A hacker turned a popular AI tool into a cybercrime machine\” />:root{–wp-admin-theme-color:#007cba;–wp-admin-theme-color–rgb:0,124,186;–wp-admin-theme-color-darker-10:#006ba1;–wp-admin-theme-color-darker-10–rgb:0,107,161;–wp-admin-theme-color-darker-20:#005a87;–wp-admin-theme-color-darker-20–rgb:0,90,135;–wp-admin-border-width-focus:2px;–wp-block-synced-color:#7a00df;–wp-block-synced-color–rgb:122,0,223;–wp-bound-block-color:var(–wp-block-synced-color)}@media (min-resolution:192dpi){:root{–wp-admin-border-width-focus:1.5px}}.wp-element-button{cursor:pointer}:root{–wp–preset–font-size–normal:16px;–wp–preset–font-size–huge:42px}:root .has-very-light-gray-background-color{background-color:#eee}:root .has-very-dark-gray-background-color{background-color:#313131}:root .has-very-light-gray-color{color:#eee}:root .has-very-dark-gray-color{color:#313131}:root .has-vivid-green-cyan-to-vivid-cyan-blue-gradient-background{background:linear-gradient(135deg,#00d084,#0693e3)}:root .has-purple-crush-gradient-background{background:linear-gradient(135deg,#34e2e4,#4721fb 50%,#ab1dfe)}:root .has-hazy-dawn-gradient-background{background:linear-gradient(135deg,#faaca8,#dad0ec)}:root .has-subdued-olive-gradient-background{background:linear-gradient(135deg,#fafae1,#67a671)}:root .has-atomic-cream-gradient-background{background:linear-gradient(135deg,#fdd79a,#004a59)}:root .has-nightshade-gradient-background{background:linear-gradient(135deg,#330968,#31cdcf)}:root .has-midnight-gradient-background{background:linear-gradient(135deg,#020381,#2874fc)}.has-regular-font-size{font-size:1em}.has-larger-font-size{font-size:2.625em}.has-normal-font-size{font-size:var(–wp–preset–font-size–normal)}.has-huge-font-size{font-size:var(–wp–preset–font-size–huge)}.has-text-align-center{text-align:center}.has-text-align-left{text-align:left}.has-text-align-right{text-align:right}#end-resizable-editor-section{display:none}.aligncenter{clear:both}.items-justified-left{justify-content:flex-start}.items-justified-center{justify-content:center}.items-justified-right{justify-content:flex-end}.items-justified-space-between{justify-content:space-between}.screen-reader-text{border:0;clip-path:inset(50%);height:1px;margin:-1px;overflow:hidden;padding:0;position:absolute;width:1px;word-wrap:normal!important}.screen-reader-text:focus{background-color:#ddd;clip-path:none;color:#444;display:block;font-size:1em;height:auto;left:5px;line-height:normal;padding:15px 23px 14px;text-decoration:none;top:5px;width:auto;z-index:100000}html :where(.has-border-color){border-style:solid}html :where([style*=border-top-color]){border-top-style:solid}html :where([style*=border-right-color]){border-right-style:solid}html :where([style*=border-bottom-color]){border-bottom-style:solid}html :where([style*=border-left-color]){border-left-style:solid}html :where([style*=border-width]){border-style:solid}html :where([style*=border-top-width]){border-top-style:solid}html :where([style*=border-right-width]){border-right-style:solid}html :where([style*=border-bottom-width]){border-bottom-style:solid}html :where([style*=border-left-width]){border-left-style:solid}html :where(img[class*=wp-image-]){height:auto;max-width:100%}:where(figure){margin:0 0 1em}html :where(.is-position-sticky){–wp-admin–admin-bar–position-offset:var(–wp-admin–admin-bar–height,0px)}@media screen and (max-width:600px){html :where(.is-position-sticky){–wp-admin–admin-bar–position-offset:0px}}/*! This file is auto-generated */.wp-block-button__link{color:#fff;background-color:#32373c;border-radius:9999px;box-shadow:none;text-decoration:none;padding:calc(.667em + 2px) calc(1.333em + 2px);font-size:1.125em}.wp-block-file__button{background:#32373c;color:#fff;text-decoration:none}

A hacker turned a popular AI tool into a cybercrime machine\” />:root{–wp-admin-theme-color:#007cba;–wp-admin-theme-color–rgb:0,124,186;–wp-admin-theme-color-darker-10:#006ba1;–wp-admin-theme-color-darker-10–rgb:0,107,161;–wp-admin-theme-color-darker-20:#005a87;–wp-admin-theme-color-darker-20–rgb:0,90,135;–wp-admin-border-width-focus:2px;–wp-block-synced-color:#7a00df;–wp-block-synced-color–rgb:122,0,223;–wp-bound-block-color:var(–wp-block-synced-color)}@media (min-resolution:192dpi){:root{–wp-admin-border-width-focus:1.5px}}.wp-element-button{cursor:pointer}:root{–wp–preset–font-size–normal:16px;–wp–preset–font-size–huge:42px}:root .has-very-light-gray-background-color{background-color:#eee}:root .has-very-dark-gray-background-color{background-color:#313131}:root .has-very-light-gray-color{color:#eee}:root .has-very-dark-gray-color{color:#313131}:root .has-vivid-green-cyan-to-vivid-cyan-blue-gradient-background{background:linear-gradient(135deg,#00d084,#0693e3)}:root .has-purple-crush-gradient-background{background:linear-gradient(135deg,#34e2e4,#4721fb 50%,#ab1dfe)}:root .has-hazy-dawn-gradient-background{background:linear-gradient(135deg,#faaca8,#dad0ec)}:root .has-subdued-olive-gradient-background{background:linear-gradient(135deg,#fafae1,#67a671)}:root .has-atomic-cream-gradient-background{background:linear-gradient(135deg,#fdd79a,#004a59)}:root .has-nightshade-gradient-background{background:linear-gradient(135deg,#330968,#31cdcf)}:root .has-midnight-gradient-background{background:linear-gradient(135deg,#020381,#2874fc)}.has-regular-font-size{font-size:1em}.has-larger-font-size{font-size:2.625em}.has-normal-font-size{font-size:var(–wp–preset–font-size–normal)}.has-huge-font-size{font-size:var(–wp–preset–font-size–huge)}.has-text-align-center{text-align:center}.has-text-align-left{text-align:left}.has-text-align-right{text-align:right}#end-resizable-editor-section{display:none}.aligncenter{clear:both}.items-justified-left{justify-content:flex-start}.items-justified-center{justify-content:center}.items-justified-right{justify-content:flex-end}.items-justified-space-between{justify-content:space-between}.screen-reader-text{border:0;clip-path:inset(50%);height:1px;margin:-1px;overflow:hidden;padding:0;position:absolute;width:1px;word-wrap:normal!important}.screen-reader-text:focus{background-color:#ddd;clip-path:none;color:#444;display:block;font-size:1em;height:auto;left:5px;line-height:normal;padding:15px 23px 14px;text-decoration:none;top:5px;width:auto;z-index:100000}html :where(.has-border-color){border-style:solid}html :where([style*=border-top-color]){border-top-style:solid}html :where([style*=border-right-color]){border-right-style:solid}html :where([style*=border-bottom-color]){border-bottom-style:solid}html :where([style*=border-left-color]){border-left-style:solid}html :where([style*=border-width]){border-style:solid}html :where([style*=border-top-width]){border-top-style:solid}html :where([style*=border-right-width]){border-right-style:solid}html :where([style*=border-bottom-width]){border-bottom-style:solid}html :where([style*=border-left-width]){border-left-style:solid}html :where(img[class*=wp-image-]){height:auto;max-width:100%}:where(figure){margin:0 0 1em}html :where(.is-position-sticky){–wp-admin–admin-bar–position-offset:var(–wp-admin–admin-bar–height,0px)}@media screen and (max-width:600px){html :where(.is-position-sticky){–wp-admin–admin-bar–position-offset:0px}}/*! This file is auto-generated */.wp-block-button__link{color:#fff;background-color:#32373c;border-radius:9999px;box-shadow:none;text-decoration:none;padding:calc(.667em + 2px) calc(1.333em + 2px);font-size:1.125em}.wp-block-file__button{background:#32373c;color:#fff;text-decoration:none}

The company behind the popular AI chatbot Claude has issued a chilling warning about cybercriminals’ growing use of AI tools as the technology becomes increasingly sophisticated.

