Gemini Vulnerability: How AI Can Be Exploited for Phishing Attacks