Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Anthropic Disrupts AI-Powered Cyberattacks Automating Theft and Extortion Across Critical Sectors

Posted on August 27, 2025August 27, 2025 By CWS

Aug 27, 2025Ravie LakshmananCyber Assault / Synthetic Intelligence

Anthropic on Wednesday revealed that it disrupted a classy operation that weaponized its synthetic intelligence (AI)-powered chatbot Claude to conduct large-scale theft and extortion of private knowledge in July 2025.
“The actor focused no less than 17 distinct organizations, together with in healthcare, the emergency companies, and authorities, and non secular establishments,” the corporate stated. “Slightly than encrypt the stolen info with conventional ransomware, the actor threatened to reveal the information publicly with a purpose to try to extort victims into paying ransoms that generally exceeded $500,000.”
“The actor employed Claude Code on Kali Linux as a complete assault platform, embedding operational directions in a CLAUDE.md file that offered persistent context for each interplay.”
The unknown menace actor is claimed to have used AI to an “unprecedented diploma,” utilizing Claude Code, Anthropic’s agentic coding instrument, to automate varied phases of the assault cycle, together with reconnaissance, credential harvesting, and community penetration.
The reconnaissance efforts concerned scanning 1000’s of VPN endpoints to flag vulnerable programs, utilizing them to acquire preliminary entry and following up with consumer enumeration and community discovery steps to extract credentials and arrange persistence on the hosts.
Moreover, the attacker used Claude Code to craft bespoke variations of the Chisel tunneling utility to sidestep detection efforts, and disguise malicious executables as authentic Microsoft instruments – a sign of how AI instruments are getting used to help with malware improvement with protection evasion capabilities.

The exercise, codenamed GTG-2002, is notable for using Claude to make “tactical and strategic selections” by itself and permitting it to determine which knowledge must be exfiltrated from sufferer networks and craft focused extortion calls for by analyzing the monetary knowledge to find out an applicable ransom quantity starting from $75,000 to $500,000 in Bitcoin.
Claude Code, per Anthropic, was additionally put to make use of to arrange stolen knowledge for monetization functions, pulling out 1000’s of particular person information, together with private identifiers, addresses, monetary info, and medical information from a number of victims. Subsequently, the instrument was employed to create personalized ransom notes and multi-tiered extortion methods based mostly on exfiltrated knowledge evaluation.
“Agentic AI instruments are actually getting used to supply each technical recommendation and energetic operational assist for assaults that will in any other case have required a staff of operators,” Anthropic stated. “This makes protection and enforcement more and more tough, since these instruments can adapt to defensive measures, like malware detection programs, in real-time.”

To mitigate such “vibe hacking” threats from occurring sooner or later, the corporate stated it developed a customized classifier to display screen for related conduct and shared technical indicators with “key companions.”

Different documented misuses of Claude are listed beneath –

Use of Claude by North Korean operatives associated to the fraudulent distant IT employee scheme with a purpose to create elaborate fictitious personas with persuasive skilled backgrounds and mission histories, technical and coding assessments in the course of the software course of, and help with their day-to-day work as soon as employed
Use of Claude by a U.Okay.-based cybercriminal, codenamed GTG-5004, to develop, market, and distribute a number of variants of ransomware with superior evasion capabilities, encryption, and anti-recovery mechanisms, which have been then bought on darknet boards resembling Dread, CryptBB, and Nulled to different menace actors for $400 to $1,200
Use of Claude by a Chinese language menace actor to reinforce cyber operations focusing on Vietnamese vital infrastructure, together with telecommunications suppliers, authorities databases, and agricultural administration programs, over the course of a 9-month marketing campaign
Use of Claude by a Russian-speaking developer to create malware with superior evasion capabilities
Use of Mannequin Context Protocol (MCP) and Claude by a menace actor working on the xss[.]is cybercrime discussion board with the objective of analyzing stealer logs and construct detailed sufferer profiles
Use of Claude Code by a Spanish-speaking actor to take care of and enhance an invite-only net service geared in direction of validating and reselling stolen bank cards at scale
Use of Claude as a part of a Telegram bot that provides multimodal AI instruments to assist romance rip-off operations, promoting the chatbot as a “excessive EQ mannequin”
Use of Claude by an unknown actor to launch an operational artificial identification service that rotates between three card validation companies, aka “card checkers”

The corporate additionally stated it foiled makes an attempt made by North Korean menace actors linked to the Contagious Interview marketing campaign to create accounts on the platform to reinforce their malware toolset, create phishing lures, and generate npm packages, successfully blocking them from issuing any prompts.
The case research add to rising proof that AI programs, regardless of the varied guardrails baked into them, are being abused to facilitate refined schemes at pace and at scale.

“Criminals with few technical expertise are utilizing AI to conduct complicated operations, resembling growing ransomware, that will beforehand have required years of coaching,” Anthropic’s Alex Moix, Ken Lebedev, and Jacob Klein stated, calling out AI’s skill to decrease the obstacles to cybercrime.

“Cybercriminals and fraudsters have embedded AI all through all phases of their operations. This consists of profiling victims, analyzing stolen knowledge, stealing bank card info, and creating false identities permitting fraud operations to increase their attain to extra potential targets.”

The Hacker News Tags:AIPowered, Anthropic, Automating, Critical, Cyberattacks, Disrupts, Extortion, Sectors, Theft

Post navigation

Previous Post: New Zip Slip Vulnerability Allows Attackers to Manipulate ZIP Files During Decompression
Next Post: China-Linked Hackers Hijack Web Traffic to Deliver Backdoor

Related Posts

GitLab Duo Vulnerability Enabled Attackers to Hijack AI Responses with Hidden Prompts The Hacker News
Gold Melody IAB Exploits Exposed ASP.NET Machine Keys for Unauthorized Access to Targets The Hacker News
Malware Injected into 6 npm Packages After Maintainer Tokens Stolen in Phishing Attack The Hacker News
Adobe Releases Patch Fixing 254 Vulnerabilities, Closing High-Severity Security Gaps The Hacker News
5 BCDR Essentials for Effective Ransomware Defense The Hacker News
New Linux Flaws Enable Full Root Access via PAM and Udisks Across Major Distributions The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Someone Created First AI-Powered Ransomware Using OpenAI’s gpt-oss:20b Model
  • Hackers Weaponize Trust with AI-Crafted Emails to Deploy ScreenConnect
  • CISA releases New ICS Advisories Surrounding Vulnerabilities and Exploits
  • Attacker Context and Historical iOS Zero-Click Similarities
  • China-Linked Hackers Hijack Web Traffic to Deliver Backdoor

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Someone Created First AI-Powered Ransomware Using OpenAI’s gpt-oss:20b Model
  • Hackers Weaponize Trust with AI-Crafted Emails to Deploy ScreenConnect
  • CISA releases New ICS Advisories Surrounding Vulnerabilities and Exploits
  • Attacker Context and Historical iOS Zero-Click Similarities
  • China-Linked Hackers Hijack Web Traffic to Deliver Backdoor

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News