AI-Generated Zero-Day Weaponized: Google Warns as North Korea Hijacks Git Hooks and ODINI Exfiltrates via Magnetic Emissions

Google warns AI can now autonomously craft zero-day exploits as North Korean hackers weaponize Git hooks and ODINI malware exfiltrates data from air-gapped computers via CPU magnetic emissions.

CSBadmin
3 Min Read

Google has issued a stark warning that threat actors are now using artificial intelligence to autonomously create working zero-day exploits, marking a significant escalation in offensive cyber capabilities. The AI models were observed successfully generating exploit code for previously unknown vulnerabilities, dramatically reducing the time from discovery to weaponization. In parallel, North Korean hacking groups have developed a novel technique weaponizing Git hooks to deploy cross-platform malware that infects developer environments across Windows, Linux, and macOS. By injecting malicious scripts into the pre-commit and post-merge hooks of Git repositories, the attackers ensure their payload runs every time code is committed or synced, enabling persistent access to source code, credentials, and CI/CD pipelines.

ODINI Malware Breaches Faraday-Shielded Systems via CPU Magnetic Emissions

Researchers have unveiled ODINI, a strain of malware that can exfiltrate data from air-gapped computers protected by Faraday cages. ODINI modulates the CPU’s magnetic field emissions generated during normal operations to encode stolen data, which is then received by a nearby smartphone or IoT device acting as a magnetic receiver. This side-channel technique bypasses physical isolation, network firewalls, and even electromagnetic shielding by leveraging the inherent magnetic leakage from processor cores during controlled workloads. The attack does not require any network connection, USB port access, or direct physical contact with the target machine.

Critical Ollama Memory Leak and Microsoft Patch Tuesday Remediate Massive Attack Surface

A critical memory leak vulnerability in Ollama, an open-source large language model deployment framework, has been disclosed, potentially exposing over 300,000 Ollama servers worldwide to remote data theft. The flaw leaks inference session data and sensitive model prompts from adjacent tenants on shared infrastructure. Meanwhile, Microsoft’s May 2026 Patch Tuesday addressed 120 vulnerabilities, including 29 critical remote code execution (RCE) flaws affecting Windows, Office, and the .NET framework. Administrators are urged to prioritize patching Ollama instances and the Microsoft RCE bugs (including CVE-2026-29145) as attackers are already developing exploits combining the AI-generated zero-day techniques with ODINI-style exfiltration methods.

Sources: https://cybersecuritynews.com/ai-zero-day-exploit/ , https://cybersecuritynews.com/bitunlocker-downgrade-attack-on-windows-11/ , https://cybersecuritynews.com/claudes-chrome-extension-vulnerability/ , https://cybersecuritynews.com/darkmoon-penetration-testing-platform/ , https://cybersecuritynews.com/fortinet-enterprise-products-vulnerabilities/ , https://cybersecuritynews.com/fortinet-fortisandbox-vulnerability/ , https://cybersecuritynews.com/ghostlock-attack/ , https://cybersecuritynews.com/hackers-hijack-microsoft-teams/ , https://cybersecuritynews.com/hackers-use-weaponized-jpeg-file/ , https://cybersecuritynews.com/ivanti-patches-multiple-vulnerabilities/ , https://cybersecuritynews.com/lets-encrypt-halts-certificate-issuance/ , https://cybersecuritynews.com/microsoft-365-copilot-vulnerabilities-data/ , https://cybersecuritynews.com/microsoft-patch-tuesday-may-2026/ , https://cybersecuritynews.com/new-stealthy-vidar-stealer-campaign/ , https://cybersecuritynews.com/no-blind-spots-how-top-mssps-prevent-incidents-withlive-threat-visibility/ , https://cybersecuritynews.com/north-korean-hackers-weaponize-git-hooks/ , https://cybersecuritynews.com/odini-malware-air-gapped-computers/ , https://cybersecuritynews.com/ollama-vulnerability-exposes-servers/

Source: Cyber Security News

CSBadmin

The latest in cybersecurity news and updates.

Share This Article
Follow:
The latest in cybersecurity news and updates.