Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Can Manipulate Claude AI APIs with Indirect Prompts to Steal User Data

Hackers Can Manipulate Claude AI APIs with Indirect Prompts to Steal User Data

Posted on November 3, 2025November 3, 2025 By CWS

Hackers can exploit Anthropic’s Claude AI to steal delicate consumer knowledge. By leveraging the mannequin’s newly added community capabilities in its Code Interpreter device, attackers can use oblique immediate injection to extract non-public data, comparable to chat histories, and add it on to their very own accounts.

This revelation, detailed in Rehberger’s October 2025 weblog put up, underscores the rising dangers as AI techniques turn into more and more related to the surface world.

In line with Johann Rehberger, the flaw hinges on Claude’s default “Package deal managers solely” setting, which allows community entry to a restricted checklist of accepted domains, together with api.anthropic.com.

Whereas supposed to let Claude set up software program packages securely from websites like npm, PyPI, and GitHub, this whitelist opens a backdoor. Rehberger confirmed that malicious prompts hidden in paperwork or consumer inputs can trick the AI into executing code that accesses consumer knowledge.

Oblique Prompts Assault Chain

Rehberger’s proof-of-concept assault begins with oblique immediate injection, the place an adversary embeds dangerous directions in seemingly innocuous content material, like a file the consumer asks Claude to investigate.

Leveraging Claude’s current “reminiscence” function, which lets the AI reference previous conversations, the payload instructs the mannequin to extract current chat knowledge and reserve it as a file within the Code Interpreter’s sandbox, particularly at /mnt/user-data/outputs/good day.md.

Subsequent, the exploit forces Claude to run Python code utilizing the Anthropic SDK. This code units the atmosphere variable for the attacker’s API key and uploads the file by way of Claude’s Recordsdata API.

Crucially, the add targets the attacker’s account, not the sufferer’s, bypassing regular authentication. “This labored on the primary attempt,” Rehberger famous, although Claude later grew cautious of apparent API keys, requiring obfuscation with benign code like easy print statements to evade detection.

A demo video and screenshots illustrate the method: An attacker views their empty console, the sufferer processes a tainted doc, and moments later, the stolen file seems within the attacker’s dashboard as much as 30MB per add, with a number of uploads doable. This “AI kill chain” might lengthen to different allow-listed domains, amplifying the risk.

Rehberger responsibly disclosed the problem to Anthropic on October 25, 2025, by way of HackerOne. Initially dismissed as a “mannequin security subject” and out of scope, Anthropic later acknowledged it as a legitimate vulnerability on October 30, citing a course of error.

The corporate’s documentation already warns of information exfiltration dangers from community egress, advising customers to observe periods carefully and halt suspicious exercise.

Specialists like Simon Willison spotlight this as a part of the “deadly trifecta” in AI safety: highly effective fashions, exterior entry, and prompt-based management.

For mitigation, Anthropic might implement sandbox guidelines limiting API calls to the logged-in consumer’s account. Customers ought to disable community entry or whitelist domains sparingly, avoiding the false safety of defaults.

As AI instruments like Claude combine deeper into workflows, such exploits remind us that connectivity breeds hazard. With out strong safeguards, what begins as useful automation might turn into a hacker’s playground.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:APIs, Claude, Data, Hackers, Indirect, Manipulate, Prompts, Steal, User

Post navigation

Previous Post: Microsoft Patch for WSUS Flaw has Broken Hotpatching on Windows Server 2025
Next Post: Malicious VSX Extension “SleepyDuck” Uses Ethereum to Keep Its Command Server Alive

Related Posts

Threat Actors Leverage SharePoint Services in Sophisticated AiTM Phishing Campaign Threat Actors Leverage SharePoint Services in Sophisticated AiTM Phishing Campaign Cyber Security News
JumpCloud Remote Assist for Windows Agent Flaw Let Attackers Escalate Privilege JumpCloud Remote Assist for Windows Agent Flaw Let Attackers Escalate Privilege Cyber Security News
Dark Partners Hackers Group Wiping Crypto Wallets With Fake Ai Tools and VPN Services Dark Partners Hackers Group Wiping Crypto Wallets With Fake Ai Tools and VPN Services Cyber Security News
New Botnet Hijacks 9,000 ASUS Routers & Enables SSH Access by Injecting Public Key New Botnet Hijacks 9,000 ASUS Routers & Enables SSH Access by Injecting Public Key Cyber Security News
Global Authorities Share IoCs and TTPs of Scattered Spider Behind Major ESXi Ransomware Attacks Global Authorities Share IoCs and TTPs of Scattered Spider Behind Major ESXi Ransomware Attacks Cyber Security News
Microsoft Patch Tuesday July 2025: 130 Vulnerabilities Fixed Including 41 RCE Microsoft Patch Tuesday July 2025: 130 Vulnerabilities Fixed Including 41 RCE Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News