Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Anthropic Accuses Chinese AI Labs of Distillation Attacks

Anthropic Accuses Chinese AI Labs of Distillation Attacks

Posted on February 23, 2026 By CWS

In a significant cybersecurity development, San Francisco-based Anthropic has accused three major Chinese AI companies—DeepSeek, Moonshot AI, and MiniMax—of orchestrating extensive distillation attacks on its Claude models. These coordinated efforts involved creating approximately 24,000 fake accounts, resulting in over 16 million interactions with Claude, thereby breaching Anthropic’s terms of service and bypassing geographical access restrictions.

Understanding AI Distillation

AI distillation is a process where a smaller, ‘student’ model learns from a larger, ‘teacher’ model, a technique typically used to enhance AI efficiency. However, when applied to a competitor’s model without authorization, it enables rapid capability transfer at a minimal cost. Anthropic stresses that such distilled versions of Claude might lack the rigorous safety measures embedded in U.S. models, posing significant risks if these capabilities are utilized for military or surveillance purposes by authoritarian regimes.

Details of the Attacks

The alleged attacks had varying scales and targets. DeepSeek focused on advanced reasoning and censorship-safe alternatives, conducting over 150,000 exchanges through synchronized traffic and shared payment methods. Moonshot AI, with over 3.4 million exchanges, targeted agentic reasoning and coding, using numerous fraudulent accounts to reconstruct Claude’s reasoning processes. MiniMax executed the largest campaign with over 13 million exchanges, adapting quickly to new Claude model releases to maintain its data extraction efforts.

Anthropic claims these activities were verified through IP correlations, request metadata, and infrastructure fingerprints, with one case directly linking request metadata to senior researchers at the accused labs.

Countermeasures and Future Steps

To counter these attacks, Anthropic is enhancing its detection systems, employing advanced classifiers and behavioral analytics to identify coordinated activities. Additionally, the company is collaborating with other AI labs, cloud providers, and authorities to strengthen security measures and share technical indicators. Anthropic calls for a collective effort across the AI industry to tackle these challenges, emphasizing the importance of U.S. export controls on advanced chips to limit such distillation attacks.

This revelation follows recent warnings by OpenAI to U.S. lawmakers about similar distillation threats targeting ChatGPT. As the AI landscape evolves, the need for robust security and regulatory frameworks becomes increasingly critical.

Stay informed with the latest updates in cybersecurity by following us on Google News, LinkedIn, and X. Contact us to feature your stories.

Cyber Security News Tags:AI ethics, AI safety, AI security, AI technology, Anthropic, Chinese AI labs, Claude models, Cybersecurity, DeepSeek, distillation attacks, global AI landscape, intellectual property, MiniMax, Moonshot AI, regulatory measures

Post navigation

Previous Post: APT28’s Webhook Malware Targets Europe
Next Post: Conduent’s Massive Data Breach: 8 TB Stolen by Ransomware

Related Posts

CISA Warns of Federal Agencies Not Fully Patching Actively Exploited Cisco ASA or Firepower Devices CISA Warns of Federal Agencies Not Fully Patching Actively Exploited Cisco ASA or Firepower Devices Cyber Security News
Microsoft IIS Web Deploy Vulnerability Let Attackers Execute Remote Code Microsoft IIS Web Deploy Vulnerability Let Attackers Execute Remote Code Cyber Security News
BlindEagle Hackers Attacking Government Agencies with Powershell Scripts BlindEagle Hackers Attacking Government Agencies with Powershell Scripts Cyber Security News
Chrome Emergency Update to Patch Multiple Vulnerabilities that Enable Remote Code Execution Chrome Emergency Update to Patch Multiple Vulnerabilities that Enable Remote Code Execution Cyber Security News
Hackers Exploiting Blind Spots in DNS Records to Store and Deliver Malware Hackers Exploiting Blind Spots in DNS Records to Store and Deliver Malware Cyber Security News
Critical jsPDF Flaw Puts Developers at Risk of Attacks Critical jsPDF Flaw Puts Developers at Risk of Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Conduent’s Massive Data Breach: 8 TB Stolen by Ransomware
  • Anthropic Accuses Chinese AI Labs of Distillation Attacks
  • APT28’s Webhook Malware Targets Europe
  • GrayCharlie Targets WordPress Sites with Malicious Scripts
  • Starkiller Phishing Tool Bypasses MFA with Real Login Pages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Conduent’s Massive Data Breach: 8 TB Stolen by Ransomware
  • Anthropic Accuses Chinese AI Labs of Distillation Attacks
  • APT28’s Webhook Malware Targets Europe
  • GrayCharlie Targets WordPress Sites with Malicious Scripts
  • Starkiller Phishing Tool Bypasses MFA with Real Login Pages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News