Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Can Manipulate Claude AI APIs with Indirect Prompts to Steal User Data

Hackers Can Manipulate Claude AI APIs with Indirect Prompts to Steal User Data

Posted on November 3, 2025November 3, 2025 By CWS

Hackers can exploit Anthropic’s Claude AI to steal delicate consumer knowledge. By leveraging the mannequin’s newly added community capabilities in its Code Interpreter device, attackers can use oblique immediate injection to extract non-public data, comparable to chat histories, and add it on to their very own accounts.

This revelation, detailed in Rehberger’s October 2025 weblog put up, underscores the rising dangers as AI techniques turn into more and more related to the surface world.

In line with Johann Rehberger, the flaw hinges on Claude’s default “Package deal managers solely” setting, which allows community entry to a restricted checklist of accepted domains, together with api.anthropic.com.

Whereas supposed to let Claude set up software program packages securely from websites like npm, PyPI, and GitHub, this whitelist opens a backdoor. Rehberger confirmed that malicious prompts hidden in paperwork or consumer inputs can trick the AI into executing code that accesses consumer knowledge.

Oblique Prompts Assault Chain

Rehberger’s proof-of-concept assault begins with oblique immediate injection, the place an adversary embeds dangerous directions in seemingly innocuous content material, like a file the consumer asks Claude to investigate.

Leveraging Claude’s current “reminiscence” function, which lets the AI reference previous conversations, the payload instructs the mannequin to extract current chat knowledge and reserve it as a file within the Code Interpreter’s sandbox, particularly at /mnt/user-data/outputs/good day.md.

Subsequent, the exploit forces Claude to run Python code utilizing the Anthropic SDK. This code units the atmosphere variable for the attacker’s API key and uploads the file by way of Claude’s Recordsdata API.

Crucially, the add targets the attacker’s account, not the sufferer’s, bypassing regular authentication. “This labored on the primary attempt,” Rehberger famous, although Claude later grew cautious of apparent API keys, requiring obfuscation with benign code like easy print statements to evade detection.

A demo video and screenshots illustrate the method: An attacker views their empty console, the sufferer processes a tainted doc, and moments later, the stolen file seems within the attacker’s dashboard as much as 30MB per add, with a number of uploads doable. This “AI kill chain” might lengthen to different allow-listed domains, amplifying the risk.

Rehberger responsibly disclosed the problem to Anthropic on October 25, 2025, by way of HackerOne. Initially dismissed as a “mannequin security subject” and out of scope, Anthropic later acknowledged it as a legitimate vulnerability on October 30, citing a course of error.

The corporate’s documentation already warns of information exfiltration dangers from community egress, advising customers to observe periods carefully and halt suspicious exercise.

Specialists like Simon Willison spotlight this as a part of the “deadly trifecta” in AI safety: highly effective fashions, exterior entry, and prompt-based management.

For mitigation, Anthropic might implement sandbox guidelines limiting API calls to the logged-in consumer’s account. Customers ought to disable community entry or whitelist domains sparingly, avoiding the false safety of defaults.

As AI instruments like Claude combine deeper into workflows, such exploits remind us that connectivity breeds hazard. With out strong safeguards, what begins as useful automation might turn into a hacker’s playground.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:APIs, Claude, Data, Hackers, Indirect, Manipulate, Prompts, Steal, User

Post navigation

Previous Post: Microsoft Patch for WSUS Flaw has Broken Hotpatching on Windows Server 2025
Next Post: Malicious VSX Extension “SleepyDuck” Uses Ethereum to Keep Its Command Server Alive

Related Posts

Microsoft Confirms Windows 11 24H2 Update Broken Multiple Core Features Microsoft Confirms Windows 11 24H2 Update Broken Multiple Core Features Cyber Security News
PolarEdge With Custom TLS Server Uses Custom Binary Protocol for C2 Communication PolarEdge With Custom TLS Server Uses Custom Binary Protocol for C2 Communication Cyber Security News
Citrix Windows Virtual Delivery Agent Vulnerability Let Attackers Gain SYSTEM Privileges Citrix Windows Virtual Delivery Agent Vulnerability Let Attackers Gain SYSTEM Privileges Cyber Security News
Microsoft Zero Day Quest Hacking Contest Microsoft Zero Day Quest Hacking Contest Cyber Security News
Top 10 Best Digital Risk Protection (DRP) Platforms in 2025 Top 10 Best Digital Risk Protection (DRP) Platforms in 2025 Cyber Security News
NVIDIA Merlin Vulnerability Allow Attacker to Achieve Remote Code Execution With Root Privileges NVIDIA Merlin Vulnerability Allow Attacker to Achieve Remote Code Execution With Root Privileges Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • NationStates Temporarily Offline Due to Security Breach
  • Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users
  • DynoWiper Data-Wiping Malware Attacking Energy Companies to Destroy Data
  • 30 Wind and Solar Farms in Poland Faced Coordinated Cyberattacks
  • OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • NationStates Temporarily Offline Due to Security Breach
  • Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users
  • DynoWiper Data-Wiping Malware Attacking Energy Companies to Destroy Data
  • 30 Wind and Solar Farms in Poland Faced Coordinated Cyberattacks
  • OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark