Anthropic Claims Of Claude Ai-automated Cyberattacks Met With Doubt

Anthropic Claims Of Claude Ai-automated Cyberattacks Met With Doubt

Anthropic reports that a Chinese state-sponsored threat group, tracked as GTG-1002, carried out a cyber-espionage operation that was largely automated through the abuse of the company's Claude Code AI model.

However, Anthropic's claims immediately sparked widespread skepticism, with security researchers and AI practitioners calling the report "made up" or the company of overstating the incident.

"I agree with Jeremy Kirk’s assessment of the Anthropic’s GenAI report. It’s odd. Their prior one was, too," cybersecurity expert Kevin Beaumont posted on Mastodon.

"The operational impact should likely be zero - existing detections will work for open source tooling, most likely. The complete lack of IoCs again strongly suggests they don’t want to be called out over that."

Others argued the report exaggerated what current AI systems can realistically accomplish.

"This Anthropic thing is marketing guff. AI is a super boost but it's not skynet, it doesn't think, it's not actually artificial intelligence (that's a marketing thing people came up with)," posted cybersecurity researcher Daniel Card.

Much of the skepticism stems from Anthropic providing no indicators of compromise (IOCs) behind the campaign. Furthermore, BleepingComputer's requests for technical information about the attacks were not answered.

Despite the criticism, Anthropic claims that the incident represents the first publicly documented case of large-scale autonomous intrusion activity conducted by an AI model.

The attack, which Anthropic says it disrupted in mid-September 2025, used its Claude Code model to target 30 entities, including large tech firms, financial institutions, chemical manufacturers, and government agencies.

Although the firm says only a small number of  intrusions succeeded, it highlights the operation as the first of its kind at this scale, with AI allegedly autonomously conducting nearly all phases of the cyber-espionage workflow.

Source: BleepingComputer