A hacker used AI to automate an 'unprecedented' cybercrime spree, Anthropic says
Share this @internewscast.com

A cybercriminal has leveraged a top artificial intelligence chatbot to execute the most extensive and profitable AI-driven cybercrime operation recorded to date, utilizing it for tasks ranging from identifying targets to composing ransom demands.

A report released on Tuesday by Anthropic, the creators of the well-known Claude chatbot, revealed that an unnamed hacker “utilized AI to an unprecedented degree” to research, infiltrate, and extort at least 17 companies.

Cyber extortion, in which hackers steal information such as confidential data or business secrets, is a common tactic among criminals. The advent of AI has simplified some of these activities, with fraudsters employing AI chatbots to craft phishing emails. In recent months, hackers of various kinds have more frequently integrated AI tools into their operations.

However, the case discovered by Anthropic marks the first publicly documented scenario in which a cybercriminal used a major AI provider’s chatbot to almost entirely automate a spree of cybercrimes.

As detailed in one of Anthropic’s threat reports, the scheme began with the hacker persuading Claude Code—Anthropic’s chatbot adept at “vibe coding,” or generating computer code based on straightforward commands—to pinpoint companies susceptible to attacks. Claude then produced malicious software to extract sensitive data from these companies. Subsequently, it sorted the stolen files and evaluated them to identify sensitive materials that could be leveraged to demand ransoms from the victim companies.

The chatbot proceeded to assess the hacked financial records of the companies to estimate a realistic bitcoin ransom amount, accompanying its findings with drafted extortion email templates.

Jacob Klein, head of threat intelligence for Anthropic, said that the campaign appeared to come from an individual hacker outside of the U.S. and happen over the span of three months.

“We have robust safeguards and multiple layers of defense for detecting this kind of misuse, but determined actors sometimes attempt to evade our systems through sophisticated techniques,” he said.

Share this @internewscast.com
You May Also Like

I-26 East Bridge in Unicoi County Now Completely Open

The Interstate 26 East bridge in Unicoi County, Tenn., is now open…

Former UFC Champion’s Son Under Investigation for Violent Attack on Wrestler

LOS ANGELES (KTLA) – Raja Jackson, the son of former UFC light…

Frequent Earthquakes in South Carolina Prompt Urgent Preparedness Calls from Emergency Managers

COLUMBIA, S.C. (WCBD) – Authorities in charge of emergency management in South…

Border Agent Facing Charges for Assaulting Officer Passes Away Shortly After Court Appearance

A Southern California border agent accused of attacking a Long Beach police…

Nevada State Offices and Websites Hit by Cyberattack, Governor Reports

LAS VEGAS – Due to a cyberattack, Nevada state offices were shut…

How a Scam Involving Electric Scooter Rentals Deceived Americans Out of Millions

LSSC’s online resources, including its website, news releases, and mobile apps for…

Lawsuit Filed by Civil Rights Organizations to Stop Texas’s New District Maps

The NAACP, along with the Lawyers’ Committee for Civil Rights Under Law,…

Savannah Community Grieves After Consecutive Shootings Claim Lives of Two Teens

The Savannah community gathered on Tuesday night to channel their sorrow into…

Scooter Company Scams Millions from Americans

IE 11 is not supported. For an optimal experience visit our site…

RFK Jr. Joins Texas Governor for MAHA Law Signing Ceremony

Health Secretary Robert F. Kennedy Jr. is scheduled to collaborate with Texas…

Princess Diana’s Time Capsule Unveiled After Many Years

LONDON — For many, Diana, Princess of Wales, epitomizes the 1990s era.…

Flood Devastates Couple’s Equine Business and Home, Community Rallies to Assist

EFFINGHAM COUNTY, Ga. () — In one evening, an Effingham County couple…