Google asserts that state-affiliated threat entities are leveraging Gemini AI.


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!



State-Sponsored Threat Actors Misusing Google’s Gemini AI

Brief Overview

  • Actors sponsored by states like China, Iran, Russia, and North Korea have taken advantage of Google’s Gemini AI.
  • The AI Threat Tracker report has been published by Google’s Threat Intelligence Group (GTIG).
  • These actors have circumvented the security protocols of Gemini via social engineering.
  • New malware types such as PROMPTFLUX and PROMPTSTEAL signal the growth of threats.
  • Google addresses these risks by disabling accounts once suspicious activity is detected.

Introduction

As of 2025, state-sponsored threat actors from China, Iran, Russia, and North Korea have effectively leveraged Google’s Gemini AI to improve their cyber-attack methodologies. In spite of Google’s persistent efforts to identify and curb misuse, these actors have found ways to bypass the AI’s security protocols.

Google asserts that state-affiliated threat entities are leveraging Gemini AI.


AI Threat Tracker Report

Google’s Threat Intelligence Group (GTIG) published a document named AI Threat Tracker: Advances in Threat Actor Usage of AI Tools. This report emphasizes how adversaries have transitioned from utilizing AI for productivity to more malicious applications. It continues findings from January 2025, offering insights on how these actors exploit AI resources such as Gemini.

Circumventing Security Protocols

Even with Google’s protective measures, threat actors have adeptly bypassed Gemini’s safeguards through social engineering techniques. One significant scenario involved a Chinese actor posing as a capture-the-flag competitor to gain exploitation guidance from Gemini. Other groups have employed similar strategies to create bespoke malware and execute phishing schemes.

Malware Innovation and Application

Emerging malware like PROMPTFLUX and PROMPTSTEAL illustrates the potential maturation of cyber threats. PROMPTFLUX alters its code in real-time to avoid detection, while PROMPTSTEAL dynamically crafts commands for data theft. These advancements showcase continuous experimentation in AI-enhanced malware development.

Conclusion

The exploitation of Google’s Gemini AI by state-sponsored groups highlights the changing landscape of cyber threats. While Google is persistently improving its security defenses, the adaptability of these actors presents ongoing challenges. The rise of AI-driven malware adds complexity to the cybersecurity field, emphasizing the need for sustained vigilance and innovation in defense strategies.

Q&A

Q: What is the AI Threat Tracker report?

A: It is a report from Google’s Threat Intelligence Group that outlines the misuse of AI tools like Gemini by threat actors.

Q: In what ways do threat actors circumvent Gemini’s security?

A: They utilize social engineering methods, such as pretending to be legitimate users, to bypass security measures.

Q: What is PROMPTFLUX?

A: PROMPTFLUX is a form of experimental malware that dynamically adjusts its source code to avoid detection.

Q: How does Google respond to these threats?

A: Google limits the time frame within which actors can misuse the AI by shutting down accounts upon detection.

Q: What significance does AI-driven malware hold?

A: AI-driven malware represents a novel challenge in cybersecurity, necessitating new and creative defensive strategies.

Posted by David Leane

David Leane is a Sydney-based Editor and audio engineer.

Leave a Reply

Your email address will not be published. Required fields are marked *