Claude at the Center of the First Documented AI-Driven Cyberattack

.elementor-widget-container{margin:0px 0px 0px 0px;padding:0px 0px 0px 0px;}.elementor-65851 .elementor-element.elementor-element-1cf67f8.elementor-element{–flex-grow:0;–flex-shrink:0;}.elementor-65851 .elementor-element.elementor-element-fba5b18{–display:flex;–flex-direction:row;–container-widget-width:initial;–container-widget-height:100%;–container-widget-flex-grow:1;–container-widget-align-self:stretch;–flex-wrap-mobile:wrap;}.elementor-widget-form .elementor-field-group > label, .elementor-widget-form .elementor-field-subgroup label{color:var( –e-global-color-text );}.elementor-widget-form .elementor-field-type-html{color:var( –e-global-color-text );}.elementor-widget-form .elementor-field-group .elementor-field{color:var( –e-global-color-text );}.elementor-widget-form .e-form__buttons__wrapper__button-next{background-color:var( –e-global-color-accent );}.elementor-widget-form .elementor-button[type=”submit”]{background-color:var( –e-global-color-accent );}.elementor-widget-form .e-form__buttons__wrapper__button-previous{background-color:var( –e-global-color-accent );}.elementor-widget-form{–e-form-steps-indicator-inactive-primary-color:var( –e-global-color-text );–e-form-steps-indicator-active-primary-color:var( –e-global-color-accent );–e-form-steps-indicator-completed-primary-color:var( –e-global-color-accent );–e-form-steps-indicator-progress-color:var( –e-global-color-accent );–e-form-steps-indicator-progress-background-color:var( –e-global-color-text );–e-form-steps-indicator-progress-meter-color:var( –e-global-color-text );}.elementor-65851 .elementor-element.elementor-element-5169176{width:var( –container-widget-width, 98.54% );max-width:98.54%;–container-widget-width:98.54%;–container-widget-flex-grow:0;–e-form-steps-indicators-spacing:17px;–e-form-steps-indicator-padding:30px;–e-form-steps-indicator-inactive-secondary-color:#ffffff;–e-form-steps-indicator-active-primary-color:var( –e-global-color-secondary );–e-form-steps-indicator-active-secondary-color:#ffffff;–e-form-steps-indicator-completed-secondary-color:#ffffff;–e-form-steps-divider-width:2px;–e-form-steps-divider-gap:10px;}.elementor-65851 .elementor-element.elementor-element-5169176 > .elementor-widget-container{margin:0px 0px 0px 0px;padding:0px 0px 0px 0px;}.elementor-65851 .elementor-element.elementor-element-5169176.elementor-element{–align-self:center;–flex-grow:0;–flex-shrink:0;}.elementor-65851 .elementor-element.elementor-element-5169176 .elementor-field-group{padding-right:calc( 60px/2 );padding-left:calc( 60px/2 );margin-bottom:20px;}.elementor-65851 .elementor-element.elementor-element-5169176 .elementor-form-fields-wrapper{margin-left:calc( -60px/2 );margin-right:calc( -60px/2 );margin-bottom:-20px;}.elementor-65851 .elementor-element.elementor-element-5169176 .elementor-field-group.recaptcha_v3-bottomleft, .elementor-65851 .elementor-element.elementor-element-5169176 .elementor-field-group.recaptcha_v3-bottomright{margin-bottom:0;}body.rtl .elementor-65851 .elementor-element.elementor-element-5169176 .elementor-labels-inline .elementor-field-group > label{padding-left:0px;}body:not(.rtl) .elementor-65851 .elementor-element.elementor-element-5169176 .elementor-labels-inline .elementor-field-group > label{padding-right:0px;}body .elementor-65851 .elementor-element.elementor-element-5169176 .elementor-labels-above .elementor-field-group > label{padding-bottom:0px;}.elementor-65851 .elementor-element.elementor-element-5169176 .elementor-field-type-html{padding-bottom:0px;}.elementor-65851 .elementor-element.elementor-element-5169176 .elementor-field-group .elementor-field:not(.elementor-select-wrapper){background-color:#ffffff;border-width:1px 1px 1px 1px;}.elementor-65851 .elementor-element.elementor-element-5169176 .elementor-field-group .elementor-select-wrapper select{background-color:#ffffff;border-width:1px 1px 1px 1px;}.elementor-65851 .elementor-element.elementor-element-5169176 .elementor-button{font-size:16px;font-weight:400;line-height:14px;letter-spacing:1px;border-radius:5px 5px 5px 5px;}.elementor-65851 .elementor-element.elementor-element-5169176 .e-form__buttons__wrapper__button-next{background-color:#000000;color:#ffffff;transition-duration:600ms;}.elementor-65851 .elementor-element.elementor-element-5169176 .elementor-button[type=”submit”]{background-color:#000000;color:#ffffff;transition-duration:600ms;}.elementor-65851 .elementor-element.elementor-element-5169176 .elementor-button[type=”submit”] svg *{fill:#ffffff;transition-duration:600ms;}.elementor-65851 .elementor-element.elementor-element-5169176 .e-form__buttons__wrapper__button-previous{background-color:#000000;color:#ffffff;transition-duration:600ms;}.elementor-65851 .elementor-element.elementor-element-5169176 .e-form__buttons__wrapper__button-next:hover{background-color:var( –e-global-color-9cda7ec );color:#ffffff;}.elementor-65851 .elementor-element.elementor-element-5169176 .elementor-button[type=”submit”]:hover{background-color:var( –e-global-color-9cda7ec );color:#ffffff;}.elementor-65851 .elementor-element.elementor-element-5169176 .elementor-button[type=”submit”]:hover svg *{fill:#ffffff;}.elementor-65851 .elementor-element.elementor-element-5169176 .e-form__buttons__wrapper__button-previous:hover{color:#ffffff;}@media(max-width:1024px){.elementor-65851 .elementor-element.elementor-element-fba5b18{–min-height:100px;–flex-direction:column;–container-widget-width:calc( ( 1 – var( –container-widget-flex-grow ) ) * 