Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Can Weaponize Claude Skills to Execute MedusaLocker Ransomware Attack

Hackers Can Weaponize Claude Skills to Execute MedusaLocker Ransomware Attack

Posted on December 3, 2025December 3, 2025 By CWS

A brand new function in Anthropic’s Claude AI, referred to as Claude Expertise, has been recognized as a possible vector for ransomware assaults.

This function, designed to increase the AI’s capabilities via customized code modules, will be manipulated to deploy malware just like the MedusaLocker ransomware with out the consumer’s specific consciousness.

The seemingly respectable look of those Expertise makes them a misleading and harmful software for menace actors.

The core of the difficulty lies within the single-consent belief mannequin of Claude Expertise. As soon as a consumer grants a Ability preliminary permission to run, it will probably carry out a variety of actions within the background, together with downloading and executing further malicious code.

Cato Networks safety analysts/researchers famous that this creates a big safety hole.

A seemingly innocent Ability, shared via public repositories or social media, might be a Computer virus for a devastating ransomware assault, doubtlessly affecting an unlimited variety of customers, given Anthropic’s massive buyer base.

The impression of such an assault might be substantial. A single worker putting in a malicious Claude Ability might inadvertently set off a company-wide ransomware incident.

The assault leverages the belief customers place within the AI’s performance, turning a productivity-enhancing function right into a safety nightmare.

The convenience with which a respectable Ability will be modified to hold a malicious payload makes this a scalable menace.

The An infection Pathway

The an infection course of is delicate and efficient. Researchers from Cato CTRL demonstrated this by modifying an official open-source “GIF Creator” Ability.

They added a helper perform named postsave that seemed to be a innocent a part of the Ability’s workflow, supposedly for post-processing the created GIF.

In actuality, this perform was designed to silently obtain and execute an exterior script, as illustrated of their analysis.

Professional-looking helper perform added to Anthropic’s GIF Creator Ability (Supply – Cato Networks)

This methodology bypasses the consumer’s scrutiny as Claude solely prompts for approval of the principle script, not the hidden operations of the helper perform.

As soon as the preliminary approval is given, the malicious helper perform can function with none additional prompts or warnings.

It may obtain and run malware, such because the MedusaLocker ransomware, which then encrypts the consumer’s information.

Execution Circulation (Supply – Cato Networks)

The execution circulation reveals that after the primary consent, hidden subprocesses inherit the trusted standing, permitting them to carry out their malicious actions undetected.

This highlights a essential vulnerability the place the consumer’s preliminary consent is exploited to hold out a full-fledged ransomware assault, all below the guise of a respectable AI-powered software.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Attack, Claude, Execute, Hackers, MedusaLocker, Ransomware, Skills, Weaponize

Post navigation

Previous Post: Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation
Next Post: Longwatch RCE Vulnerability Let Attackers Execute Remote Code With Elevated Privileges

Related Posts

OpenAI Boosts AI Security by Acquiring Promptfoo OpenAI Boosts AI Security by Acquiring Promptfoo Cyber Security News
Handala Hack Targets US, Israel with Destructive Cyberattacks Handala Hack Targets US, Israel with Destructive Cyberattacks Cyber Security News
APT36 Attacking BOSS Linux Systems With Weaponized ZIP Files to Steal Sensitive Data APT36 Attacking BOSS Linux Systems With Weaponized ZIP Files to Steal Sensitive Data Cyber Security News
Kibana Crowdstrike Connector Vulnerability Exposes Protected Credentials Kibana Crowdstrike Connector Vulnerability Exposes Protected Credentials Cyber Security News
Threat Actors Leverage Zoho WorkDrive Folder to Deliver Obfuscated PureRAT Malware Threat Actors Leverage Zoho WorkDrive Folder to Deliver Obfuscated PureRAT Malware Cyber Security News
ZnDoor Malware Exploiting React2Shell Vulnerability to Compromise Network Devices ZnDoor Malware Exploiting React2Shell Vulnerability to Compromise Network Devices Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • North Korean Hackers Exploit Drift in $285 Million Crypto Heist
  • Fortinet Addresses Critical FortiClient EMS Vulnerability
  • 36 Malicious npm Packages Exploit Databases for Persistent Access
  • Node.js Developers Face Advanced Social Engineering Threat
  • Hackers Exploit Code Leak to Spread Malware via GitHub

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • North Korean Hackers Exploit Drift in $285 Million Crypto Heist
  • Fortinet Addresses Critical FortiClient EMS Vulnerability
  • 36 Malicious npm Packages Exploit Databases for Persistent Access
  • Node.js Developers Face Advanced Social Engineering Threat
  • Hackers Exploit Code Leak to Spread Malware via GitHub

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark