Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Claude AI APIs Can Be Abused for Data Exfiltration

Posted on November 3, 2025November 3, 2025 By CWS

Attackers can use oblique immediate injections to trick Anthropic’s Claude into exfiltrating knowledge the AI mannequin’s customers have entry to, a safety researcher has found.

The assault, Johann Rehberger of Embrace The Purple explains, abuses Claude’s Recordsdata APIs, and is just doable if the AI mannequin has community entry (a function enabled by default on sure plans and meant to permit Claude to entry sure assets, comparable to code repositories and Anthropic APIs).

The assault is comparatively simple: an oblique immediate injection payload can be utilized to learn person knowledge and retailer it in a file in Claude Code Interpreter’s sandbox, after which to trick the mannequin into interacting with the Anthropic API utilizing a key supplied by the attacker.

The code within the payload requests Claude to add the Code Interpreter file from the sandbox however, as a result of the attacker’s API secret is used, the file is uploaded to the attacker’s account.

“With this system an adversary can exfiltrate as much as 30MB without delay in keeping with the file API documentation, and naturally we are able to add a number of recordsdata,” Rehberger explains.

After the preliminary try was profitable, Claude refused the payload, particularly with the API key in plain textual content, and Rehberger needed to combine benign code within the immediate injection, to persuade Claude that it doesn’t have malicious intent.

The assault begins with the person loading a malicious doc obtained from the attacker in Claude for evaluation. The exploit code hijacks the mannequin, which follows the malicious directions to reap the person’s knowledge, reserve it to the sandbox, after which name the Anthropic File API to ship it to the attacker’s account.

In keeping with the researcher, the assault can be utilized to exfiltrate the person’s chat conversations, that are saved by Claude utilizing the newly launched ‘recollections’ function. The attacker can view and entry the exfiltrated file of their console.Commercial. Scroll to proceed studying.

The researcher disclosed the assault to Anthropic by way of HackerOne on October 25, however the report was closed with the reason that this was a mannequin security difficulty and never a safety vulnerability.

Nonetheless, after publishing data on the assault, Rehberger was notified by Anthropic that the information exfiltration vulnerability is in-scope for reporting.

Anthropic’s documentation underlines the dangers related to Claude having community entry and of potential assaults carried out by way of exterior recordsdata or web sites resulting in code execution and data leaks. It additionally supplies really useful mitigations towards such assaults.

SecurityWeek has emailed Anthropic to inquire whether or not the corporate plans to plot a mitigation for such assaults.

Associated: All Main Gen-AI Fashions Susceptible to ‘Coverage Puppetry’ Immediate Injection Assault

Associated: Nvidia Triton Vulnerabilities Pose Huge Danger to AI Fashions

Associated: AI Sidebar Spoofing Places ChatGPT Atlas, Perplexity Comet and Different Browsers at Danger

Associated: Microsoft: Russia, China More and more Utilizing AI to Escalate Cyberattacks on the US

Security Week News Tags:Abused, APIs, Claude, Data, Exfiltration

Post navigation

Previous Post: Cybercriminals Exploit Remote Monitoring Tools to Infiltrate Logistics and Freight Networks
Next Post: Conti Group Member Responsible for Deploying Ransomware Extradited to USA

Related Posts

CMMC Live: Pentagon Demands Verified Cybersecurity From Contractors Security Week News
Unpatched Ruckus Vulnerabilities Allow Wireless Environment Hacking Security Week News
French Soccer Federation Hit by Cyberattack, Member Data Stolen Security Week News
Anne Arundel Dermatology Data Breach Impacts 1.9 Million People Security Week News
Chrome to Distrust Chunghwa Telecom and Netlock Certificates Security Week News
Meta Paid Out $4 Million via Bug Bounty Program in 2025 Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • China-Aligned APT Hackers Exploit Windows Group Policy to Deploy Malware
  • Amazon Catches North Korean IT Worker by Tracking Tiny 110ms Keystroke Delays
  • INE Security Expands Across Middle East and Asia to Accelerate Cybersecurity Upskillin
  • OpenAI GPT-5.2-Codex Supercharges Agentic Coding and Cyber Vulnerability Detection
  • China-Aligned Threat Group Uses Windows Group Policy to Deploy Espionage Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • China-Aligned APT Hackers Exploit Windows Group Policy to Deploy Malware
  • Amazon Catches North Korean IT Worker by Tracking Tiny 110ms Keystroke Delays
  • INE Security Expands Across Middle East and Asia to Accelerate Cybersecurity Upskillin
  • OpenAI GPT-5.2-Codex Supercharges Agentic Coding and Cyber Vulnerability Detection
  • China-Aligned Threat Group Uses Windows Group Policy to Deploy Espionage Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark