Google: AI helped hackers bypass 2FA in zero-day exploit

Serge Bulaev

Serge Bulaev

Google says hackers may have used AI to help bypass two-factor authentication (2FA) in a zero-day attack. The attackers used a script that took advantage of a logic flaw, where a session was wrongly marked as fully verified even though it still needed another authentication step. Google believes the attack script likely came from a large language model, which might help attackers find mistakes in authentication systems that other tools often miss. There is no evidence the flaw was widely exploited, and Google worked quickly to patch the issue and block related malicious activity.

Google: AI helped hackers bypass 2FA in zero-day exploit

Google has confirmed that an AI-assisted attack successfully bypassed two-factor authentication (2FA) in a zero-day exploit, highlighting a new threat vector targeting authentication logic. According to Google's Threat Intelligence team, cybercriminals used an exploit script likely generated by a large language model (LLM) to take advantage of a critical flaw in a popular web administration tool.

How the AI-Assisted Exploit Bypassed 2FA

Attackers used an AI-generated Python script to exploit a logic flaw in an application's authentication flow. After obtaining valid user credentials, the script leveraged a hardcoded trust assumption in the code that incorrectly marked the session as verified, allowing the attacker to completely bypass the required second factor.

The attack, which required valid user credentials to initiate, did not break the MFA mechanism itself but instead circumvented it entirely. According to the Google Cloud blog, the exploit targeted a hardcoded rule that treated a specific session state as fully authenticated, even though a second verification step was still pending. This logic flaw allowed the intruder to skip the MFA check. Google analysts believe the exploit script was created with help from an LLM, noting it contained extensive docstrings and a fabricated CVSS score - details also covered by The Hacker News article.

Why AI Excels at Finding Logic-Based Flaws

Traditional security tools like static scanners and fuzzers are designed to find memory-safety bugs or vulnerabilities related to malformed input. This zero-day exploit, however, was based on a semantic flaw - a type of error in the application's workflow that these tools often miss. As CSO Online notes, frontier LLMs can reason across complex authentication processes to identify these "static anomalies." This suggests attackers will increasingly use generative AI to uncover gaps in business logic, such as misplaced trust flags or improper session exemptions.

The Danger of Hardcoded Trust in Authentication

The vulnerability stemmed from a hardcoded trust assumption, a common but dangerous pattern in many MFA deployments. Security teams should audit their systems for similar pitfalls, which often include:
- Static allowlists for IPs or devices that never expire.
- "Remember this device" tokens that aren't periodically revalidated.
- Implicit trust based on network location (e.g., assuming a VPN connection is always secure).
- Permanent recovery codes that bypass all step-up authentication checks.

The key lesson from this incident is to eliminate unconditional trust from authentication workflows and move toward continuous verification.

How to Defend Against AI-Accelerated Attacks

While Google and the vendor acted quickly to patch the flaw, the incident serves as a blueprint for future attacks. To mitigate risks from similar AI-assisted exploits, experts recommend a shift toward a zero-trust model with continuous, adaptive authentication. Key defensive strategies include:
- Adopting Adaptive Policies: Instead of "trust once," re-evaluate trust on every request by examining device posture, IP reputation, and user behavior.
- Implementing Phishing-Resistant MFA: Replace SMS and email codes with stronger factors like passkeys or hardware security keys to close fallback channels.
- Auditing Exception Logic: Routinely review and time-limit any rules that bypass MFA to prevent temporary exceptions from becoming permanent backdoors.

These principles, outlined in guides like the Exabeam 2026 Zero Trust guide and analysis from firms like FusionTek, are critical for countering the "hardcoded trust" bugs that AI is now adept at finding.