AI Firm Claims to Have Foiled Cyberattack Campaign Backed by Chinese State

Top AI firms assert that they have disrupted a Chinese-supported “cyber espionage operation” capable of breaching financial institutions and government bodies with minimal human oversight.

US-based Anthropic revealed that its coding tool, Claude Code, was “utilized” by a state-backed Chinese group in September to target 30 organizations globally, leading to “multiple successful intrusions.”

In a recent blog post, the company described this as a “significant escalation” compared to earlier AI-driven attacks it had monitored. On Thursday, it was noted that Claude executed 80-90% of the operations autonomously, with little to no human involvement.

“This attacker achieved what we believe to be the first documented instance of a large-scale cyber attack executed without human intervention,” the report states.

Anthropic did not disclose the specific financial institutions or government entities targeted or the exact outcomes of the intrusions but confirmed that the attackers accessed the internal data of the victims.

Claude also acknowledged making numerous errors during the attack, at times fabricating details about its targets and claiming to have “uncovered” information that was actually available to the public.

Policymakers and experts expressed concerns about the implications of these findings, indicating that certain AI systems, like Claude, have developed the capability to operate independently for prolonged periods.

“Wake up. If we don’t prioritize AI regulation nationally starting tomorrow, this may lead to our downfall sooner than we think,” stated U.S. Senator Chris Murphy. I wrote in response to these findings.

“AI systems can now execute tasks that once required skilled human operators,” remarked Fred Heiding, a researcher at Harvard’s Defense, Emerging Technologies, and Strategy Program.

“My research has delved into how AI systems increasingly automate portions of the cyber kill chain each year… It’s becoming significantly easier for attackers to inflict real damage. AI companies are not assuming enough accountability.”

Other cybersecurity experts expressed skepticism, citing exaggerated claims regarding AI-driven cyberattacks in recent years. A report on a 2023 “password cracker” demonstrated comparable effectiveness to traditional methods, suggesting that Anthropic may be overhyping AI’s capabilities.

“In my view, Anthropic is presenting advanced automation and nothing more,” stated independent cybersecurity expert Michal “Rizik” Wozniak. “There’s code generation involved, but it’s not ‘intelligence’; it’s merely enhanced copy and paste.”

Wozniak further commented that Anthropic’s announcement diverts attention from broader cybersecurity issues, noting that businesses and governments are adopting “complex and poorly understood” AI tools without fully grasping them, thereby exposing themselves to vulnerabilities. He emphasized that the true threat lies with cybercriminals and insufficient cybersecurity measures.

Like all leading AI companies, Anthropic has implemented safeguards to prevent its models from engaging in cyberattacks or causing harm generally. However, hackers managed to circumvent these safety measures by instructing Claude to role-play as a “legitimate cybersecurity company employee” conducting assessments, as noted in the report.

“Anthropic is valued at around $180 billion, yet they can’t seem to ensure their tools aren’t easily manipulated by tactics a 13-year-old might use to prank call someone,” Wozniak remarked.

Marius Hovhan, founder of Apollo Research, which assesses the security of AI models, remarked that the attack signifies what could transpire as capabilities advance.

“I don’t believe society is sufficiently prepared for the rapid changes in AI and cyber capabilities,” he stated. “We expect many more such incidents in the coming years, potentially with even greater consequences.”

Source: www.theguardian.com

Shedding 25 Pounds in 20 Days: My Experience on the Front Lines of a Global Cyberattack

Tim Brown will always remember December 12, 2020.

This was the day SolarWinds, a software company, learned it had been hacked by Russia.

As the chief information security officer, Brown quickly grasped the impact. The hack could potentially affect any of the company’s more than 300,000 customers globally.

The breach enabled hackers to remotely access systems of customers using SolarWinds’ Orion networking software, which included the U.S. Department of the Treasury, the National Telecommunications and Information Administration, and numerous businesses and public organizations.


