
Hackers also used Gemini for cyber security -related translations and technical explanations.
Tech Giant Google warns that the country -sponsored hacking group is experimenting with GEMINI Assistant with AI. These groups are more than 20 countries, including Iran, China, North Korea, and Russia, but are using Gemini to study productivity and potential attack targets.
According to Google’s Threat Intelligence Group (Gtig) hacker The AI -drive type has not been activated yet using gemini Cyber attack However, it is used for various tasks. This includes coding, knowledgeable security defects, understanding technology, collecting information on organizations, and avoiding detection in the infringed network.
“These cyber groups are testing how AI supports reconnaissance and post -competition activities, and may make attacks more efficient. Technology giants are closely the cyber security AI misuse. We are working on monitoring and protection means to prevent abuse. ”
Google is a tool for experimenting with gemini from Iran, China, North Korea, and Russia (aPT), discovering security gaps, avoiding detection, and planning a post -shogun activity. He said he had investigated the possibilities.
-Iran’s hacker is the heaviest user of Gemini, a wide range of activities, such as reconnaissance in defense organizations and international experts, research on publicly known vulnerabilities, developing phishing campaigns, and creating content for influence operation. I used it for that.
-I also used Gemini to translate and technical explanations related to military technology, including garba security, unmanned aircraft (UAV) and missile defense systems.
-The threats to support China have mainly used Gemini for the reconnaissance of the US and government organizations.
-The North Korean hacker has supported multiple stages of attack life cycle, including a gemini survey of free hosting providers, conducting target organization reconnaissance, and supporting malware development and avoidance technology.
-Russian threat actors are minimal with Gemini, and most of the usage focuses on script support, translation, and payload craft.
-The activities include rewriting the published malware into various programming languages, adding encryption functions to malicious code, and understanding the specific features of public malware.