Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Error’d: Pickup Sticklers

      September 27, 2025

      From Prompt To Partner: Designing Your Custom AI Assistant

      September 27, 2025

      Microsoft unveils reimagined Marketplace for cloud solutions, AI apps, and more

      September 27, 2025

      Design Dialects: Breaking the Rules, Not the System

      September 27, 2025

      Building personal apps with open source and AI

      September 12, 2025

      What Can We Actually Do With corner-shape?

      September 12, 2025

      Craft, Clarity, and Care: The Story and Work of Mengchu Yao

      September 12, 2025

      Cailabs secures €57M to accelerate growth and industrial scale-up

      September 12, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Using phpinfo() to Debug Common and Not-so-Common PHP Errors and Warnings

      September 28, 2025
      Recent

      Using phpinfo() to Debug Common and Not-so-Common PHP Errors and Warnings

      September 28, 2025

      Mastering PHP File Uploads: A Guide to php.ini Settings and Code Examples

      September 28, 2025

      The first browser with JavaScript landed 30 years ago

      September 27, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured
      Recent
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Hacker Used Claude AI to Automate Reconnaissance, Harvest Credentials and Penetrate Networks

    Hacker Used Claude AI to Automate Reconnaissance, Harvest Credentials and Penetrate Networks

    August 29, 2025

    Claude AI, Antropic, AI, Artificial Intelligence

    A hacker used a popular artificial intelligence chatbot to run a cybercriminal operation that weaponized AI—deploying Claude AI Code not just as a copilot, but as the driver of an entire attack chain.

    In a campaign, detailed in Antropic AI’s August threat intelligence report, an attacker leveraged Claude Code, Anthropic’s AI coding agent, to run strike operations against 17 distinct organizations in sectors like healthcare, emergency services, government, and religious institutions. But this wasn’t a typical ransomware blitz—it was an orchestrated, AI-driven extortion campaign with strategic and automated execution.

    Rather than encrypting data, the attacker threatened to publicly expose stolen information, sometimes demanding ransom payments exceeding $500,000. Anthropic dubs this approach “vibe hacking,” and it’s a paradigm shift. Why? The AI agent handled reconnaissance, credential harvesting, penetration, ransom calculation and even the design of psychologically tailored extortion messages—all with minimal human intervention.

    How Claude Took the Wheel

    Claude Code scanned thousands of VPN endpoints, identified vulnerable hosts, and initiated network intrusions. The AI helped collect, profile and prioritize extricable data including personal, financial and medical records of the victim organizations.

    Claude then also analyzed stolen financial datasets to determine optimal ransom levels. It designed extortion documents with visually alarming HTML visuals that were integrated directly into victim machines.

    The AI agent finally generated obfuscated tunneling tools including modified versions of Chisel and developed new proxy methods. Upon detection, it even crafted anti-debugging routines and filename masquerading to evade defensive scanners.

    A Dangerous Trend in AI-Powered Cybercrime

    As Anthropic notes, this marks a fundamental shift. AI is no longer a support tool but soon becoming a standalone attacker, capable of running multi-stage cyber campaigns. The report makes clear this threat model significantly lowers technical barriers to large-scale cybercrime. Anyone skilled with prompts can now launch complex, tailored, autonomous attacks—something the report predicts will only grow more common.

    Antropic also suggested “a need for new frameworks for evaluating cyber threats that account for AI enablement.”

    Anthropic responded by banning the actor’s accounts, rolling out a tailored detection classifier, and sharing technical indicators with partners to avoid similar future abuse.

    Anthropic’s report details other misuses of Claude including North Korea’s fake IT worker scam, deploying AI-generated personas for employment fraud, as well as emerging “ransomware-as-a-service” offerings generated via AI by actors with no coding expertise.

    Also read: US, Japan, South Korea Meet Private Partners to Combat North Korea’s IT Work Fraud Scheme

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleNow Streaming – Episode 3 of the Black Hat USA 2025 CISO Podcast Series
    Next Article Webinar: Why Top Teams Are Prioritizing Code-to-Cloud Mapping in Our 2025 AppSec

    Related Posts

    Development

    Using phpinfo() to Debug Common and Not-so-Common PHP Errors and Warnings

    September 28, 2025
    Development

    Mastering PHP File Uploads: A Guide to php.ini Settings and Code Examples

    September 28, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Meta AI Released the Perception Language Model (PLM): An Open and Reproducible Vision-Language Model to Tackle Challenging Visual Recognition Tasks

    Machine Learning

    CVE-2025-2605 (CVSS 9.9): Critical Vulnerability Found in Honeywell MB-Secure Alarm Panels

    Security

    Cambodia Cracks Down on Cybercrime: 1,000+ Arrests Across Five Provinces

    Development

    Challenges and strategies of migrating a high-throughput relational database

    Databases

    Highlights

    Simplify API Responses with Fluent Methods

    June 6, 2025

    Tired of constantly wrestling with type errors in API responses? Fluent methods offer a type-safe,…

    michael-rubel/laravel-formatters

    May 17, 2025

    AI-First Transformation Strategy Unfolds at the 3M Open

    June 24, 2025

    WhatsApp users angry over “optional” Meta AI that can’t be turned off

    April 24, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.