In its latest Threat Intelligence report, Anthropic detailed the recent case of how a hacker used its AI tools to launch a cyberattack targeting numerous companies and organizations.

Recommended Videos

(function(){let containerEl=document.getElementById(‘dt-cnx-container-68b0292d03b25’);const deletePlayer=()=>{if(containerEl){containerEl.remove();containerEl=null}};if(!window.DT_RELATED_PLAYER_PROVIDER){deletePlayer();return}
const iasAnId=decodeURIComponent(‘927851’);if(!window.dtCNXReady){const loadIAS=()=>{return new Promise((resolve)=>{const e=document.createElement(‘script’);e.src=’https://static.adsafeprotected.com/vans-adapter-google-ima.js’;e.onload=()=>{resolve()};document.head.appendChild(e)})};const loadCNX=()=>{return new Promise((resolve)=>{!function(n){if(!window.cnx){window.cnx={},window.cnx.cmd=[];var t=n.createElement(‘iframe’);t.src=’javascript:false’;t.style.display=’none’,t.onload=function(){var n=t.contentWindow.document,c=n.createElement(‘script’);c.onload=function(){window.dtCNXIframe=t;resolve()};c.src=’//cd.connatix.com/connatix.player.js?cid=2a2352ef-fe98-483c-8897-aef587823f13′,c.setAttribute(‘async’,’1′),c.setAttribute(‘type’,’text/javascript’),n.body.appendChild(c)};if(document.readyState!==’loading’){n.body.appendChild(t)}else{n.addEventListener(“DOMContentLoaded”,function(){n.body.appendChild(t)})}}}(document)})};window.dtCNXReady=()=>{if(!window.dtCNXReadyPromise){window.dtCNXReadyPromise=new Promise((resolve)=>{Promise.all([iasAnId?loadIAS():Promise.resolve(),]).then(()=>loadCNX()).then(()=>{resolve()})})}
return window.dtCNXReadyPromise}}
const disableFloating=()=>{let playerAPI=window.DTConnatixPlayers&&window.DTConnatixPlayers[‘dt-cnx-player-68b0292d03b24’];if(playerAPI){playerAPI.disableFloatingMode()}else{DTEvent.on(‘dt-connatix-player-ready’,()=>{playerAPI=window.DTConnatixPlayers[‘dt-cnx-player-68b0292d03b24’];if(playerAPI){playerAPI.disableFloatingMode()}})}};window.dtDampenPlayerCallbacks=window.dtDampenPlayerCallbacks||{};window.dtDampenPlayerCallbacks[‘dt-cnx-player-68b0292d03b24’]=deletePlayer;const lazyLoad=()=>{return new Promise((resolve)=>{if(containerEl&&window.IntersectionObserver){const observer=new IntersectionObserver((entries)=>{if(entries[0].isIntersecting){observer.disconnect();if(containerEl){window.dtDampenPlayerCallbacks[‘dt-cnx-player-68b0292d03b24′]=disableFloating;resolve()}}},{rootMargin:’300px’});observer.observe(containerEl)}})};Promise.resolve().then(()=>lazyLoad()).then(()=>window.dtCNXReady()).then(()=>{(new Image()).src=’https://capi.connatix.com/tr/si?token=65fece0c-941b-4d77-b455-b6d23b01b35b&cid=2a2352ef-fe98-483c-8897-aef587823f13′;cnx.cmd.push(()=>{cnx({playerId:’65fece0c-941b-4d77-b455-b6d23b01b35b’,mediaId:”,playlistId:”,settings:{playbackMode:cnx.configEnums.PlaybackModeEnum.AutoPlay,},}).render(‘dt-cnx-player-68b0292d03b24’,(renderError,playerAPI)=>{if(playerAPI){window.DTConnatixPlayers=window.DTConnatixPlayers||{};window.DTConnatixPlayers[‘dt-cnx-player-68b0292d03b24’]=playerAPI;DTEvent.trigger(‘dt-connatix-player-ready’);const videoTitleEl=containerEl.querySelector(‘.h-video-title’);if(videoTitleEl){playerAPI.getAllMetadata().then((metadata)=>{if(metadata&&metadata.length>0){videoTitleEl.innerText=metadata[0].title}})}
if(iasAnId){const videoElement=document.getElementById(‘dt-cnx-player-68b0292d03b24’).parentElement.querySelector(‘.cnx-video-container’);playerAPI.on(cnx.configEvents.ImaAdsManager,(adsManager)=>{const adUnit=adsManager.Oa.l.iu;try{const config={anId:iasAnId,campId:playerAPI.getSize().width+’x’+playerAPI.getSize().height,chanId:adUnit,};googleImaVansAdapter.init(window.dtCNXIframe.contentWindow.google,adsManager,videoElement,config)}catch(error){console.error(‘Could not init IAS for Connatix.’,error)}})}}})})})}())

