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.