Technology

The Dark Side of Generative AI: Google Uncovers Its Use by Cyber Threat Actors

2025-03-15

Author: John Tan

Introduction

In a groundbreaking report released by Google's Threat Intelligence Group (GTIG), researchers have unveiled alarming insights into how cybercriminals are harnessing the power of generative AI for malicious purposes. While these threat actors have made strides in operational efficiency, the report emphasizes that their current capabilities remain largely conventional, lacking true innovation or sophistication.

Analysis of Cyber Threats

The GTIG team meticulously analyzed the prompts utilized by advanced persistent threat (APT) actors and those involved in coordinated information operations (IO). Their findings reveal a surprising trend: rather than crafting elaborate and tailored prompts, cyber adversaries predominantly resort to basic methods and publicly available strategies in their attempts to bypass AI systems, notably Google's Gemini. The Google team stated, "We did not observe any original or persistent attempts by threat actors to use sophisticated prompt attacks as outlined in the Secure AI Framework (SAIF)."

Dual Nature of Generative AI

This discovery shines a light on the way generative AI is being used, serving dual purposes. On one hand, it aids organizations in tracing misuse and uncovering threats; on the other, it empowers criminal entities, allowing them to scale their operations at an unprecedented rate. For skilled malicious actors, generative AI acts as a powerful tool akin to established cyber threat frameworks like Metasploit and Cobalt Strike. Even less experienced criminals can leverage these tools for swift learning and productivity, honing their skills more efficiently than ever before.

Evolving Tactics of Cybercriminals

The report identifies that attackers are employing AI advancements to enhance their tactics in phishing schemes, disinformation campaigns, and the development of malware. As these cyber offensives evolve, defensive AI technologies are also rapidly advancing, equipping organizations to detect and address these growing threats more effectively.

Jailbreak Attempts

One particularly noteworthy finding pertains to the AI-based jailbreak attempts to overcome Gemini's safety measures. Despite the threat actors' efforts, these attempts have largely proven ineffective, highlighting the robust defenses in place.

State-Sponsored Cyber Activity

In the realm of cybercrime, APTs typically refer to state-sponsored hacking activities, including espionage and destructive cyberattacks, particularly from countries like Iran, China, North Korea, and, to a lesser extent, Russia. Google’s research indicates that Iranian and Chinese actors account for the highest volume of activity, employing generative AI tools across various stages of the attack lifecycle. This encompasses everything from reconnaissance of potential targets to developing malicious scripts and evasion techniques.

Expert Opinions

Industry experts are weighing in on these startling revelations. Josh Kamdjou, the CEO of Sublime Security, remarked on the significance of identifying specific state actors associated with these cyber threats. Meanwhile, Godwin Josh, co-founder of Altrosyn, noted the historical parallels with the evolution of malware, stating, "Just as polymorphic code once perplexed cybersecurity defenses, we now witness how AI-generated attacks are evolving in real-time to adapt against detection systems."

Generative AI in Information Operations

Furthermore, the report highlights that IO actors predominantly utilize generative AI for content creation—crafting personas, messaging, and localization efforts to deceive and mislead online audiences. Notably, Iranian IO actors are responsible for a staggering three-quarters of this activity.

Conclusion

As we delve further into the implications of these findings, it becomes increasingly apparent that both the cybersecurity landscape and the tactics of malicious actors are shifting dramatically. The threat of generative AI misuse is real and growing—are we prepared to tackle this rapidly evolving menace?