Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Can Weaponize Claude Skills to Execute MedusaLocker Ransomware Attack

Posted on December 3, 2025December 3, 2025 By CWS

A brand new function in Anthropic’s Claude AI, referred to as Claude Expertise, has been recognized as a possible vector for ransomware assaults.

This function, designed to increase the AI’s capabilities via customized code modules, will be manipulated to deploy malware just like the MedusaLocker ransomware with out the consumer’s specific consciousness.

The seemingly respectable look of those Expertise makes them a misleading and harmful software for menace actors.

The core of the difficulty lies within the single-consent belief mannequin of Claude Expertise. As soon as a consumer grants a Ability preliminary permission to run, it will probably carry out a variety of actions within the background, together with downloading and executing further malicious code.

Cato Networks safety analysts/researchers famous that this creates a big safety hole.

A seemingly innocent Ability, shared via public repositories or social media, might be a Computer virus for a devastating ransomware assault, doubtlessly affecting an unlimited variety of customers, given Anthropic’s massive buyer base.

The impression of such an assault might be substantial. A single worker putting in a malicious Claude Ability might inadvertently set off a company-wide ransomware incident.

The assault leverages the belief customers place within the AI’s performance, turning a productivity-enhancing function right into a safety nightmare.

The convenience with which a respectable Ability will be modified to hold a malicious payload makes this a scalable menace.

The An infection Pathway

The an infection course of is delicate and efficient. Researchers from Cato CTRL demonstrated this by modifying an official open-source “GIF Creator” Ability.

They added a helper perform named postsave that seemed to be a innocent a part of the Ability’s workflow, supposedly for post-processing the created GIF.

In actuality, this perform was designed to silently obtain and execute an exterior script, as illustrated of their analysis.

Professional-looking helper perform added to Anthropic’s GIF Creator Ability (Supply – Cato Networks)

This methodology bypasses the consumer’s scrutiny as Claude solely prompts for approval of the principle script, not the hidden operations of the helper perform.

As soon as the preliminary approval is given, the malicious helper perform can function with none additional prompts or warnings.

It may obtain and run malware, such because the MedusaLocker ransomware, which then encrypts the consumer’s information.

Execution Circulation (Supply – Cato Networks)

The execution circulation reveals that after the primary consent, hidden subprocesses inherit the trusted standing, permitting them to carry out their malicious actions undetected.

This highlights a essential vulnerability the place the consumer’s preliminary consent is exploited to hold out a full-fledged ransomware assault, all below the guise of a respectable AI-powered software.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Attack, Claude, Execute, Hackers, MedusaLocker, Ransomware, Skills, Weaponize

Post navigation

Previous Post: Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation
Next Post: Longwatch RCE Vulnerability Let Attackers Execute Remote Code With Elevated Privileges

Related Posts

Anubis Ransomware Attacking Android and Windows Users to Encrypt Files and Steal Login Credentials Cyber Security News
FBI Atlanta Seizes Major Video Game Piracy Websites in International Operation Cyber Security News
Scaling SOC Team Expertise With AI-powered Insights for Faster, Easier Understanding of Threats Cyber Security News
PgAdmin Vulnerability Lets Attackers Gain Unauthorised Account Access Cyber Security News
Hackers Leverages Google Calendar APIs With Serverless MeetC2 Communication Framework Cyber Security News
Windows Remote Desktop Vulnerability Let Attackers Execute Malicious Code Over Network Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
  • New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare
  • Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts
  • Operation DupeHike Attacking Employees Using Weaponized Documents DUPERUNNER Malware
  • Threat Actors Using Malicious VSCode Extension to Deploy Anivia Loader and OctoRAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
  • New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare
  • Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts
  • Operation DupeHike Attacking Employees Using Weaponized Documents DUPERUNNER Malware
  • Threat Actors Using Malicious VSCode Extension to Deploy Anivia Loader and OctoRAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark