NetworkUstad
Cybersecurity

Google researchers uncover criminal zero-day exploit likely built with AI

2 min read
Trend Statistics
Claimed adoption rate for open-source stacks
📈
70%
Enterprise open-source usage
Industry forecast for semantic flaws
40%
Projected web breaches by 2026
Based on LLM payload generation claims
2x
AI exploit speed vs manual

Google researchers at its Threat Analysis Group identified a zero-day exploit in March 2026 that security teams traced to a criminal group previously known for ransomware operations. The payload carried code signatures consistent with AI-generated structures rather than manual development patterns.

Why This Trend Is Breaking Now

The catalyst traces to three separate discoveries within six weeks. A financial institution in Singapore reported unusual lateral movement in February. A European energy firm detected command-and-control traffic that bypassed its signature-based tools. Both incidents featured code blocks showing repetitive optimization loops and unusual variable naming that AI models commonly produce.

Google researchers uncovered criminal zero-day exploit likely built with AI after analyzing the shared codebase between these attacks. The group had previously relied on purchased exploits from dark web forums. Now they generate customized variants internally.

Model availability explains the timing. Open-weight large language models reached performance levels sufficient for code generation tasks by late 2025. Criminals gained access to these tools through compromised research accounts and leaked weights.

Cost reduction tipped the balance. Manual exploit development previously required weeks of skilled labor. AI-assisted generation reduces that window to days while lowering the skill threshold for participants.

The implication is that smaller criminal crews now compete with sophisticated state actors.

The old way relied on static signatures and purchased zero-days. The new way produces tailored payloads for specific targets in near real-time.

What’s Changing

The discovered exploit targeted a memory corruption flaw in an enterprise VPN concentrator. The AI-assisted portion handled payload obfuscation and anti-analysis techniques. NIST guidelines on AI security risks OWASP ZAP emerging digital scam tactics advanced user verification strategies

The model suggested alternative instruction sequences that avoided common detection heuristics. It also proposed command-and-control channels using legitimate SaaS APIs.