Resources
Blog
Blog
Blog

AI Is Now Writing Zero-Days. Here's How Security Teams Fight Back.

Google's Mandiant just confirmed six ways AI is turbocharging exploitation. Zafran was built to stop each one - from compensating controls to agentic defense.

Author:
Zafran Team
,
Published on
May 11, 2026
Blog

AI Is Now Writing Zero-Days. Here's How Security Teams Fight Back.

Threat actors are no longer just using AI to draft phishing emails. Google's Threat Intelligence Group (Mandiant) has confirmed what security teams feared: AI is now used to discover, develop, and deploy zero-day exploits at machine speed - with one confirmed case of an AI-authored exploit prepared for mass exploitation.

The race between attackers and defenders has always been asymmetric. Humans can patch roughly one critical vulnerability every 49 days. Adversaries can now identify and weaponize a new vulnerability in as few as 5 days. AI doesn't close that gap - it annihilates it.

The Mandiant report identifies six distinct AI-enabled attack vectors that together represent a qualitative shift in the threat landscape. Each one demands a response that is faster, more intelligent, and more automated than today's vulnerability management processes can provide. This post walks through all six - and maps each one to where Zafran stops it.

Time-to-Exploit (AI-Assisted) 5 days

From vulnerability disclosure to working exploit, with AI automation. Mandiant 2024.

Average Time-to-Patch (Enterprise) 49 days

Average enterprise patch cycle across critical infrastructure. Mandiant 2024.

"Humans can no longer defend against machine-speed exploitation. The only answer is AI-native exposure management that acts in the gap."

This is not a future problem. GTIG confirmed that state-sponsored actors from the PRC and DPRK, as well as criminal groups, are already using frontier language models across every phase of the kill chain - reconnaissance, exploit development, evasion, and now autonomous attack orchestration. The six vectors below are not theoretical. They are in use today.

The Six AI-Enabled Attack Vectors

The Mandiant report maps a comprehensive picture of how AI is reshaping adversarial capability. Here is a condensed view of all six before we examine each one in depth.

VECTOR 01

AI-Generated Zero-Day Exploit Development

LLMs reverse-engineer apps, analyze firmware, and identify logic-level vulnerabilities faster than any human team. One criminal actor built an AI-authored Python exploit for a 2FA bypass zero-day planned for mass exploitation.

VECTOR 02

Polymorphic, Evasive Malware

PROMPTFLUX, HONESTCUE, and CANFAIL are AI-generated malware families that continuously mutate to evade EDR and AV signatures - rendering traditional detection-based defenses unreliable.

VECTOR 03

Autonomous Self-Navigating Malware

PROMPTSPY is an AI-powered infostealer that autonomously navigates victim devices, selects high-value targets, and extracts credentials and data - without human command-and-control direction.

VECTOR 04

Agentic Attack Frameworks

APT45 (DPRK) and PRC actors use AI to automate reconnaissance, send thousands of LLM prompts to validate CVE exploitability, and orchestrate multi-stage attacks at industrial scale.

VECTOR 05

Obfuscated LLM Access Networks

Criminal actors build proxies and pass-through services to access frontier AI models with stolen API keys - hiding their identity while running automated attack operations at massive scale.

VECTOR 06

Supply Chain Attacks on AI Agents

New class of attack targeting the AI agent ecosystem itself: poisoning LiteLLM and OpenClaw routing infrastructure to intercept and manipulate AI agent communications and actions.

Taken together, these six vectors describe an adversarial machine that can discover vulnerabilities, build exploits, evade defenses, navigate victim environments, and now attack the AI infrastructure you're building to defend yourself - all at speeds no human-driven security program can match.

90% False Critical Reduction

Zafran proves 90% of so-called "critical" vulnerabilities are not exploitable in your environment.

70% Zero-Days First

70% of vulnerabilities in 2023 were first exploited as zero-days before a CVE patch existed. Mandiant, Oct 2024.

5 days Time-to-Exploit

Average time from disclosure to active exploitation. AI is compressing this toward zero.

