Cybersecurity

Google Reveals How China’s APT31 Weaponized Gemini AI

Imagine building a cutting-edge tool to help developers code faster, only to watch a state-sponsored hacking group use it to plan a digital break-in. This isn’t a hypothetical scenario; it’s exactly what Google confirmed this week. On February 12, 2026, Google’s Threat Intelligence Group (GTIG) revealed that China-backed hackers, known as APT31, have been actively using Google’s own Gemini AI to plan and execute cyberattacks against US organizations.

This isn’t just a case of a hacker asking a chatbot for a phishing email template. The report details a significant shift toward what experts call “agentic” threats—where attackers use AI not just to write text, but to autonomously interact with security tools. It’s a complex development that blurs the line between routine security testing and malicious reconnaissance.

How did APT31 actually use Gemini?

According to the research findings, APT31 didn’t just casually chat with Gemini. They employed a “highly structured approach” involving specific expert personas designed to bypass safety filters and generate comprehensive testing plans. The group, also known as Zirconium or Violet Typhoon, has a history of targeting critical infrastructure, and this latest move shows they are evolving their toolkit.

Illustration related to China's APT31 Google Gemini Hacks: Full Report (2026)

The most alarming detail is their use of a tool called “Hexstrike.” This is an open-source red-teaming tool built on the Model Context Protocol (MCP). If you aren’t familiar with MCP, think of it as a bridge that allows a Large Language Model (LLM) like Gemini to talk directly to other software.

By using Hexstrike, APT31 was able to connect Gemini to actionable security tools, automating the analysis of vulnerabilities like Remote Code Execution (RCE) and SQL injection. Instead of manually typing commands, the AI could help orchestrate the attack flow against specific US targets. Google noted that this activity “explicitly blurs the line” between a security audit and a targeted attack.

Get our analysis in your inbox

No spam. Unsubscribe anytime.

Share this article

Leave a Comment