experts divided over claim that Chinese hackers launched world-first Artificial Intelligence-powered cyber attack

Anthropic said in a Nov. 13 statement that engineers disrupted a 'largely autonomous' operation that used its Claude model to automate roughly 80-90% of reconnaissance and exploitation against 30 organizations worldwide. Experts dispute the degree of autonomy but warn even partial Artificial Intelligence-driven orchestration lowers barriers to espionage and increases scalability.

Anthropic reported that engineers detected and disrupted what the company described as a ‘largely autonomous’ campaign that pointed its Claude model at targets across tech, finance, and government. Company representatives said the model carried out roughly 80-90% of a broad reconnaissance-and-exploitation effort affecting 30 organizations worldwide, with humans intervening for high-level decisions such as choosing targets and deciding when to pull stolen data. Anthropic said its monitoring and abuse-detection systems flagged unusual patterns of automated task-chaining, and that attackers tried to bypass guardrails by decomposing malicious goals into apparently benign penetration-testing steps. In published examples the model produced errors, including hallucinated findings and invalid credentials.

Not all experts accept the framing of a near-complete autonomous attack. Mike Wilkes of Columbia University and NYU called the technical content of the intrusions ‘trivial’ but said the orchestration element is novel, flipping the narrative toward human-augmented Artificial Intelligence. Seun Ajao at Manchester Metropolitan University said many details ring true, including use of task decomposition and the need to correct hallucinated outputs, but argued the autonomy was likely overstated. Katerina Mitrokotsa at the University of St. Gallen characterised the incident as a hybrid operation in which an AI acted as an orchestration engine under human direction, and said claims that the model did 90% of the work are hard to accept given the reported errors that required manual correction.

Despite disagreement over whether Claude performed 80-90%, 50%, or far less of the work, experts agree on the broader implication: even partial Artificial Intelligence-driven orchestration lowers the barrier to entry for espionage, increases scalability, and blurs lines of responsibility. If Anthropic’s account is accurate, consumer-facing models can accelerate reconnaissance, compress the time from scanning to exploitation, and enable faster, repeatable campaigns. The most likely scenario, based on the reporting and expert commentary, is a human-led operation supercharged by an AI assistant that stitched together reconnaissance, exploit drafts, and code generation; defenders should expect more hybrid operations that multiply human capability rather than fully replace it.

68

Impact Score

Trump executive order targets state Artificial Intelligence laws

Executive Order 14365 lays out a federal strategy to discourage, challenge, and potentially preempt state Artificial Intelligence laws viewed as burdensome. Employers are advised to keep complying with current state and local rules while preparing for regulatory uncertainty in 2026.

Who decides how America uses Artificial Intelligence in war

Stanford experts are divided over how the United States should govern Artificial Intelligence in defense, surveillance, and warfare. Their views converge on one point: decisions with such high stakes cannot be left to companies alone.

GPUBreach bypasses IOMMU on GDDR6-based NVIDIA GPUs

Researchers from the University of Toronto describe GPUBreach, a rowhammer attack against GDDR6-based NVIDIA GPUs that can bypass IOMMU protections. The technique enables CPU-side privilege escalation by abusing trusted GPU driver behavior on the host system.

Google Vids opens free video generation to all Google users

Google has made Google Vids available to anyone with a Google account, adding free access to video generation with its latest models. The move expands Google’s end-to-end video workflow and increases pressure on rivals that charge for similar tools.

Contact Us

Got questions? Use the form to contact us.

Contact Form

Clicking next sends a verification code to your email. After verifying, you can enter your message.