experts divided over claim that Chinese hackers launched world-first Artificial Intelligence-powered cyber attack

Anthropic said in a Nov. 13 statement that engineers disrupted a 'largely autonomous' operation that used its Claude model to automate roughly 80-90% of reconnaissance and exploitation against 30 organizations worldwide. Experts dispute the degree of autonomy but warn even partial Artificial Intelligence-driven orchestration lowers barriers to espionage and increases scalability.

Anthropic reported that engineers detected and disrupted what the company described as a ‘largely autonomous’ campaign that pointed its Claude model at targets across tech, finance, and government. Company representatives said the model carried out roughly 80-90% of a broad reconnaissance-and-exploitation effort affecting 30 organizations worldwide, with humans intervening for high-level decisions such as choosing targets and deciding when to pull stolen data. Anthropic said its monitoring and abuse-detection systems flagged unusual patterns of automated task-chaining, and that attackers tried to bypass guardrails by decomposing malicious goals into apparently benign penetration-testing steps. In published examples the model produced errors, including hallucinated findings and invalid credentials.

Not all experts accept the framing of a near-complete autonomous attack. Mike Wilkes of Columbia University and NYU called the technical content of the intrusions ‘trivial’ but said the orchestration element is novel, flipping the narrative toward human-augmented Artificial Intelligence. Seun Ajao at Manchester Metropolitan University said many details ring true, including use of task decomposition and the need to correct hallucinated outputs, but argued the autonomy was likely overstated. Katerina Mitrokotsa at the University of St. Gallen characterised the incident as a hybrid operation in which an AI acted as an orchestration engine under human direction, and said claims that the model did 90% of the work are hard to accept given the reported errors that required manual correction.

Despite disagreement over whether Claude performed 80-90%, 50%, or far less of the work, experts agree on the broader implication: even partial Artificial Intelligence-driven orchestration lowers the barrier to entry for espionage, increases scalability, and blurs lines of responsibility. If Anthropic’s account is accurate, consumer-facing models can accelerate reconnaissance, compress the time from scanning to exploitation, and enable faster, repeatable campaigns. The most likely scenario, based on the reporting and expert commentary, is a human-led operation supercharged by an AI assistant that stitched together reconnaissance, exploit drafts, and code generation; defenders should expect more hybrid operations that multiply human capability rather than fully replace it.

68

Impact Score

UK mps open inquiry into artificial intelligence and edtech in education

UK mps have launched a cross party inquiry into how artificial intelligence and education technology are reshaping learning across early years, schools, colleges and universities, and how government should balance innovation with safeguards. The education committee will examine opportunities to improve teaching and workload alongside risks around inequality, privacy, safeguarding and assessment.

Most UK firms see Artificial Intelligence training gap as shadow tool use grows

New research finds that 6 in 10 UK businesses say employees lack comprehensive Artificial Intelligence training, even as shadow use of unapproved tools becomes widespread and investment surges. Executives warn that without stronger skills, governance and strategy, many organisations risk missing out on expected Artificial Intelligence returns.

COSO issues internal control roadmap for governing generative artificial intelligence

COSO has released governance guidance that applies its Internal Control-Integrated Framework to generative artificial intelligence, offering audit-ready control structures and implementation tools for organizations. The publication details capability-based risk mapping, aligned controls, and practical templates to help institutions manage emerging technology risks.

Contact Us

Got questions? Use the form to contact us.

Contact Form

Clicking next sends a verification code to your email. After verifying, you can enter your message.