49 days Time-to-Patch

Average enterprise patch cycle. The gap between these two numbers is where breaches happen.


Vector 01 · AI-Generated Zero-Day Exploit Development

What Mandiant found: State-sponsored actors from the PRC and DPRK are using frontier LLMs to reverse-engineer applications, analyze firmware, and identify high-level semantic logic flaws - the kind that traditional scanners miss entirely. A criminal actor used AI to build a Python script exploiting a 2FA bypass zero-day in a popular web admin tool, prepared for mass exploitation. APT45 is sending thousands of automated prompts to recursively analyze CVEs and validate PoC exploits at scale.

The implication: the number of exploitable CVEs is no longer bounded by human analyst capacity. AI can enumerate and weaponize CVEs faster than any team can patch - and it can do so across your entire CVE backlog simultaneously.

Zafran Response · Vector 01
  • Compensating Control Correlation: Zafran's Exposure Graph correlates every vulnerability against your deployed EDR, NGFW, and WAF configurations in real time. When a new AI-generated exploit surfaces for a CVE, Zafran immediately determines whether your existing controls already neutralize it - instantly separating signal from noise.
  • Proactive Exposure Hunting™: Zafran's Exposure Tracker monitors newly disclosed and newly weaponized CVEs and maps them to your environment before attackers reach you - proactive hunting instead of reactive firefighting.
  • Zero-Day Response Automation: Within hours of a new zero-day disclosure, Zafran's AI agents identify exposed assets, determine whether compensating controls are in place, and trigger automated mitigations through your existing tooling - without waiting on a patch that may be 49 days away.

Vector 02 · Polymorphic, Evasive Malware

What Mandiant found: PROMPTFLUX, HONESTCUE, and CANFAIL are AI-generated malware families designed to continuously mutate their signatures and behavior to evade EDR and AV detection. Unlike traditional polymorphic malware, these use LLMs to reason about what evasion technique will work best against a specific target environment.

The consequence: signature-based detection - the foundation of most endpoint security stacks - is now systematically unreliable against well-resourced adversaries.

Zafran Response · Vector 02
  • Control Configuration Verification: Zafran continuously validates that your EDR and security tool configurations are correctly deployed and actively enforcing policies - moving beyond "is the tool installed?" to "is it actually working as intended?"
  • Behavioral Coverage Gap Detection: When a new evasive malware family emerges, Zafran maps your control configurations against the known TTPs, identifying coverage gaps before they become breach paths. Your existing stack becomes smarter, not just bigger.
  • Mitigation Without Patch: Where signature-based controls are bypassed, Zafran identifies network-layer and firewall-based compensating controls that block exploit delivery paths entirely - containment before infection.

Vector 03 · Autonomous Self-Navigating Malware

What Mandiant found: PROMPTSPY is a next-generation infostealer that doesn't wait for command-and-control instructions. Once inside a network, it uses embedded LLM reasoning to autonomously navigate the victim environment, identify high-value targets (credentials, intellectual property, privileged accounts), and exfiltrate data - on its own, in real time, adapting to whatever it finds.

This represents a fundamental shift: malware that reasons about your environment is exponentially more dangerous than malware that follows pre-programmed rules. Traditional lateral movement detection is calibrated against rule-based adversaries. PROMPTSPY breaks that calibration.

Zafran Response · Vector 03
  • Asset Inventory and Exposure Mapping: Zafran's continuous agentless discovery via existing EDR agents maintains an always-current, ground-truth inventory of every asset, their software stack, and their exposure surface - so when autonomous malware moves laterally, you know exactly what it's navigating toward.
  • Privileged Access Path Analysis: Zafran's Exposure Graph identifies the high-value targets that autonomous malware will prioritize, enabling proactive hardening of lateral movement paths before an incident occurs.
  • Real-Time Mitigation Trigger: Agentic Exposure Management continuously re-evaluates exposure across assets as the threat landscape shifts. When PROMPTSPY-class movement patterns emerge, automated mitigation actions deploy through existing EDR controls without manual intervention.

