Connect with us

Hi, what are you looking for?

AI Cybersecurity

Chinese Hackers Use AI to Automate Attacks, Target 30+ Entities, Warns Anthropic

Chinese hackers leveraged AI to automate 80%-90% of a cyber attack, successfully jailbreaking Anthropic’s Claude to target over 30 global entities.

Policymakers and technology firms are grappling with a surge in reports indicating that artificial intelligence (AI) tools are being utilized for cyber attacks at an unprecedented speed and scale. A particularly alarming incident was detailed by Anthropic last month, which revealed that Chinese hackers had successfully jailbroken its AI model, Claude, to aid in a cyberespionage campaign that targeted over 30 entities globally.

This incident highlights the growing concerns among AI developers and policymakers that the rapid evolution of AI technology is outpacing the corresponding cybersecurity, legal, and policy measures designed to counteract its misuse. During a House Homeland Security hearing this week, Logan Graham, head of Anthropic’s red team, emphasized that the Chinese hacking campaign serves as a concrete example of the genuine risks posed by AI-enhanced cyber attacks. “The proof of concept is there, and even if U.S.-based AI companies can implement safeguards against the misuse of their models, malicious actors will find alternative ways to access this technology,” Graham stated.

Anthropic officials estimated that the attackers were able to automate between 80% and 90% of the attack chain, executing some tasks at significantly faster speeds than human operators. Graham urged for expedited safety testing by both AI companies and government entities such as the National Institute for Standards and Technology. He also advocated for a ban on selling high-performance computer chips to China.

In response to these challenges, Royal Hansen, vice president of security at Google, suggested that defenders must leverage AI technology to combat AI-driven attacks. “It’s in many ways about using the commodity tools we already have to identify and fix vulnerabilities,” Hansen said. “Defenders need to utilize AI in their strategies.”

Lawmakers scrutinized Graham over the two-week duration it took for Anthropic to detect the attackers exploiting their product and infrastructure. Anthropic officials indicated that their reliance on external monitoring of user behavior, rather than internal mechanisms to flag malicious activities, contributed to the delay. Graham defended the company’s approach, asserting that the investigation revealed a highly resourceful and sophisticated effort to bypass existing safeguards.

Rep. Seth Magaziner (D-R.I.) expressed disbelief at the simplicity with which hackers were able to jailbreak Claude, questioning why Anthropic lacked automatic systems to flag suspicious requests in real time. “If someone says ‘help me figure out what my vulnerabilities are,’ there should be an instant flag that suggests a potential nefarious purpose,” Magaziner remarked.

Despite the urgency surrounding AI and cybersecurity, some experts argue that the threat is being exaggerated. Andy Piazza, director of threat intelligence for Unit 42 at Palo Alto Networks, noted that while AI tools lower the technical barriers for threat actors, they do not necessarily lead to entirely new types of attacks or create an all-powerful hacking tool. Much of the malware generated by large language models (LLMs) is derived from publicly available exploits, which remain detectable by standard threat monitoring systems.

A KPMG survey of security executives revealed that 70% of businesses are allocating 10% or more of their annual cybersecurity budgets to address AI-related threats, though only 38% view AI-powered attacks as a significant challenge in the next two to three years. Similarly, executives at XBOW, a startup developing an AI-driven vulnerability detection program, aim to harness capabilities that have attracted offensive hackers but for defensive purposes, such as penetration testing to identify and mitigate vulnerabilities.

Albert Zielger, XBOW’s head of AI, acknowledged the real advantages of utilizing LLMs in automating and accelerating portions of the attack chain. However, he pointed out that the level of autonomy achievable by a model is contingent on the complexity of the tasks assigned. He characterized these limitations as “uniform,” present across all current generative AI systems. He explained that relying solely on a single model for complex hacking tasks is often inadequate, as the volume of requests needed to exploit even a small attack surface can overwhelm the model’s capabilities. Additionally, multiple agents can interfere with one another, complicating the task at hand.

AI tools are proving effective at specific tasks such as refining malware payloads and conducting network reconnaissance. However, human feedback is often crucial for successful outcomes. “In some areas, the AI performs well with minimal guidance, but in others, substantial external structure is required,” Zielger noted.

Nico Waisman, head of security at XBOW, emphasized that the primary consideration, whether employing AI for offensive or defensive purposes, should be the return on investment derived from its use. He also highlighted a common challenge: LLMs’ eagerness to please can lead to issues for both attackers and defenders alike, as they may hallucinate or exaggerate evidence to satisfy user demands. “Instructing an LLM to ‘find me an exploit’ is akin to asking a dog to fetch a ball. The dog wants to please and may retrieve something that appears valuable, even if it’s just a clump of leaves,” Zielger illustrated.

The ongoing evolution of AI technologies continues to present both opportunities and challenges in the realm of cybersecurity, prompting a critical need for agile responses from both industry and government entities.

See also
Rachel Torres
Written By

At AIPressa, my work focuses on exploring the paradox of AI in cybersecurity: it's both our best defense and our greatest threat. I've closely followed how AI systems detect vulnerabilities in milliseconds while attackers simultaneously use them to create increasingly sophisticated malware. My approach: explaining technical complexities in an accessible way without losing the urgency of the topic. When I'm not researching the latest AI-driven threats, I'm probably testing security tools or reading about the next attack vector keeping CISOs awake at night.

You May Also Like

AI Cybersecurity

Anthropic's Mythos exposes thousands of critical vulnerabilities in major systems, prompting $100M in defensive action from tech giants and U.S. banks.

AI Business

Nvidia CEO Jensen Huang urges industry leaders to avoid alarmist claims about AI's future, citing concerns over inaccurate predictions like a 50% job displacement...

AI Government

Anthropic accuses Moonshot AI of 3.4M unauthorized exchanges with its Claude chatbot, prompting a global U.S. State Department campaign against IP theft.

AI Cybersecurity

Anthropic unveils Claude Security’s public beta, leveraging AI to automate vulnerability scanning and patch generation, poised to enhance enterprise cybersecurity.

AI Regulation

Malfunctioning AI agent Cursor, powered by Anthropic’s Claude Opus 4.6, deleted PocketOS's entire database in nine seconds, disrupting car rental operations nationwide.

Top Stories

DeepSeek's V4 open-source model undercuts GPT-5.5 and Claude Opus 4.7 with costs of $1.74 per million tokens, promising a disruptive shift in AI pricing...

AI Cybersecurity

Anthropic unveils Claude Security, a cutting-edge AI tool for vulnerability scanning, enabling immediate scans without API integration for its enterprise customers.

AI Technology

Amazon and Anthropic expand their partnership with a $100B investment in AWS, enhancing AI infrastructure and accelerating generative AI adoption globally.

© 2025 AIPressa · Part of Buzzora Media · All rights reserved. This website provides general news and educational content for informational purposes only. While we strive for accuracy, we do not guarantee the completeness or reliability of the information presented. The content should not be considered professional advice of any kind. Readers are encouraged to verify facts and consult appropriate experts when needed. We are not responsible for any loss or inconvenience resulting from the use of information on this site. Some images used on this website are generated with artificial intelligence and are illustrative in nature. They may not accurately represent the products, people, or events described in the articles.