Brown mentioned he was “running on adrenaline” during the initial days following the breach.

Amid full-time remote work due to the COVID-19 pandemic, the company’s email system was compromised, rendering it unusable for internal communication.

“We stopped taking calls, and everyone came into the office for COVID-19 testing,” Brown recalled. “I lost 25 pounds in about 20 days. I just kept going.”

He has been featured on CNN and 60 Minutes, along with major newspapers.

“The world is on fire. We’re working to inform people about what is secure and what isn’t.”

Brown indicated the company moved to Proton email and Signal during the email breach, as he received calls from companies and government entities worldwide, including the U.S. military and the COVID-19 vaccine initiative, Operation Warp Speed.

“People prefer spoken communication to written communication. That’s a crucial lesson. You can document things, but people want personal interaction,” said Brown during a talk at Cybercon in Melbourne.

“They want to hear the nuances, so it’s vital to be ready for that kind of response.”

How did the cyberattack unfold?

The notification of the breach came via a call from Kevin Mandia, the founder of cybersecurity firm Mandiant, to SolarWinds’ then-CEO, Kevin Thompson.

Mandia informed Thompson that SolarWinds had “shipped contaminated code” within its Orion software, which aids organizations in monitoring their networks and servers for outages.

According to Mandia, the exploits in Orion were utilized to infiltrate government agencies.

“What you can see from that code is that it wasn’t ours, so we realized right away this was serious,” Brown recalled.




Brown stated that SolarWinds was not the main target of the hack but served as a “conduit to it.” Photo: Sean Davey/The Guardian

The Texas-based company discovered that 18,000 people had downloaded the contaminated product, and hackers, later attributed to Russia’s Foreign Intelligence Service, managed to inject it into Orion’s build environment where the source code is converted into software.

The news broke on a Sunday, and SolarWinds released the announcement before the stock market opened on Monday.

Initial estimates suggested that as many as 18,000 customers might be impacted, which later adjusted down to approximately 100 government agencies and businesses that were truly affected.

“I wish I had known that on the first day, but that’s the reality,” Brown says. “We weren’t specifically the target; we were merely a gateway to it.”

SolarWinds enlisted the help of CrowdStrike, KPMG, and law firm DLA Piper to respond and investigate.

Aftermath: heart attack

For the next six months, SolarWinds suspended the development of new features and redirected its team of 400 engineers to focus on systems and security to restore the company’s stability.

“We prioritized transparency—how can we ensure people understand what threats there are, how those actors operate, how they gather information, how they execute attacks, and how they withdraw?”

Brown noted that the company’s customer renewal rate dropped to around 80% in the aftermath but has since risen back to over 98%.

However, legal consequences soon followed.

In 2021, the Biden administration enacted sanctions and expelled Russian diplomats in response to the attack.

In 2022, SolarWinds settled a class action suit related to the incident for $26 million. The Securities and Exchange Commission (SEC) initiated a lawsuit against SolarWinds and Brown personally in October 2023, alleging that the company and Brown misled investors regarding cybersecurity measures and failed to disclose known vulnerabilities.




Mr. Brown has remained with SolarWinds since the cyberattack. Photo: Sean Davey/The Guardian

Brown was in Zurich when he became aware of the charges.

“As I ascended a hill, I felt out of breath, my arms were heavy, and my chest was tight—I wasn’t getting enough oxygen,” he recalled. “I made a poor decision and flew home. I couldn’t walk from the terminal to my car without pausing; it was a journey I had made countless times.”

He was experiencing a heart attack. Upon returning home, his wife took him to the hospital for surgery, after which he recovered.

“The stress continued to mount, leading me to think I was handling it well without proactively visiting a doctor,” he explained.

Now, Brown is advocating for companies facing similar crises to engage psychiatrists to assist employees in managing stress.


“My stress levels were at a peak, and I was really close to the edge, though the pressure had been building for a while.”

