
Fact check: Google Lens's AI overviews shared misleading information
This has happened for videos supposedly relating to the wars in Ukraine and Gaza, the India-Pakistan conflict, the June 2025 Air India plane crash and small boat arrivals in the UK.
Full Fact ran a number of searches for screenshots of key moments of misleading videos which we've fact checked in recent months using Google Lens, and found the AI overviews for at least 10 of these clips failed to recognise inauthentic content or otherwise shared false claims about what the images showed.
In four examples, the AI overviews repeated the false claims we saw shared with these clips on social media – claims which Full Fact has debunked. We also found AI overviews changed with each search, even when searching the same thing, so we often weren't able to generate identical or consistent responses.
Google Lens is a visual search tool that analyses images – including stills from videos – and can surface similar pictures found online, as well as text or objects that relate to the image. According to Google, the AI overviews which sometimes appear at the top of Google Lens search results bring together 'the most relevant information from across the web' about the image, including supporting links to related pages.
These AI overviews do have a note at the bottom saying: 'AI responses may include mistakes'. This note links to a page that says: 'While exciting, this technology is rapidly evolving and improving, and may provide inaccurate or offensive information. AI Overviews can and will make mistakes.'
When we asked Google about the errors we identified, a spokesperson said they were able to reproduce some of them, and that they were caused by problems with the visual search result, rather than the AI overviews themselves. They said the search results surface web sources and social media posts that combine the visual match with false information, which then informs the AI overview.
A Google spokesperson told us: 'We aim to surface relevant, high quality information in all our Search features and we continue to raise the bar for quality with ongoing updates and improvements. When issues arise – like if our features misinterpret web content or miss some context – we use those examples to improve and take appropriate action under our policies.'
They added that the AI overviews are backed by search results, and claimed they rarely 'hallucinate'. Hallucination in this context refers to when a model generates false or conflicting information, often presented confidently, although there is some disagreement over the exact definition.
Even if AI overviews are not the source of the problem, as Google argues, they are still spreading false and misleading information on important and sensitive subjects.
Miscaptioned footage
We found several instances of AI overviews repeating claims debunked by Full Fact about real footage miscaptioned on social media.
For example, a viral video claimed to show asylum seekers arriving in Dover in the UK, but this isn't true – it actually appears to show crowds of people on a beach in Goa, India. Despite this, the AI overview generated when we searched a still from this footage repeated the false claim, saying: 'The image depicts a group of people gathered on Dover Beach, a pebble beach on the coast of England.'
Another clip circulated on social media with claims it showed the Air India plane that crashed in Ahmedabad, India, on June 12. The AI overview for a key frame similarly said: 'The image shows an Air India Boeing 787 Dreamliner aircraft that crashed shortly after takeoff from Ahmedabad, India, on June 12, 2025, while en route to London Gatwick.' But this is false – the footage shows a plane taking off from Heathrow in May 2024.
Footage almost certainly generated with AI
In June, we wrote about a video shared on social media with claims it shows 'destroyed Russian warplanes' following Ukraine's drone attacks on Russian aircraft. But the clip is not real, and was almost certainly generated with artificial intelligence.
When searching multiple key frames from the footage with Google Lens, we were given several different AI overviews – none of which mentioned that the footage is not real and is likely to be AI-generated.
The overview given for one screenshot said: 'The image shows two damaged warplanes, possibly Russian, on a paved surface. Recent reports indicate that multiple warplanes have exploded, including Russian aircraft that attacked a military base in Siberia.'
This overview supports the false claim circulating on social media that the video shows damaged Russian warplanes, and while it's true that aircraft at Russia's Belaya military base in Siberia were damaged in that Ukrainian attack, it doesn't make sense to suggest that Russian aircraft attacked a military base in Siberia, which is mostly Russian.
AI overviews given for other screenshots of the clip wrongly claimed 'the image shows the remains of several North American F-82 Twin Mustang aircraft'. F-82s were used by the US Air Force but were retired in 1953. They also had a distinct design, with parallel twin cockpits and single tail sections, which doesn't match any of the planes depicted in the likely AI-generated video.
Footage from a video game
Gameplay footage from the military simulation game Arma 3 often circulates on social media with claims it shows genuine scenes from conflict.
