Google asserts that state-affiliated threat entities are leveraging Gemini AI.
We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!
Brief Overview
- Actors sponsored by states like China, Iran, Russia, and North Korea have taken advantage of Google’s Gemini AI.
- The AI Threat Tracker report has been published by Google’s Threat Intelligence Group (GTIG).
- These actors have circumvented the security protocols of Gemini via social engineering.
- New malware types such as PROMPTFLUX and PROMPTSTEAL signal the growth of threats.
- Google addresses these risks by disabling accounts once suspicious activity is detected.
Introduction
As of 2025, state-sponsored threat actors from China, Iran, Russia, and North Korea have effectively leveraged Google’s Gemini AI to improve their cyber-attack methodologies. In spite of Google’s persistent efforts to identify and curb misuse, these actors have found ways to bypass the AI’s security protocols.

AI Threat Tracker Report
Google’s Threat Intelligence Group (GTIG) published a document named AI Threat Tracker: Advances in Threat Actor Usage of AI Tools. This report emphasizes how adversaries have transitioned from utilizing AI for productivity to more malicious applications. It continues findings from January 2025, offering insights on how these actors exploit AI resources such as Gemini.
Circumventing Security Protocols
Even with Google’s protective measures, threat actors have adeptly bypassed Gemini’s safeguards through social engineering techniques. One significant scenario involved a Chinese actor posing as a capture-the-flag competitor to gain exploitation guidance from Gemini. Other groups have employed similar strategies to create bespoke malware and execute phishing schemes.
Malware Innovation and Application
Emerging malware like PROMPTFLUX and PROMPTSTEAL illustrates the potential maturation of cyber threats. PROMPTFLUX alters its code in real-time to avoid detection, while PROMPTSTEAL dynamically crafts commands for data theft. These advancements showcase continuous experimentation in AI-enhanced malware development.
Conclusion
The exploitation of Google’s Gemini AI by state-sponsored groups highlights the changing landscape of cyber threats. While Google is persistently improving its security defenses, the adaptability of these actors presents ongoing challenges. The rise of AI-driven malware adds complexity to the cybersecurity field, emphasizing the need for sustained vigilance and innovation in defense strategies.



.jpg&h=420&w=748&c=0&s=0)