A proposed confidential settlement with the SEC was announced in July but still awaits approval. The finalization of the agreement has faced delays due to the U.S. government shutdown.

Mr. Brown has remained with SolarWinds throughout this entire ordeal.

“This happened on my watch, and that’s how I perceive it. There are factors that contributed, like a state-sponsored attack, but it still occurred under my supervision,” he reflected.

“I admit I can be stubborn, but it was paramount for us to navigate this entire process, and leaving before it was resolved wasn’t an option.”

Source: www.theguardian.com

Louis Vuitton Reports Cyberattack Compromising UK Customer Data | Cybercrime

Louis Vuitton has announced that data from some of its UK customers has been compromised, making it the latest retailer to fall victim to cyber hackers.

The prestigious brand, part of the French luxury conglomerate LVMH, reported that an unauthorized third party gained access to the UK operations system, retrieving personal information such as names, contact information, and purchase histories.

Last week, Louis Vuitton informed customers that its South Korean business was experiencing similar cyber incidents and reassured them that financial data, including bank information, remained secure.

“Currently, there is no evidence of misuse of your data; however, you may encounter phishing attempts, fraud attempts, or unauthorized use of your information,” the email stated.

The company has reported the breach to the appropriate authorities, including the intelligence committee.

As reported by Bloomberg, the hack occurred on July 2nd and marked the third breach of the LVMH system within the past three months.

In addition to the incidents involving Louis Vuitton, LVMH’s second-largest fashion brand, Christian Dior Couture, disclosed in May that hackers also had access to customer data.

On Thursday, four individuals were arrested in connection with a cyberattack involving Marks & Spencer, The Co-op, and Harrods.

Those arrested included a 17-year-old British male from the West Midlands, a 19-year-old Latvian male also from the West Midlands, a 19-year-old British male from London, and a 20-year-old British female from Staffordshire.

M&S was the initial target of this wave of attacks back in April, which led to the online store’s closure for nearly seven weeks. The Co-op was similarly attacked that month, forcing a shutdown of several IT systems.

Harrods reported being targeted on May 1, which resulted in restricted internet access across its website following attempts to gain unauthorized entry to the system.

The chairman of M&S, Archie Norman, stated that days after the arrests, two other large UK companies had also experienced unreported cyberattacks in recent months.

Louis Vuitton has been contacted for further comments.

Source: www.theguardian.com

Top US Crypto Exchange Estimates Recent Cyberattack Costs Could Hit $400 Million: Our Response to Cybercrime

The leading cryptocurrency exchange in the U.S. estimates that cyber attacks compromising account information for a “small subset” of users will incur costs ranging from $180 million to $400 million. Coinbase noted that this estimate does not factor in the $20 million ransom demanded by hackers, which the firm opted not to pay.

As the largest platform for cryptocurrency transactions in the United States, Coinbase reported that while attackers accessed sensitive information like names, addresses, and emails, they did not acquire login credentials or passwords. Nevertheless, the company is refunding customers who were tricked into sending funds to the attackers.

The hackers engaged various contractors and employees based outside the U.S. to extract information from internal systems. In response, Coinbase promptly terminated the implicated employee.


Furthermore, Coinbase has also declined to pay the ransom and is actively collaborating with law enforcement. Instead, they have offered a $20 million reward for information regarding the perpetrator.

“We are committed to investigating this case, enhancing security measures, and providing reimbursements to affected customers instead of funding criminal activities,” the company stated in its blog post.

On May 11, the company received an email from an unidentified threat actor claiming to possess information about certain customer accounts and internal documents. This revelation comes just days before Coinbase is poised to enter the Benchmark S&P 500 Index, representing a historic milestone in the cryptocurrency sector.

Security remains a significant issue for the cryptocurrency industry. In February, BYBIT, the second-largest cryptocurrency exchange globally, disclosed that an attacker had stolen approximately $1.5 billion worth of digital tokens.