100% );–container-widget-height:initial;–container-widget-flex-grow:0;–container-widget-align-self:initial;–flex-wrap-mobile:wrap;–justify-content:space-between;–align-items:center;–flex-wrap:wrap;}}@media(max-width:767px){.elementor-65851 .elementor-element.elementor-element-89c0dd0{–flex-wrap:wrap;}.elementor-65851 .elementor-element.elementor-element-5169176.elementor-element{–flex-grow:1;–flex-shrink:0;}}@media(min-width:768px){.elementor-65851 .elementor-element.elementor-element-89c0dd0{–width:90%;}.elementor-65851 .elementor-element.elementor-element-fca7fb2{–width:58.509%;}.elementor-65851 .elementor-element.elementor-element-fba5b18{–width:74%;}}@media(max-width:1024px) and (min-width:768px){.elementor-65851 .elementor-element.elementor-element-fca7fb2{–width:288.502px;}.elementor-65851 .elementor-element.elementor-element-fba5b18{–width:500px;}}/* Start custom CSS for form, class: .elementor-element-5169176 */.elementor-65851 .elementor-element.elementor-element-5169176 .elementor-field-group {
width: 100%;
}
.elementor-65851 .elementor-element.elementor-element-5169176 .elementor-button {
width: 100%;
display: block;
}/* End custom CSS */]]>
Anthropic has released a detailed report on a cyber espionage campaign where its own Claude Code model was used to conduct a series of real-world intrusions.
The campaign was carried out by GTG-1002, a group identified with high confidence as a state-sponsored actor based in China. Around 30 organizations were targeted, including technology companies, government agencies, financial institutions, and industrial firms. Several of these targets experienced confirmed breaches.
What makes this incident notable is how the campaign was executed.
GTG-1002 relied on Claude to perform the majority of operational tasks. Instead of using the AI for assistance, the attackers treated it as an active participant. With only limited human supervision, Claude conducted reconnaissance, discovered vulnerabilities, accessed internal systems, collected data, and documented every step.
The attackers achieved this by prompting the model under false pretenses, convincing it that it was engaged in legitimate cybersecurity testing. This deception allowed them to carry out the operation without triggering safety systems or requiring extensive technical development.
Why It Matters: This campaign shows how AI can now carry out intrusion activity across multiple targets with minimal human input. Tools originally designed for development and automation are now being adapted to perform tasks typically handled by dedicated threat teams.
- Claude Handled Most of the Operation Without Step-by-Step Input: Anthropic found that Claude completed 80% to 90% of the campaign’s technical workload. It carried out operational tasks independently, without needing ongoing instruction or human intervention. Operators handled campaign setup and stepped in only at key points, such as approving escalation or selecting data to extract. Claude also retained context between sessions, which allowed it to continue work after long gaps without re-instruction. This made it possible to keep operations active over time without restarting from scratch.
- Claude Was Misled Into Believing It Was Acting Legally: The attackers posed as security consultants conducting approved penetration tests. Claude accepted this framing and carried out tasks like identifying weak points and deploying payloads. The prompts remained within expected safety boundaries, so no warnings were raised. This allowed the activity to spread across multiple targets before it was detected.
- The Attack Framework Allowed Tasks to Run in Parallel and Scale Efficiently: GTG-1002 built its system around Model Context Protocol (MCP), allowing Claude to carry out tasks like privilege escalation and data extraction. Each task was framed as routine technical work, making them appear benign on their own. Over time, these tasks combined into full intrusion paths across multiple environments. This setup let the group maintain access to several targets with little direct involvement.
- Claude Explored, Extracted, and Analyzed Data Without Direct Oversight: After gaining access, Claude navigated internal networks and identified key systems. It tested permissions and established new accounts to secure its position. It also processed extracted content to highlight what appeared most valuable. All actions were recorded in markdown files with detailed logs, making it easy for human operators to pick up activity later without retracing earlier steps.
- Anthropic Took Action to Contain the Threat and Improve Defenses: After discovering the campaign, Anthropic banned the involved accounts and notified affected organizations. It also shared findings with government agencies and industry partners. Internally, detection systems were updated to recognize patterns linked to AI-driven misuse. New classifiers were added to spot abuse more reliably, and early detection tools are in development. Although this case involved Claude, the report warns that other models with similar capabilities could be exploited in the same way. Defenders are advised to integrate AI into their workflows and prepare for continued misuse.
Go Deeper -> Disrupting the first reported AI-orchestrated cyber espionage campaign – Anthropic
Trusted insights for technology leaders
Our readers are CIOs, CTOs, and senior IT executives who rely on The National CIO Review for smart, curated takes on the trends shaping the enterprise, from GenAI to cybersecurity and beyond.
Subscribe to our 4x a week newsletter to keep up with the insights that matter.