Vector 04 · Agentic Reconnaissance and Attack Orchestration

What Mandiant found: APT45 (DPRK) and PRC-affiliated actors use AI agents to automate the entire reconnaissance and exploit validation cycle. They send thousands of automated prompts to analyze CVEs, validate exploitability against specific target configurations, and orchestrate multi-stage attacks - collapsing the time between "discovered vulnerability" and "active exploitation" from weeks to hours.

What used to require a team of skilled analysts can now be run as an automated pipeline. Adversaries are scaling their intelligence operations with the same agentic AI paradigm that enterprises are only beginning to adopt defensively.

Zafran Response · Vector 04
  • Agentic Exposure Management: Zafran's autonomous AI agents - launched December 2025 - run continuous exposure assessment, prioritize remediation, identify asset owners, determine patch impact, and where safe, take direct action through existing controls. Defenders now operate at attacker speed.
  • Threat-Context Enrichment: Every CVE in Zafran's system is enriched with live threat actor activity data, EPSS scores, and CISA KEV status - so your team knows not just that a vuln exists, but that APT45 is actively trying to exploit it right now, in environments like yours.
  • Automated Remediation Routing: Zafran's AI-powered deduplication produces a single "golden ticket" per vulnerability, auto-routes it to the right owner in Jira or ServiceNow, and provides the context needed to act immediately - no analyst required to stitch the story together.

Vector 05 · Obfuscated LLM Access for Attack Operations

What Mandiant found: Criminal groups are building proxy networks and pass-through services to access frontier AI models using stolen API keys - running their attack automation pipelines at massive scale while hiding behind layers of obfuscation. The same infrastructure used to power enterprise AI is being rented out to adversaries.

This is an operational security and supply chain challenge: it means some of the AI-generated exploits and reconnaissance you're facing are powered by the same frontier models your own team is using for productivity.

Zafran Response · Vector 05
  • Exposure Regardless of Attacker Tooling: Zafran's approach is attacker-tool-agnostic. Whether an exploit was hand-crafted by a nation-state analyst or generated in seconds by a stolen LLM API key, the question Zafran answers is the same: does your environment have a compensating control in place that stops it? If not, Zafran deploys one.
  • Speed Symmetry: Industrial-scale attack automation demands industrial-scale defense automation. Zafran's continuous scan-to-remediation pipeline operates at the same frequency as attacker tooling - ensuring that when new exploits emerge at volume, your coverage determination is already complete.

Vector 06 · Supply Chain Attacks on AI Agent Ecosystems

What Mandiant found: A new and particularly sophisticated attack class targets the AI agent infrastructure itself. GTIG documented attacks against LiteLLM and OpenClaw - AI model routing and orchestration services used by enterprise security and DevOps teams. By compromising these routing layers, adversaries can intercept, manipulate, or corrupt the actions of AI agents operating inside your environment.

This is the frontier threat: as enterprises deploy AI agents to automate security operations, those agents themselves become attack surface. An AI agent that is compromised at the LLM routing layer can be made to take incorrect actions, ignore critical findings, or exfiltrate data while appearing to operate normally.

Zafran Response · Vector 06
  • Exposure Gateway for AI Environments: Zafran's Exposure Gateway extends compensating control analysis to AI agent infrastructure - validating the security posture of LLM routing layers, agent communication channels, and AI tool integrations as first-class assets in your exposure graph.
  • Agentic Security Coverage: Every AI agent your organization deploys - for security automation, DevOps, or productivity - can be assessed for exposure using the same Zafran framework applied to traditional endpoints. CVEs in LiteLLM, OpenClaw, LangChain, and other agent frameworks are tracked and correlated against your compensating controls.
  • Trust Boundary Enforcement: Zafran identifies gaps in the trust model between AI agents and the resources they access - flagging over-privileged agent credentials, unmonitored tool call paths, and missing network controls that could allow a compromised agent to operate outside its intended scope.

