{"id":1262,"date":"2026-02-12T09:00:00","date_gmt":"2026-02-12T09:00:00","guid":{"rendered":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/12\/state-sponsored-hackers-exploit-ai-for-advanced-cyberattacks\/"},"modified":"2026-02-12T09:00:00","modified_gmt":"2026-02-12T09:00:00","slug":"state-sponsored-hackers-exploit-ai-for-advanced-cyberattacks","status":"publish","type":"post","link":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/12\/state-sponsored-hackers-exploit-ai-for-advanced-cyberattacks\/","title":{"rendered":"State-sponsored hackers exploit AI for advanced cyberattacks"},"content":{"rendered":"<p>State-sponsored hackers are exploiting AI to accelerate cyberattacks, with threat actors from Iran, North Korea, China, and Russia weaponising models like Google\u2019s Gemini to craft sophisticated phishing campaigns and develop malware, according to a new report from Google\u2019s Threat Intelligence Group (GTIG).<br \/>\nThe quarterly AI Threat Tracker report, released today, reveals how government-backed attackers have integrated artificial intelligence throughout the attack lifecycle \u2013 achieving productivity gains in reconnaissance, social engineering, and malware development during the final quarter of 2025.<br \/>\n\u201cFor government-backed threat actors, large language models have become essential tools for technical research, targeting, and the rapid generation of nuanced phishing lures,\u201d GTIG researchers stated in the report.<br \/>\nAI-powered reconnaissance by state-sponsored hackers targets the defence sector<br \/>\nIranian threat actor APT42 used Gemini to augment reconnaissance and targeted social engineering operations. The group misused the AI model to enumerate official email addresses for specific entities and conduct research to establish credible pretexts for approaching targets.<br \/>\nBy feeding Gemini a target\u2019s biography, APT42 crafted personas and scenarios designed to elicit engagement. The group also used the AI to translate between languages and better understand non-native phrases \u2013 abilities that help state-sponsored hackers bypass traditional phishing red flags like poor grammar or awkward syntax.<br \/>\nNorth Korean government-backed actor UNC2970, which focuses on defence targeting and impersonating corporate recruiters, used Gemini to synthesise open-source intelligence and profile high-value targets. The group\u2019s reconnaissance included searching for information on major cybersecurity and defence companies, mapping specific technical job roles, and gathering salary information.<br \/>\n\u201cThis activity blurs the distinction between routine professional research and malicious reconnaissance, as the actor gathers the necessary components to create tailored, high-fidelity phishing personas,\u201d GTIG noted.<br \/>\nModel extraction attacks surge<br \/>\nBeyond operational misuse, Google DeepMind and GTIG identified a increase in model extraction attempts \u2013 also known as \u201cdistillation attacks\u201d \u2013 aimed at stealing intellectual property from AI models.<br \/>\nOne campaign targeting Gemini\u2019s reasoning abilities involved over 100,000 prompts designed to coerce the model into outputting full reasoning processes. The breadth of questions suggested an attempt to replicate Gemini\u2019s reasoning ability in non-English target languages in various tasks.<br \/>\nHow model extraction attacks work to steal AI intellectual property. (Image: Google GTIG)<br \/>\nWhile GTIG observed no direct attacks on frontier models from advanced persistent threat actors, the team identified and disrupted frequent model extraction attacks from private sector entities globally and researchers seeking to clone proprietary logic.<br \/>\nGoogle\u2019s systems recognised these attacks in real-time and deployed defences to protect internal reasoning traces.<br \/>\nAI-integrated malware emerges<br \/>\nGTIG observed malware samples, tracked as HONESTCUE, that use Gemini\u2019s API to outsource functionality generation. The malware is designed to undermine traditional network-based detection and static analysis through a multi-layered obfuscation approach.<br \/>\nHONESTCUE functions as a downloader and launcher framework that sends prompts via Gemini\u2019s API and receives C# source code as responses. The fileless secondary stage compiles and executes payloads directly in memory, leaving no artefacts on disk.<br \/>\nHONESTCUE malware\u2019s two-stage attack process using Gemini\u2019s API. (Image: Google GTIG)<br \/>\nSeparately, GTIG identified COINBAIT, a phishing kit whose construction was likely accelerated by AI code generation tools. The kit, which masquerades as a major cryptocurrency exchange for credential harvesting, was built using the AI-powered platform Lovable AI.<br \/>\nClickFix campaigns abuse AI chat platforms<br \/>\nIn a novel social engineering campaign first observed in December 2025, Google saw threat actors abuse the public sharing features of generative AI services \u2013 including Gemini, ChatGPT, Copilot, DeepSeek, and Grok \u2013 to host deceptive content distributing ATOMIC malware targeting macOS systems.<br \/>\nAttackers manipulated AI models to create realistic-looking instructions for common computer tasks, embedding malicious command-line scripts as the \u201csolution.\u201d By creating shareable links to these AI chat transcripts, threat actors used trusted domains to host their initial attack stage.