According to Anthropic, the hacker used an AI coding agent (in this case Claude Code), a tool that’s capable of writing, editing, and running code with minimal human input.

(function(){if(document.currentScript){var e=document.currentScript.parentNode;if(e.classList.contains(‘dtads-location’)){if(!e.classList.contains(‘dtads-‘+window.DTScenario.getExperience())){e.parentNode.removeChild(e)}}}}());

It said that over the past month, the hacker used the agent to automate “reconnaissance, credential harvesting, and network penetration at scale,” stealing sensitive data from at least 17 businesses and organizations across government, healthcare, emergency services, and religious institutions.

(function(){if(document.currentScript){var e=document.currentScript.parentNode;if(e.classList.contains(‘dtads-location’)){if(!e.classList.contains(‘dtads-‘+window.DTScenario.getExperience())){e.parentNode.removeChild(e)}}}}());

The perpetrator was able to obtain people’s personal records, including healthcare data, financial information, and government credentials before going on to demand ransom payments while threatening to expose the data online if the demands were not met.

(function(){if(document.currentScript){var e=document.currentScript.parentNode;if(e.classList.contains(‘dtads-location’)){if(!e.classList.contains(‘dtads-‘+window.DTScenario.getExperience())){e.parentNode.removeChild(e)}}}}());

The Claude AI agent even analyzed the stolen financial data to work out the appropriate ransom amount — up to $500,000 was demanded in some of the attacks — and also created “visually alarming” ransom notes that appeared on the targets’ computer screens. 

Anthropic said that the bold operation demonstrates “a concerning evolution in AI-assisted cybercrime” and “represents a fundamental shift in how cybercriminals can scale their operations” now that AI can be used to automate much of the hacking process, albeit under human direction. 

While it’s not clear if any of the targets in this particular case paid up, Anthropic said it has now taken steps to prevent this type of misuse. But it added that this method of attack is likely to become increasingly common “as AI lowers the barrier to entry for sophisticated cybercrime operations.”

Its latest Threat Intelligence report also highlighted how North Korean operatives have been using Claude to fraudulently secure remote employment positions at U.S. Fortune 500 technology companies, and another case in which a cybercriminal used its AI tools to create and market various ransomware products, selling them on to other cybercriminals for up to $1,200 a piece. 

Many hackers have been using AI in some form for years. However, chatbots like ChatGPT, which was released in 2022, have made it easier to launch attacks, and now the rise of AI agents poses an even greater threat. Fortunately, the very technology being exploited by attackers is also being harnessed by cybersecurity firms to build a critical line of defense, though clearly it’s a constant battle to keep pace.