The Zafran Platform: Built for the AI Exploitation Era

Zafran is not a detection tool. It is an exposure management platform - one that works by understanding your environment's actual defensive posture and proving which threats can reach you, and which ones can't. That philosophy maps perfectly onto the AI exploitation threat: no matter how fast attackers generate exploits, the answer is always the same question: does your environment have a control in place that stops this specific attack path?

Attack Vector Zafran Capability Outcome
AI-Generated Zero-Days Compensating Control Correlation + Proactive Exposure Hunting™ 90% of critical alerts proven non-exploitable; remaining 10% auto-mitigated in hours
Polymorphic Malware Control Configuration Verification + Gap Detection EDR and firewall configs validated against TTP coverage; gaps closed before malware lands
Autonomous Malware Navigation Continuous Asset Inventory + Lateral Movement Path Hardening High-value targets identified and hardened proactively; automated mitigation at detection
Agentic Attack Orchestration Agentic Exposure Management + Real-Time Threat Enrichment Defensive automation matches attacker automation speed; live threat context in every ticket
LLM-Powered Attack Scale Continuous Scan-to-Remediation Pipeline Coverage determination complete before mass exploitation window opens
AI Agent Supply Chain Attacks Exposure Gateway + Agentic Security Coverage AI agent infrastructure treated as first-class exposure surface; trust boundaries enforced
"From vulnerability to exposure. From exposure to compensation control. From missing control to Exposure Gateway. Zafran covers the full arc - and now extends it to the AI agents defending your organization.

The Mandiant report is a signal flare. The attackers are already operating at AI speed. The security teams that will survive this shift are the ones that move from reactive patching to proactive exposure management - using their existing defenses as the primary weapon, augmented by autonomous AI agents that never stop scanning, never stop correlating, and never stop closing the gap.

The New Operating Model

Vulnerability management was designed for a world where human analysts reviewed CVE lists and triaged based on CVSS scores. That world no longer exists. The Mandiant report confirms what every enterprise security team already feels: the volume, speed, and sophistication of exploitation has crossed a threshold where human-paced processes cannot keep up.

The answer is not to patch faster. Enterprises cannot patch at machine speed. The answer is to change what it means to be secure - and that starts with knowing, in real time, which vulnerabilities in your environment are actually exploitable given your specific deployed controls.

That is what Zafran does. And now, with the Exposure Gateway and Agentic Exposure Management, it extends that same discipline to the AI infrastructure that will define the next generation of your security architecture.

The six vectors in the Mandiant report are not isolated findings. They are a connected picture of an adversarial AI ecosystem that is already operational. The defensive response has to be equally connected, equally automated, and equally intelligent.

No New Agents Required

Zafran Discover uses your existing EDR telemetry for continuous agentless scanning.

Hours Zero-Day Response Time

From zero-day disclosure to compensating control verification and mitigation deployment.

1 Ticket Per Vulnerability

AI-powered deduplication produces a single actionable "golden ticket" routed to the right owner.

If your team is still measuring security by CVSS scores and patch SLAs, the AI exploitation era will expose that model for what it is: a speedometer in a world that now runs on jet fuel.

The security teams winning right now are the ones asking a different question. Not "how fast can we patch?" but "which of these thousands of CVEs can actually reach us - and what can we do about it today, without waiting?"

That question has one answer. And it runs on an Exposure Graph.

A Practical Guide: Evolving from VM to CTEM

Traditional vulnerability management must change. So many are drowning in detections, and still lack insights. The time-to-exploit window sits at 5 days. Implementing a Continuous Threat Exposure Management (CTEM) program is the path forward. Moving from vulnerability management to CTEM doesn't have to be complicated. This guide outlines steps you can take to begin, continue, or refine your CTEM journey.

Download Now
CTEM Whitepaper cover
Discover how Zafran Security can streamline your vulnerability management processes.
Request a demo today and secure your organization’s digital infrastructure.
Request Demo
On This Page
Share this article: