• Support
  • (+84) 246.276.3566 | contact@eastgate-software.com
  • Request a Demo
  • Privacy Policy
English
English 日本語 Deutsch
Eastgate Software A Global Fortune 500 Company's Strategic Partner
  • Home
  • Company
  • Services
    • Business Process Optimization
    • Custom Software Development
    • Systems Integration
    • Technology Consulting
    • Cloud Services
    • Data Analytics
    • Cybersecurity
    • Automation & AI Solutions
  • Case Studies
  • Blog
  • Resources
    • Life
    • Ebook
    • Tech Enthusiast
  • Careers
CONTACT US
Eastgate Software
  • Home
  • Company
  • Services
    • Business Process Optimization
    • Custom Software Development
    • Systems Integration
    • Technology Consulting
    • Cloud Services
    • Data Analytics
    • Cybersecurity
    • Automation & AI Solutions
  • Case Studies
  • Blog
  • Resources
    • Life
    • Ebook
    • Tech Enthusiast
  • Careers
CONTACT US
Eastgate Software
Home Tech Enthusiast
April 1, 2026

State-Sponsored Hackers Use AI Tools Like Gemini in Cyberattacks

AI Cyberattacks

State-Sponsored Hackers Use AI Tools Like Gemini in Cyberattacks

State-sponsored hackers are increasingly integrating artificial intelligence into cyber operations. Google’s Threat Intelligence Group (GTIG) reports that actors linked to Iran, North Korea, China, and Russia are using models such as Google’s Gemini to enhance reconnaissance, phishing, and malware development. 

According to Google’s late-2025 AI Threat Tracker, large language models are now embedded across multiple stages of the attack lifecycle. GTIG researchers state that for government-backed threat actors, AI models have become essential tools for technical research, target profiling, and generating high-fidelity phishing lures. 

Iranian group APT42 reportedly used Gemini to create official-looking email addresses and conduct detailed research to craft credible pretexts. The group refined language and translated content to avoid traditional phishing red flags, such as grammatical errors. North Korean actor UNC2970 used Gemini to profile defence-sector targets, mapping job roles and gathering salary data. GTIG noted that this activity increasingly blurs the line between legitimate professional research and malicious reconnaissance. 

Beyond social engineering, Google identified a rise in model extraction attempts targeting Gemini. One campaign used more than 100,000 prompts in an effort to replicate the model’s reasoning capabilities. GTIG also observed malware such as HONESTCUE leveraging Gemini’s API to dynamically generate C# code, enabling fileless execution directly in memory. Separately, phishing kits like COINBAIT were likely accelerated using AI code-generation platforms. 

Despite these developments, GTIG reports no breakthrough capabilities that fundamentally change the threat landscape. However, AI is increasing the speed, scale, and efficiency of cyber operations. For enterprise security teams, particularly in regions facing persistent state-sponsored threats, the findings highlight the need to strengthen defences against AI-augmented reconnaissance, phishing, and automated malware generation. 

 

Source: 

https://www.artificialintelligence-news.com/news/state-sponsored-hackers-ai-cyberattacks-google/  

Tags: AiCyberattacksGeminiGoogle
Something went wrong. Please try again.
Thank you for subscribing! You'll start receiving Eastgate Software's weekly insights on AI and enterprise tech soon.
ShareTweet

Categories

  • AI (144)
  • Application Modernization (4)
  • Case study (34)
  • Cloud Migration (24)
  • Cybersecurity (15)
  • Digital Transformation (8)
  • DX (12)
  • Ebook (12)
  • ERP (28)
  • Fintech (19)
  • Fintech & Trading (1)
  • Intelligent Traffic System (1)
  • ITS (5)
  • Life (23)
  • Logistics (1)
  • Low-Code/No-Code (15)
  • Manufacturing Industry (1)
  • Microservice (11)
  • Product Development (27)
  • Tech Enthusiast (503)
  • Technology Consulting (55)
  • Uncategorized (2)

Tell us about your project idea!

Sign up for our weekly newsletter

Stay ahead with Eastgate Software, subscribe for the latest articles and strategies on AI and enterprise tech.

Something went wrong. Please try again.
Thank you for subscribing! You'll start receiving Eastgate Software's weekly insights on AI and enterprise tech soon.

Eastgate Software

We Drive Digital Transformation

Eastgate Software 

We Drive Digital Transformation.

  • Services
  • Company
  • Resources
  • Case Studies
  • Contact
Services

Case Studies

Company

Contact

Resources
  • Youtube
  • Facebook
  • Linkedin
  • Outlook
  • Twitter
DMCA.com Protection Status

Copyright © 2024.  All rights reserved.

  • Home
  • Company
  • Services
    • Business Process Optimization
    • Custom Software Development
    • Systems Integration
    • Technology Consulting
    • Cloud Services
    • Data Analytics
    • Cybersecurity
    • Automation & AI Solutions
  • Case Studies
  • Blog
  • Resources
    • Life
    • Ebook
    • Tech Enthusiast
  • Careers

Support
(+84) 246.276.35661 contact@eastgate-software.com

  • Request a Demo
  • Privacy Policy