We found several instances when Google Lens's AI overviews failed to distinguish key frames of these clips from real footage, and instead appeared to hallucinate specific scenarios loosely relating to global events.
For example, one Arma 3 clip was shared online with false claims it showed Israeli helicopters being shot down over Gaza. When we searched a key frame with Google Lens, amid Israel-Iran air strikes following Israel's attack on Iranian nuclear infrastructure in June, the AI overview said it showed 'an Israeli Air Force (IAF) fighter jet deploying flares, likely during the recent strikes on Iran'. But the overview did not say that the footage is not real.
Another Arma 3 clip was shared amid conflict between India and Pakistan in May with false claims it showed Pakistan shooting down an Indian Air Force Rafale fighter jet near Bahawalpur in Pakistan.
The AI overview said the image showed 'a Shenyang J-35A fighter jet, recently acquired by the Pakistan Air Force from China'. While there have been recent reports of Pakistan Air Force acquiring some of these Chinese fighter jets, this is not what the footage shows and the AI overview did not say it was from a video game.
Use with caution
Google Lens is an important tool and often the first thing fact checkers use when trying to verify footage, and we've encouraged the public to use it too. This makes the inaccuracy of Google Lens's AI overviews concerning, especially given that the information features prominently at the top of people's search results, meaning false or misleading claims could be the first thing people see.
Full disclosure: Full Fact has received funding from Google and Google.org, Google's charitable foundation. You can see more details about the funding Full Fact receives here. We are editorially independent and our funders have no editorial control over our content.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Scottish Sun
4 hours ago
- Scottish Sun
‘Critical' alert to 3.5bn Google users over ‘high-severity' flaw that could hijack your phone without you doing ANYTHING
The earlier you update, the better GOOG GOD 'Critical' alert to 3.5bn Google users over 'high-severity' flaw that could hijack your phone without you doing ANYTHING Click to share on X/Twitter (Opens in new window) Click to share on Facebook (Opens in new window) IF you use Google's Chrome browser, stop what you're doing and check for an update right now. Google has pushed a fresh security release for Chrome and is urging its billions of users worldwide to install it as soon as possible. Sign up for Scottish Sun newsletter Sign up 1 The company's advisory amounts to a clear 'update now' warning Credit: Getty The company has confirmed the new Stable Channel build is rolling out across desktop and mobile, with fixes for multiple security issues. It's important to note that you are safest after you have updated and restarted your device. What's the problem? Google has flagged a new batch of security flaws, and you should update ASAP. The most serious is CVE-2025-8901 - a high‑severity bug in ANGLE (the graphics tech Chrome uses). In plain English, a dodgy, specially crafted web page could poke at your device's memory where it shouldn't, which is a big no‑no for security. Google's also outlined two medium‑severity issues: CVE-2025-8881: an 'inappropriate implementation' in the File Picker (the bit that lets you choose files to upload). an 'inappropriate implementation' in the File Picker (the bit that lets you choose files to upload). CVE-2025-8882: a 'use‑after‑free' bug in Aura (Chrome's interface layer), which can cause crashes or open the door to further exploits. The good news is that there's no evidence these have been used in real‑world attacks. But some can be triggered remotely by just visiting a malicious page, so don't sit on it - get the latest Chrome update and restart your browser to lock things down. Why it matters Chrome is the most widely used web browser, making it an attractive target for cybercriminals. The latest update includes security fixes that decrease the risk of exposure to malicious websites and infected downloads. Google usually withholds technical details until most users have installed the updates to prevent alerting attackers. This is why it's important to update your browser promptly. Google has confirmed the latest Stable Channel release of Chrome (the latest Stable Channel release) with security fixes for Windows, Mac, and Linux, with Android and iOS following. The company's advisory amounts to a clear 'update now' warning: install the patch and relaunch the browser to be protected. If you leave it for later, Chrome won't fully apply fixes until you close and reopen it. How to update Chrome in 30 seconds On Windows and Mac Open Chrome and click the three dots (top right) Go to Help > About Google Chrome Chrome will check for updates and download automatically Click Relaunch to finish On Android Open Google Play Store Tap your profile > Manage apps & device > Updates available Find Chrome and tap Update (or search for Chrome and