
U.S. Commerce Sec. Lutnick says American AI dominates DeepSeek, thanks Trump for AI Action Plan
The attack was allegedly conducted in five phases — in Phase 1, the human operator assigns a target to Claude. In Phase 2, the AI is instructed to conduct its initial reconnaissance, using scan, search, data retrieval, and code analysis tools to deliver an initial analysis and summary of the target to its operator. Phase 3 is a more targeted version of Phase 2, where the AI runs a vulnerability scan based on its findings to determine how it will compromise the target.
This is also where the operator can instruct the AI to begin exploitation by engaging callback services. Again, the human operator reviews the AI’s findings and may even give the tool additional directives, either to run the scan again and find more weaknesses in the network or to begin Phases 4 and 5. In the last phases of the attack, the human operator directs the AI tool to obtain credentials and access data. At these stages, both the human and the AI tool can use the exploitation tools to locate and exfiltrate data from the target.
Although the AI still reverts to the human operator in various steps of the network intrusion, it mostly does this to report its findings and for further instructions. Otherwise, it mostly runs independently, around 80% to 90% of the time, allowing the bad actors to run an elaborate operation much quicker and with fewer humans in the loop.
Anthropic says that Claude has built-in safeguards to help prevent this from happening, but the attackers were able to circumvent this. The first thing they did was to convince the LLM that it was working for a cybersecurity company, and that it was being used for penetration testing and red teaming. They also broke down the entire operation into smaller, seemingly innocent tasks. This prevented Claude from seeing the entire context of the operation and the true purpose of its instructions.
Get Tom's Hardware's best news and in-depth reviews, straight to your inbox.
Key considerations
- Investor positioning can change fast
- Volatility remains possible near catalysts
- Macro rates and liquidity can dominate flows
Reference reading
- https://www.tomshardware.com/tech-industry/cyber-security/SPONSORED_LINK_URL
- https://www.tomshardware.com/tech-industry/cyber-security/anthropic-says-it-has-foiled-the-first-ever-ai-orchestrated-cyber-attack-originating-from-china-company-alleges-attack-was-run-by-chinese-state-sponsored-group#main
- https://www.tomshardware.com
- OpenAI’s colossal AI data center targets would consume as much electricity as entire nation of India — 250GW target would require 30 million GPUs annually to en
- YMTC moves ahead with third chipmaking fab in Wuhan despite U.S. sanctions — blacklisted Chinese chipmaker bets big on memory
- Creality 3D printers see big discounts in 'Mega Sale' — up to 34% off
- One of the best PCIe 4.0 SSDs we’ve tested is down to 7 cents per GB – the WD Black SN850X 2TB drops down to $139
- IBM unveils new 'Quantum Nighthawk' 120-qubit processor and software stack — company on track for 2029 fault-tolerance milestone
Informational only. No financial advice. Do your own research.