Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Can Weaponize Claude Skills to Execute MedusaLocker Ransomware Attack

Posted on December 3, 2025December 3, 2025 By CWS

A brand new function in Anthropic’s Claude AI, referred to as Claude Expertise, has been recognized as a possible vector for ransomware assaults.

This function, designed to increase the AI’s capabilities via customized code modules, will be manipulated to deploy malware just like the MedusaLocker ransomware with out the consumer’s specific consciousness.

The seemingly respectable look of those Expertise makes them a misleading and harmful software for menace actors.

The core of the difficulty lies within the single-consent belief mannequin of Claude Expertise. As soon as a consumer grants a Ability preliminary permission to run, it will probably carry out a variety of actions within the background, together with downloading and executing further malicious code.

Cato Networks safety analysts/researchers famous that this creates a big safety hole.

A seemingly innocent Ability, shared via public repositories or social media, might be a Computer virus for a devastating ransomware assault, doubtlessly affecting an unlimited variety of customers, given Anthropic’s massive buyer base.

The impression of such an assault might be substantial. A single worker putting in a malicious Claude Ability might inadvertently set off a company-wide ransomware incident.

The assault leverages the belief customers place within the AI’s performance, turning a productivity-enhancing function right into a safety nightmare.

The convenience with which a respectable Ability will be modified to hold a malicious payload makes this a scalable menace.

The An infection Pathway

The an infection course of is delicate and efficient. Researchers from Cato CTRL demonstrated this by modifying an official open-source “GIF Creator” Ability.

They added a helper perform named postsave that seemed to be a innocent a part of the Ability’s workflow, supposedly for post-processing the created GIF.

In actuality, this perform was designed to silently obtain and execute an exterior script, as illustrated of their analysis.

Professional-looking helper perform added to Anthropic’s GIF Creator Ability (Supply – Cato Networks)

This methodology bypasses the consumer’s scrutiny as Claude solely prompts for approval of the principle script, not the hidden operations of the helper perform.

As soon as the preliminary approval is given, the malicious helper perform can function with none additional prompts or warnings.

It may obtain and run malware, such because the MedusaLocker ransomware, which then encrypts the consumer’s information.

Execution Circulation (Supply – Cato Networks)

The execution circulation reveals that after the primary consent, hidden subprocesses inherit the trusted standing, permitting them to carry out their malicious actions undetected.

This highlights a essential vulnerability the place the consumer’s preliminary consent is exploited to hold out a full-fledged ransomware assault, all below the guise of a respectable AI-powered software.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Attack, Claude, Execute, Hackers, MedusaLocker, Ransomware, Skills, Weaponize

Post navigation

Previous Post: Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation
Next Post: Longwatch RCE Vulnerability Let Attackers Execute Remote Code With Elevated Privileges

Related Posts

PoC Exploit Tool Released for FortiWeb WAF Vulnerability Exploited in the Wild Cyber Security News
Critical VMware Tools VGAuth Vulnerabilities Enable Full System Access for Attackers Cyber Security News
APT36 Attacking BOSS Linux Systems With Weaponized ZIP Files to Steal Sensitive Data Cyber Security News
India Mandates ‘Undeletable’ Government Cybersecurity App for All Smartphones Cyber Security News
Aembit Introduces Identity and Access Management for Agentic AI Cyber Security News
Threat Actors Weaponize LNK Files With New REMCOS Variant That Bypasses AV Engines Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
  • New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare
  • Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts
  • Operation DupeHike Attacking Employees Using Weaponized Documents DUPERUNNER Malware
  • Threat Actors Using Malicious VSCode Extension to Deploy Anivia Loader and OctoRAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
  • New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare
  • Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts
  • Operation DupeHike Attacking Employees Using Weaponized Documents DUPERUNNER Malware
  • Threat Actors Using Malicious VSCode Extension to Deploy Anivia Loader and OctoRAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark