Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Claude AI APIs Can Be Abused for Data Exfiltration

Claude AI APIs Can Be Abused for Data Exfiltration

Posted on November 3, 2025November 3, 2025 By CWS

Attackers can use oblique immediate injections to trick Anthropic’s Claude into exfiltrating knowledge the AI mannequin’s customers have entry to, a safety researcher has found.

The assault, Johann Rehberger of Embrace The Purple explains, abuses Claude’s Recordsdata APIs, and is just doable if the AI mannequin has community entry (a function enabled by default on sure plans and meant to permit Claude to entry sure assets, comparable to code repositories and Anthropic APIs).

The assault is comparatively simple: an oblique immediate injection payload can be utilized to learn person knowledge and retailer it in a file in Claude Code Interpreter’s sandbox, after which to trick the mannequin into interacting with the Anthropic API utilizing a key supplied by the attacker.

The code within the payload requests Claude to add the Code Interpreter file from the sandbox however, as a result of the attacker’s API secret is used, the file is uploaded to the attacker’s account.

“With this system an adversary can exfiltrate as much as 30MB without delay in keeping with the file API documentation, and naturally we are able to add a number of recordsdata,” Rehberger explains.

After the preliminary try was profitable, Claude refused the payload, particularly with the API key in plain textual content, and Rehberger needed to combine benign code within the immediate injection, to persuade Claude that it doesn’t have malicious intent.

The assault begins with the person loading a malicious doc obtained from the attacker in Claude for evaluation. The exploit code hijacks the mannequin, which follows the malicious directions to reap the person’s knowledge, reserve it to the sandbox, after which name the Anthropic File API to ship it to the attacker’s account.

In keeping with the researcher, the assault can be utilized to exfiltrate the person’s chat conversations, that are saved by Claude utilizing the newly launched ‘recollections’ function. The attacker can view and entry the exfiltrated file of their console.Commercial. Scroll to proceed studying.

The researcher disclosed the assault to Anthropic by way of HackerOne on October 25, however the report was closed with the reason that this was a mannequin security difficulty and never a safety vulnerability.

Nonetheless, after publishing data on the assault, Rehberger was notified by Anthropic that the information exfiltration vulnerability is in-scope for reporting.

Anthropic’s documentation underlines the dangers related to Claude having community entry and of potential assaults carried out by way of exterior recordsdata or web sites resulting in code execution and data leaks. It additionally supplies really useful mitigations towards such assaults.

SecurityWeek has emailed Anthropic to inquire whether or not the corporate plans to plot a mitigation for such assaults.

Associated: All Main Gen-AI Fashions Susceptible to ‘Coverage Puppetry’ Immediate Injection Assault

Associated: Nvidia Triton Vulnerabilities Pose Huge Danger to AI Fashions

Associated: AI Sidebar Spoofing Places ChatGPT Atlas, Perplexity Comet and Different Browsers at Danger

Associated: Microsoft: Russia, China More and more Utilizing AI to Escalate Cyberattacks on the US

Security Week News Tags:Abused, APIs, Claude, Data, Exfiltration

Post navigation

Previous Post: Cybercriminals Exploit Remote Monitoring Tools to Infiltrate Logistics and Freight Networks
Next Post: Conti Group Member Responsible for Deploying Ransomware Extradited to USA

Related Posts

ClickFix Attack Exploits Fake Cloudflare Turnstile to Deliver Malware ClickFix Attack Exploits Fake Cloudflare Turnstile to Deliver Malware Security Week News
Ransomware Losses Climb as AI Pushes Phishing to New Heights Ransomware Losses Climb as AI Pushes Phishing to New Heights Security Week News
Citrix Patches Exploited NetScaler Zero-Day Citrix Patches Exploited NetScaler Zero-Day Security Week News
US Student to Plead Guilty Over PowerSchool Hack US Student to Plead Guilty Over PowerSchool Hack Security Week News
‘MadeYouReset’ HTTP2 Vulnerability Enables Massive DDoS Attacks ‘MadeYouReset’ HTTP2 Vulnerability Enables Massive DDoS Attacks Security Week News
Palo Alto Networks to Acquire Koi for Enhanced AI Security Palo Alto Networks to Acquire Koi for Enhanced AI Security Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark