Ethereum news

Hackers have learned to bypass two-factor authentication using AI • Happy Coin News

  • experts have warned that are using artificial intelligence to create advanced exploits that allow them to bypass multi-factor authentication.
  • Cyber ​​groups are using -powered tools to automate malware and phishing attacks.

Google analysts have warned that hackers are using artificial intelligence to develop advanced zero-day exploits capable of bypassing multi-factor authentication systems.

According to report, these AI tools help cybercriminals find vulnerabilities in software faster, automate certain stages of attacks, and improve techniques such as phishing and the creation of malware. As a result, attackers can identify and exploit security vulnerabilities that were previously difficult to detect.

Hackers are using artificial intelligence at virtually every stage of a cyberattack. Instead of simply sending phishing emails, they use AI to gather information, develop malware, and identify software vulnerabilities. This makes attacks more sophisticated and difficult to detect.

According to Google, the first to use neural networks for criminal purposes were hacker groups linked to China and North Korea. They use carefully crafted queries to extract useful security information from the system. They also pose as cybersecurity experts, scanning firmware and devices for vulnerabilities.

Previously edited Happy Coin News Reported, that in April, the amount from hacks of crypto platforms reached a new record of more than $625 million. In total, in the first three months of 2026, the industry’s losses exceeded $1 billion.

Analyzing security incidents in the crypto industry in 2025-2026, the editorial team Happy Coin News We’re seeing instances of automated attacks using AI tools, which are moving from theoretical threats to everyday reality. While bypassing multi-factor authentication previously required complex social manipulation, today it’s handled by automated AI-powered scripts.

Cryptocurrency Hacks and Scams in 2025: Data Chainalysis

They are able to mimic user behavior with astonishing accuracy, making standard protection methods vulnerable.

My experience analyzing incidents in 2026 allows me to conclude that classic SMS confirmations are no longer a guarantee of security, and it’s time for users to switch to hardware security keys before neural networks learn to bypass them on a mass scale.

Risk Warning:

The information on this website is for informational and educational purposes only and does not constitute investment advice or financial recommendations. Cryptocurrencies and digital assets carry a high level of risk, including possible loss of capital. The editors are not responsible for decisions made based on the published materials. It is recommended that you conduct your own research (DYOR) before making investment decisions. Read the editorial policy. https://happycoin.club/about/

Source

Show More

Geef een reactie

Je e-mailadres wordt niet gepubliceerd. Vereiste velden zijn gemarkeerd met *

Back to top button