Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Claude AI APIs Can Be Abused for Data Exfiltration

Posted on November 3, 2025November 3, 2025 By CWS

Attackers can use oblique immediate injections to trick Anthropic’s Claude into exfiltrating knowledge the AI mannequin’s customers have entry to, a safety researcher has found.

The assault, Johann Rehberger of Embrace The Purple explains, abuses Claude’s Recordsdata APIs, and is just doable if the AI mannequin has community entry (a function enabled by default on sure plans and meant to permit Claude to entry sure assets, comparable to code repositories and Anthropic APIs).

The assault is comparatively simple: an oblique immediate injection payload can be utilized to learn person knowledge and retailer it in a file in Claude Code Interpreter’s sandbox, after which to trick the mannequin into interacting with the Anthropic API utilizing a key supplied by the attacker.

The code within the payload requests Claude to add the Code Interpreter file from the sandbox however, as a result of the attacker’s API secret is used, the file is uploaded to the attacker’s account.

“With this system an adversary can exfiltrate as much as 30MB without delay in keeping with the file API documentation, and naturally we are able to add a number of recordsdata,” Rehberger explains.

After the preliminary try was profitable, Claude refused the payload, particularly with the API key in plain textual content, and Rehberger needed to combine benign code within the immediate injection, to persuade Claude that it doesn’t have malicious intent.

The assault begins with the person loading a malicious doc obtained from the attacker in Claude for evaluation. The exploit code hijacks the mannequin, which follows the malicious directions to reap the person’s knowledge, reserve it to the sandbox, after which name the Anthropic File API to ship it to the attacker’s account.

In keeping with the researcher, the assault can be utilized to exfiltrate the person’s chat conversations, that are saved by Claude utilizing the newly launched ‘recollections’ function. The attacker can view and entry the exfiltrated file of their console.Commercial. Scroll to proceed studying.

The researcher disclosed the assault to Anthropic by way of HackerOne on October 25, however the report was closed with the reason that this was a mannequin security difficulty and never a safety vulnerability.

Nonetheless, after publishing data on the assault, Rehberger was notified by Anthropic that the information exfiltration vulnerability is in-scope for reporting.

Anthropic’s documentation underlines the dangers related to Claude having community entry and of potential assaults carried out by way of exterior recordsdata or web sites resulting in code execution and data leaks. It additionally supplies really useful mitigations towards such assaults.

SecurityWeek has emailed Anthropic to inquire whether or not the corporate plans to plot a mitigation for such assaults.

Associated: All Main Gen-AI Fashions Susceptible to ‘Coverage Puppetry’ Immediate Injection Assault

Associated: Nvidia Triton Vulnerabilities Pose Huge Danger to AI Fashions

Associated: AI Sidebar Spoofing Places ChatGPT Atlas, Perplexity Comet and Different Browsers at Danger

Associated: Microsoft: Russia, China More and more Utilizing AI to Escalate Cyberattacks on the US

Security Week News Tags:Abused, APIs, Claude, Data, Exfiltration

Post navigation

Previous Post: Cybercriminals Exploit Remote Monitoring Tools to Infiltrate Logistics and Freight Networks
Next Post: Conti Group Member Responsible for Deploying Ransomware Extradited to USA

Related Posts

Security Firm Andy Frain Says 100,000 People Impacted by Ransomware Attack Security Week News
Chinese Hacking Group ‘Earth Lamia’ Targets Multiple Industries Security Week News
Red Teaming AI: The Build Vs Buy Debate Security Week News
Virtual Event Today: Zero Trust & Identity Strategies Summit Security Week News
Will AI-SPM Become the Standard Security Layer for Safe AI Adoption? Security Week News
Critical Flaws Patched in Rockwell FactoryTalk, Micro800, ControlLogix Products Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Malicious VSX Extension “SleepyDuck” Uses Ethereum to Keep Its Command Server Alive
  • Hackers Can Manipulate Claude AI APIs with Indirect Prompts to Steal User Data
  • Microsoft Patch for WSUS Flaw has Broken Hotpatching on Windows Server 2025
  • Ukrainian Extradited to US Faces Charges in Jabber Zeus Cybercrime Case
  • How Software Development Teams Can Securely and Ethically Deploy AI Tools

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Malicious VSX Extension “SleepyDuck” Uses Ethereum to Keep Its Command Server Alive
  • Hackers Can Manipulate Claude AI APIs with Indirect Prompts to Steal User Data
  • Microsoft Patch for WSUS Flaw has Broken Hotpatching on Windows Server 2025
  • Ukrainian Extradited to US Faces Charges in Jabber Zeus Cybercrime Case
  • How Software Development Teams Can Securely and Ethically Deploy AI Tools

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News