update from the app page) Reopen Chrome when it's done On iPhone and iPad Open the App Store Tap Updates (or your profile > Available Updates) Update Google Chrome Reopen the app On Chromebook (ChromeOS) Click the clock > Settings > About ChromeOS Click Check for updates and Restart to update Google Chrome owners can make single click to stay safe – but beware 'red alert' How to check you're protected You don't need to memorise version numbers. After you've updated: Go to Help > About Google Chrome on desktop If it says 'Chrome is up to date' and you've relaunched, you're covered On mobile, open Chrome > Settings > About Chrome to confirm the latest build is installed If your update hasn't appeared yet, don't panic. Google staggers rollouts globally. Try again later today, or grab the latest installer directly from Google's Chrome site and reinstall over the top on the desktop. Managed work devices may be controlled by your IT team, so check with them if updates are blocked. Frequently asked questions Does Incognito keep me safe from exploits? No. Incognito stops Chrome from saving your browsing history locally. It doesn't shield you from security flaws. You still need updates. Do I need to reinstall Chrome every time there's an update? No. Chrome updates itself; you just need to relaunch. Only reinstall if the updater is broken or your install is corrupted. Will I lose my tabs when I relaunch? Enable 'Continue where you left off' to restore tabs after a relaunch. Is this the same as ETAs/patches I see for Android apps? Separate but similar idea. Chrome on Android updates via Google Play like any app. Desktop Chrome has its own updater. What Google hasn't said (yet) - and why You'll see Google acknowledge 'security fixes' without always listing every vulnerability immediately. That's deliberate. By holding back technical specifics for a short window, they make it harder for bad actors to reverse‑engineer the flaw while users are still patching. The takeaway for you is simple: the earlier you update, the better. Why attackers love browsers Your browser sits between you and the internet. If crooks can trick it, they can: Redirect you to fake banking or shopping pages Run code on your device via malicious websites Plant spyware through drive‑by downloads Steal saved passwords and cookies to hijack accounts That's why Google pushes security releases frequently - small, regular patches that keep the bad guys on the back foot. Signs you might have been hit - and what to do Most modern attacks aim to be invisible, but watch for: New toolbars or extensions you don't recognise The home page or the search engine suddenly changed Pop‑ups and redirects on legit sites Unfamiliar logins or security alerts from your accounts If you spot any of the above:


The Sun
5 hours ago
- The Sun
‘Critical' alert to 3.5bn Google users over ‘high-severity' flaw that could hijack your phone without you doing ANYTHING
IF you use Google's Chrome browser, stop what you're doing and check for an update right now. Google has pushed a fresh security release for Chrome and is urging its billions of users worldwide to install it as soon as possible. 1 The company has confirmed the new Stable Channel build is rolling out across desktop and mobile, with fixes for multiple security issues. It's important to note that you are safest after you have updated and restarted your device. What's the problem? Google has flagged a new batch of security flaws, and you should update ASAP. The most serious is CVE-2025-8901 - a high‑severity bug in ANGLE (the graphics tech Chrome uses). In plain English, a dodgy, specially crafted web page could poke at your device's memory where it shouldn't, which is a big no‑no for security. Google's also outlined two medium‑severity issues: CVE-2025-8881: an 'inappropriate implementation' in the File Picker (the bit that lets you choose files to upload). CVE-2025-8882: a 'use‑after‑free' bug in Aura (Chrome's interface layer), which can cause crashes or open the door to further exploits. The good news is that there's no evidence these have been used in real‑world attacks. But some can be triggered remotely by just visiting a malicious page, so don't sit on it - get the latest Chrome update and restart your browser to lock things down. Why it matters Chrome is the most widely used web browser, making it an attractive target for cybercriminals. The latest update includes security fixes that decrease the risk of exposure to malicious websites and infected downloads. Google usually withholds technical details until most users have installed the updates to prevent alerting attackers. This is why it's important to update your browser promptly. Google has confirmed the latest Stable Channel release of Chrome (the latest Stable Channel release) with security fixes for Windows, Mac, and Linux, with Android and iOS following. The company's advisory amounts to a clear 'update now' warning: install the patch and relaunch the browser to be protected. If you leave it for later, Chrome won't fully apply fixes until you close and reopen it. How to update Chrome in 30 seconds On Windows and Mac Open Chrome and click the three dots (top right) Go to Help > About Google Chrome Chrome will check for updates and download automatically Click Relaunch to finish On Android Open Google Play Store Tap your profile > Manage apps & device > Updates available Find Chrome and tap Update (or search for Chrome and update from the app page) Reopen Chrome when it's done On iPhone and iPad Open the App Store Tap Updates (or your profile > Available Updates) Update Google Chrome Reopen the app On Chromebook (ChromeOS) Click the clock > Settings > About ChromeOS Click Check for updates and Restart to update Google Chrome owners can make single click to stay safe – but beware 'red alert' How to check you're protected You don't need to memorise version numbers. After you've updated: Go to Help > About Google Chrome on desktop If it says 'Chrome is up to date' and you've relaunched, you're covered On mobile, open Chrome > Settings > About Chrome to confirm the latest build is installed If your update hasn't appeared yet, don't panic. Google staggers rollouts globally. Try again later today, or grab the latest installer directly from Google's Chrome site and reinstall over the top on the desktop. Managed work devices may be controlled by your IT team, so check with them if updates are blocked. Frequently asked questions Does Incognito keep me safe from exploits? No. Incognito stops Chrome from saving your browsing history locally. It doesn't shield you from security flaws. You still need updates. Do I need to reinstall Chrome every time there's an update? No. Chrome updates itself; you just need to relaunch. Only reinstall if the updater is broken or your install is corrupted. Will I lose my tabs when I relaunch? Enable 'Continue where you left off' to restore tabs after a relaunch. Is this the same as ETAs/patches I see for Android apps? Separate but similar idea. Chrome on Android updates via Google Play like any app. Desktop Chrome has its own updater. What Google hasn't said (yet) - and why You'll see Google acknowledge 'security fixes' without always listing every vulnerability immediately. That's deliberate. By holding back technical specifics for a short window, they make it harder for bad actors to reverse‑engineer the flaw while users are still patching. The takeaway for you is simple: the earlier you update, the better. Why attackers love browsers Your browser sits between you and the internet. If crooks can trick it, they can: Redirect you to fake banking or shopping pages Run code on your device via malicious websites Plant spyware through drive‑by downloads Steal saved passwords and cookies to hijack accounts That's why Google pushes security releases frequently - small, regular patches that keep the bad guys on the back foot. Signs you might have been hit - and what to do Most modern attacks aim to be invisible, but watch for: New toolbars or extensions you don't recognise The home page or the search engine suddenly changed Pop‑ups and redirects on legit sites Unfamiliar logins or security alerts from your accounts If you spot any of the above:


Metro
8 hours ago
- Metro
Google Chrome issues urgent security update to 3,500,000,000 users
Google Chrome users have been warned just weeks after a 'high-severity vulnerability' was detected in the browser. Some 3.5 billion users will be offered an update, which will be rolled out in the coming days and weeks. It comes just weeks after Google issued another update for eight identified flaws, and an emergency patch for a high-severity vulnerability. The exact details of the vulnerability and what has been done to fix it have not been specified by Google. But the tech giant said: 'Access to bug details and links may be kept restricted until a majority of users are updated with a fix. 'We will also retain restrictions if the bug exists in a third-party library that other projects similarly depend on, but haven't yet fixed.' The issues could have been exploited by remote hackers in attacks on users. To update to the latest version of Google and prevent the attacks, go to the Help|About option on the settings menu and follow prompts. Once the update is complete, users must make sure to relaunch their browser to activate the latest version. More Trending The Chrome Stable channel has been updated to 139.0.7258.127/.128 for Windows, Mac and 139.0.7258.127 for Linux. Last month the UK's competition regulator gave an update on their investigation into whether Google has too much power, saying it is a 'key gateway to the internet' and may need to loosen its control. The Competition and Markets Authority (CMA) said today that it is minded to give the tech firm 'strategic market status', after starting to look into this in January This would require Google to follow certain rules around competition with other search engines and ad providers. Get in touch with our news team by emailing us at webnews@ For more stories like this, check our news page. MORE: Man caught naked on patio by Google Street View awarded more than £9,000