Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: State-Backed Hackers Use Gemini AI Throughout Cyber Attack Phases
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
CybersecurityTechnology

State-Backed Hackers Use Gemini AI Throughout Cyber Attack Phases

Highlights

  • State-backed cyber attackers use Gemini AI at each attack stage.

  • Current AI tools assist but don’t fully automate large-scale attacks yet.

  • Closing gaps between open-source and frontier AI heighten security challenges.

Kaan Demirel
Last updated: 13 February, 2026 - 12:50 am 12:50 am
Kaan Demirel 2 hours ago
Share
SHARE

Recent insights from Google’s Threat Intelligence Group reveal that state-sponsored cyber actors have integrated Google’s Gemini AI across nearly every step of the cyber attack chain. The findings illustrate how some of the world’s most sophisticated threat groups have found value in Gemini for tasks ranging from reconnaissance to malware development. As cybersecurity defenses adapt, the balance of power between attackers and defenders continues to fluctuate, raising new questions about AI’s evolving role in both offensive and defensive digital operations. While some analysts argue that AI proliferation represents just an incremental shift, those monitoring the global cyber landscape underscore its growing impact.

Contents
How Are State-Sponsored Groups Using Gemini?Has Gemini Fully Automated Cyber Attacks?Will Frontier AI Tilt the Balance Between Attackers and Defenders?

Earlier analyses highlighted the use of AI tools in cyber operations, but focused on more rudimentary deployments and often manual use. In contrast, the new report discusses the increasing automation and sophistication that current AI models, such as Gemini and Anthropic’s Claude, provide. These tools now offer greater autonomy, with capabilities expanding noticeably each year. While free, open-source models previously trailed behind featured frontier AI solutions, the capability gap has narrowed, enabling more actors—including smaller or less-resourced organizations—to access advanced cyber functionalities within a short timeframe.

How Are State-Sponsored Groups Using Gemini?

State groups from China, Russia, Iran, and North Korea have reportedly used Gemini for diverse activities, according to Google’s research. The AI tool has been employed to automate data gathering, develop malware, and even generate fake news content or online personas as part of wider information operations. For instance, North Korean actors used Gemini to obtain intelligence about roles and salaries in the defense sector, and Iranian groups leveraged the model for more effective reconnaissance. Google’s reporting indicates that Gemini is mainly one utility among many in these campaigns, used specifically to enhance efficiency in routine or technical tasks.

Has Gemini Fully Automated Cyber Attacks?

Despite Gemini’s growing utility, there are no confirmed cases of state actors relying on it or similar AI to run predominantly automated cyber attacks end-to-end. Google’s John Hultquist points out that, for now, many threat groups remain in a trial-and-error phase:

“Nobody’s got everything completely worked out. They’re all trying to figure this out and that goes for attacks on AI, too.”

Some operations still require significant human input, as fully autonomous attacks may increase the likelihood of detection, reducing their appeal for espionage-focused actors.

Will Frontier AI Tilt the Balance Between Attackers and Defenders?

The spread of advanced AI models raises concerns about their dual-use nature. While companies like Anthropic and XBOW focus on developing robust AI-driven cybersecurity defenses, similar features could be exploited for offensive purposes by adversarial groups or state actors. The UK AI Security Institute notes that open-source models are quickly matching the capabilities of leading-edge AIs, which could further accelerate the pace and complexity of cyber activity worldwide. Hultquist acknowledges a nuanced risk landscape, noting:

“What’s so interesting about this capability is it’s going to have an effect across the entire intrusion cycle.”

AI’s integration into cyber operations marks an adaptive phase rather than an overnight overhaul of hacking strategies. Both offensive and defensive uses of AI are set to become more sophisticated as capabilities develop. Security professionals and organizations should closely monitor how threat actors automate reconnaissance, malware creation, or information campaigns with tools like Gemini and Claude. Analysis of recent research suggests that as AI tools become easier to access and more autonomous, the threat surface will broaden, potentially leveling the field for smaller players and increasing the pace of cyber incidents. Staying informed about how these tools are actually applied—rather than feared in the abstract—will help organizations anticipate risks and focus resources more effectively.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Key xAI Leaders Resign as Elon Musk Shifts Company Toward SpaceX Integration

Oura Rings Track Team USA Athletes During Olympic Games

Researchers Question 0APT’s Ransomware Claims While Validating Technical Threat

Hugging Face Maintains Profit Focus Without Ads or New Funding

Tech Giants Launch AI Health Apps, Face Privacy Scrutiny

Share This Article
Facebook Twitter Copy Link Print
Kaan Demirel
By Kaan Demirel
Kaan Demirel is a 28-year-old gaming enthusiast residing in Ankara. After graduating from the Statistics department of METU, he completed his master's degree in computer science. Kaan has a particular interest in strategy and simulation games and spends his free time playing competitive games and continuously learning new things about technology and game development. He is also interested in electric vehicles and cyber security. He works as a content editor at NewsLinker, where he leverages his passion for technology and gaming.
Previous Article NASA Collaborates With PickNik and Motiv to Advance On-Orbit Robotics
Next Article Key xAI Leaders Resign as Elon Musk Shifts Company Toward SpaceX Integration

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

NASA Collaborates With PickNik and Motiv to Advance On-Orbit Robotics
AI Robotics
Netmore Drives IoT Expansion with Pulse Partner Program
IoT
Tesla Moves Full Self-Driving to Subscription Model Only
Electric Vehicle
Elon Musk Leads Forbes Ranking of Top U.S. Innovators
Electric Vehicle
Tesla Model Y Leads California Sales Despite Musk Backlash
Electric Vehicle
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?