Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Artificial Intelligence

AI Can Autonomously Hack Cloud Systems With Minimal Oversight: Researchers 

Palo Alto Networks has developed Zealot, a multi-agent penetration testing PoC capable of reconnaissance, exploitation, and exfiltration. 

AI hack

Researchers at Palo Alto Networks have developed a proof-of-concept designed to test whether an AI system can autonomously hack a cloud environment.

In November 2025, Anthropic said it had analyzed a Chinese espionage campaign that abused Claude Code, with AI being used to perform up to 90% of the campaign, and human intervention required only sporadically. 

Palo Alto Networks Unit 42 researchers wanted to empirically test just how capable AI systems really are against live cloud environments. For that they built and tested an autonomous artificial intelligence system named Zealot, capable of executing sophisticated attacks on cloud infrastructure.

Zealot was tested against an isolated Google Cloud Platform environment with intentional vulnerabilities. The AI was not given specific instructions on what to do and instead it was simply told to exfiltrate sensitive data.

The system is built around a ‘supervisor-agent’ model, in which a central coordinating AI delegates tasks to three specialized sub-agents: one for infrastructure reconnaissance and network mapping, one for web application exploitation and credential extraction, and one for cloud security operations. 

Advertisement. Scroll to continue reading.

Rather than following a rigid, pre-scripted playbook, the supervisor dynamically adjusts its strategy based on what each agent discovers, mirroring how experienced human red teams operate.

Without any further guidance, the system autonomously scanned the network, discovered a connected VM, identified and exploited a web application vulnerability to steal credentials, and ultimately extracted the target data, even granting itself additional permissions when it encountered an access barrier.

One of the most striking findings was that Zealot didn’t just follow instructions — it improvised. In one instance, after compromising a virtual machine, the system independently injected private SSH keys to maintain persistent access, a strategic move that was never part of its original tasking. Researchers described this as ‘emergent intelligence’, where the AI actively invented new attack strategies.

While Zealot was overall highly efficient, the researchers noticed that it sometimes fell into unproductive loops, fixating on irrelevant targets and wasting resources until human operators intervened. 

A degree of human oversight may still be required, but the experiment shows that AI agents can now chain together reconnaissance, exploitation, privilege escalation, and data theft at machine speed, with significant implications for defenders. 

The researchers warn that existing detection systems, built around the behavioral patterns of human attackers, are ill-equipped to detect AI-driven intrusions that move far faster and leave a different digital footprint. 

They urge organizations to proactively audit cloud permissions, restrict access to metadata services, and adopt AI-powered defenses to keep pace with AI threats.

Related: Claude Mythos Finds 271 Firefox Vulnerabilities

Related: Google Antigravity in Crosshairs of Security Researchers, Cybercriminals

Related: CoChat Launches AI Collaboration Platform to Combat Shadow AI

Written By

Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Chris Sistrunk has been promoted to Practice Leader for Mandiant's OT Security Consulting.

Nudge Security has appointed Patrick Dillon as its Chief Revenue Officer.

AutoNation has appointed Brian Fricke as Chief Information Security Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.