<br \/>\nThe three-stage ClickFix attack chain exploiting AI chat platforms. (Image: Google GTIG)<br \/>\nUnderground marketplace thrives on stolen API keys<br \/>\nGTIG\u2019s observations of English and Russian-language underground forums indicate a persistent demand for AI-enabled tools and services. However, state-sponsored hackers and cybercriminals struggle to develop custom AI models, instead relying on mature commercial products accessed through stolen credentials.<br \/>\nOne toolkit, \u201cXanthorox,\u201d advertised itself as a custom AI for autonomous malware generation and phishing campaign development. GTIG\u2019s investigation revealed Xanthorox was not a bespoke model but actually powered by several commercial AI products, including Gemini, accessed through stolen API keys.<br \/>\nGoogle\u2019s response and mitigations<br \/>\nGoogle has taken action against identified threat actors by disabling accounts and assets associated with malicious activity. The company has also applied intelligence to strengthen both classifiers and models, letting them refuse assistance with similar attacks moving forward.<br \/>\n\u201cWe are committed to developing AI boldly and responsibly, which means taking proactive steps to disrupt malicious activity by disabling the projects and accounts associated with bad actors, while continuously improving our models to make them less susceptible to misuse,\u201d the report stated.<br \/>\nGTIG emphasised that despite these developments, no APT or information operations actors have achieved breakthrough abilities that fundamentally alter the threat landscape.<br \/>\nThe findings underscore the evolving role of AI in cybersecurity, as both defenders and attackers race to use the technology\u2019s abilities.<br \/>\nFor enterprise security teams, particularly in the Asia-Pacific region where Chinese and North Korean state-sponsored hackers remain active, the report serves as an important reminder to enhance defences against AI-augmented social engineering and reconnaissance operations.<br \/>\n(Photo by SCARECROW artworks)<br \/>\nSee also: Anthropic just revealed how AI-orchestrated cyberattacks actually work \u2013 Here\u2019s what enterprises need to know<br \/>\nWant to learn more about AI and big data from industry leaders? Check out AI &amp; Big Data Expo taking place in Amsterdam, California, and London. The comprehensive event is part of TechEx and is co-located with other leading technology events, click here for more information.<br \/>\nAI News is powered by TechForge Media. Explore other upcoming enterprise technology events and webinars here.<br \/>\nThe post State-sponsored hackers exploit AI for advanced cyberattacks appeared first on AI News.<\/p>\n","protected":false},"excerpt":{"rendered":"<div>\n<p>State-sponsored hackers are exploiting AI to accelerate cyberattacks, with threat actors from Iran, North Korea, China, and Russia weaponising models like Google\u2019s Gemini to craft sophisticated phishing campaigns and develop malware, according to a new report from Google\u2019s Threat Intelligence Group (GTIG). The quarterly AI Threat Tracker report, released today, reveals how government-backed attackers have [\u2026]<\/p>\n<p>The post <a href=\"https:\/\/www.artificialintelligence-news.com\/news\/state-sponsored-hackers-ai-cyberattacks-google\/\">State-sponsored hackers exploit AI for advanced cyberattacks<\/a> appeared first on <a href=\"https:\/\/www.artificialintelligence-news.com\/\">AI News<\/a>.<\/p>\n<\/div>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-container-style":"default","site-container-layout":"default","site-sidebar-layout":"default","disable-article-header":"default","disable-site-header":"default","disable-site-footer":"default","disable-content-area-spacing":"default","footnotes":""},"categories":[4,1,90,649,46,438],"tags":[3],"class_list":["post-1262","post","type-post","status-publish","format-standard","hentry","category-ai","category-ai-and-ml","category-cybersecurity","category-cybersecurity-ai","category-google","category-human-ai-relationships","tag-ai"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>State-sponsored hackers exploit AI for advanced cyberattacks - Imperative Business Ventures Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/12\/state-sponsored-hackers-exploit-ai-for-advanced-cyberattacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"State-sponsored hackers exploit AI for advanced cyberattacks - Imperative Business Ventures Limited\" \/>\n<meta property=\"og:description\" content=\"State-sponsored hackers are exploiting AI to accelerate cyberattacks, with threat actors from Iran, North Korea, China, and Russia weaponising models like Google\u2019s Gemini to craft sophisticated phishing campaigns and develop malware, according to a new report from Google\u2019s Threat Intelligence Group (GTIG). The quarterly AI Threat Tracker report, released today, reveals how government-backed attackers have [\u2026] The post State-sponsored hackers exploit AI for advanced cyberattacks appeared first on AI News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/12\/state-sponsored-hackers-exploit-ai-for-advanced-cyberattacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Imperative Business Ventures Limited\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-12T09:00:00+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/12\/state-sponsored-hackers-exploit-ai-for-advanced-cyberattacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/12\/state-sponsored-hackers-exploit-ai-for-advanced-cyberattacks\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"headline\":\"State-sponsored hackers exploit AI for advanced cyberattacks\",\"datePublished\":\"2026-02-12T09:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/12\/state-sponsored-hackers-exploit-ai-for-advanced-cyberattacks\/\"},\"wordCount\":989,\"keywords\":[\"AI\"],\"articleSection\":[\"AI\",\"AI and ML\",\"Cybersecurity\",\"Cybersecurity AI\",\"Google\",\"Human-AI Relationships\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/12\/state-sponsored-hackers-exploit-ai-for-advanced-cyberattacks\/\",\"url\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/12\/state-sponsored-hackers-exploit-ai-for-advanced-cyberattacks\/\",\"name\":\"State-sponsored hackers exploit AI for advanced cyberattacks - Imperative Business Ventures Limited\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/#website\"},\"datePublished\":\"2026-02-12T09:00:00+00:00\",\"author\":{\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/12\/state-sponsored-hackers-exploit-ai-for-advanced-cyberattacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/12\/state-sponsored-hackers-exploit-ai-for-advanced-cyberattacks\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/12\/state-sponsored-hackers-exploit-ai-for-advanced-cyberattacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.ibvl.in\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"State-sponsored hackers exploit AI for advanced cyberattacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.ibvl.in\/#website\",\"url\":\"https:\/\/blog.ibvl.in\/\",\"name\":\"Imperative Business Ventures Limited\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.ibvl.in\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/blog.ibvl.in\"],\"url\":\"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"State-sponsored hackers exploit AI for advanced cyberattacks - Imperative Business Ventures Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/12\/state-sponsored-hackers-exploit-ai-for-advanced-cyberattacks\/","og_locale":"en_US","og_type":"article","og_title":"State-sponsored hackers exploit AI for advanced cyberattacks - Imperative Business Ventures Limited","og_description":"State-sponsored hackers are exploiting AI to accelerate cyberattacks, with threat actors from Iran, North Korea, China, and Russia weaponising models like Google\u2019s Gemini to craft sophisticated phishing campaigns and develop malware, according to a new report from Google\u2019s Threat Intelligence Group (GTIG). The quarterly AI Threat Tracker report, released today, reveals how government-backed attackers have [\u2026] The post State-sponsored hackers exploit AI for advanced cyberattacks appeared first on AI News.","og_url":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/12\/state-sponsored-hackers-exploit-ai-for-advanced-cyberattacks\/","og_site_name":"Imperative Business Ventures Limited","article_published_time":"2026-02-12T09:00:00+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/12\/state-sponsored-hackers-exploit-ai-for-advanced-cyberattacks\/#article","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/12\/state-sponsored-hackers-exploit-ai-for-advanced-cyberattacks\/"},"author":{"name":"admin","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"headline":"State-sponsored hackers exploit AI for advanced cyberattacks","datePublished":"2026-02-12T09:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/12\/state-sponsored-hackers-exploit-ai-for-advanced-cyberattacks\/"},"wordCount":989,"keywords":["AI"],"articleSection":["AI","AI and ML","Cybersecurity","Cybersecurity AI","Google","Human-AI Relationships"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/12\/state-sponsored-hackers-exploit-ai-for-advanced-cyberattacks\/","url":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/12\/state-sponsored-hackers-exploit-ai-for-advanced-cyberattacks\/","name":"State-sponsored hackers exploit AI for advanced cyberattacks - Imperative Business Ventures Limited","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/#website"},"datePublished":"2026-02-12T09:00:00+00:00","author":{"@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"breadcrumb":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/12\/state-sponsored-hackers-exploit-ai-for-advanced-cyberattacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.ibvl.in\/index.php\/2026\/02\/12\/state-sponsored-hackers-exploit-ai-for-advanced-cyberattacks\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/02\/12\/state-sponsored-hackers-exploit-ai-for-advanced-cyberattacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.ibvl.in\/"},{"@type":"ListItem","position":2,"name":"State-sponsored hackers exploit AI for advanced cyberattacks"}]},{"@type":"WebSite","@id":"https:\/\/blog.ibvl.in\/#website","url":"https:\/\/blog.ibvl.in\/","name":"Imperative Business Ventures Limited","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.ibvl.in\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/blog.ibvl.in"],"url":"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/1262","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/comments?post=1262"}],"version-history":[{"count":0,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/1262\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/media?parent=1262"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/categories?post=1262"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/tags?post=1262"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}