Skip past newsletter promotions

In 2024, the total amount of funds stolen from hacking of cryptocurrency platforms reached $2.2 billion, according to a report from the blockchain analytics firm Chain Orisys. This marks the fourth year in a row that such hacks have surpassed $1 billion.

Source: www.theguardian.com

Marks & Spencer Halts Online Orders Amid Cyberattack Fallout

Marks & Spencer has halted all orders via its website and app as retailers grapple with the aftermath of a cyberattack that began on Monday.

The company expressed regret to customers for “the inconvenience,” stating that the suspension of digital orders is “part of an aggressive management strategy for cyber incidents.”

“Our experienced team is collaborating with key cyber experts, and we are diligently working to restore online and app shopping,” he remarked.

Customers can still browse online and make purchases at physical stores using cash or credit cards.

The website’s shutdown follows several days of problems at retail locations, where contactless payments and online order collections were severely affected since Monday. Contactless payments resumed late Thursday.

Customers with existing online orders can collect them in-store once they receive confirmation, but placing new orders is not permitted. M&S clarified that customers do not need to take any action and assured that their details were not accessed.

The retailer’s shares have dropped by as much as 4%, following a 2.3% decline at Friday’s close, marking a significant fall within the FTSE 100.

Only about one-third of M&S’ clothing and home goods sales occur online, and the order suspension comes just before an anticipated heatwave, likely to increase demand for clothing and outdoor entertainment gear during busy weekends.

The cyber incident initiated on Monday impacted contactless payments and click-and-collect orders at stores throughout the UK. Notably, a separate technical issue affected only contactless payments during the busy Easter weekend.

M&S has enlisted cybersecurity specialists to aid in investigating and managing the situation, implementing measures to bolster network security and continue serving customers effectively.

Security experts cautioned shoppers to be vigilant against scammers exploiting high-profile cases.

Nicholas, head of commercial content at Retail Economics, stated, “The Marks & Spencer cyberattacks serve as a reminder that no retailer, regardless of its establishment or digital sophistication, is safe from the growing threat of cybercrime.”

Skip past newsletter promotions

“While M&S is bearing the impact of this specific attack, it’s important to note that this isn’t an isolated incident. Cyberattacks represent a systemic risk facing the retail sector as a whole.”

The cyber incidents targeting M&S have occurred alongside a series of similar events in recent years. Last September, Transport for London had to shut down several online services due to a cyber attack.

In 2023, Royal Mail was compelled to halt international parcel and letter dispatches after a cyber attack caused significant disruption to its services, while WH Smith suffered an attack that illegally accessed data, including personal information of current and former employees, occurring less than a year after a cyber incident on their Funky Pigeon website led to a week-long order suspension.

In 2022, the Guardian requested many staff members to work from home following a ransomware attack that compromised the personal data of UK employees.

According to a government report, in 2022, two out of five UK businesses reported experiencing cybersecurity breaches or attacks within the prior year.

Source: www.theguardian.com

Elon Musk alleges that X halt was caused by a “massive cyberattack”

Elon Musk stated on Monday that X was hit by a “massive cyberattack,” causing intermittent service disruptions that affected social media networks throughout the day. The platform, formerly known as Twitter, was unresponsive for many users as posts failed to load.

“We face attacks every day, but this one was well-resourced,” said the platform’s CEO. He posted, “Large, coordinated groups and/or countries are involved.”

Down detector, a website monitoring for outages, showed a spike in thousands of outage reports around 5:45 am on various platforms. Another surge in reported outages occurred around noon, with most issues happening on the company’s mobile app. Tweets that failed to display showed a “something went wrong” message prompting users to try reloading.

The world’s richest man did not provide evidence for his claim. His statements were in response to cryptocurrency influencers suggesting a pause following other resistance to Musk’s ventures. Protests against the “Ministry of Government Efficiency” initiative resulted in vandalism against Musk’s leadership and Tesla dealers in the previous week.

Skip past newsletter promotions

The CEO of SpaceX, who acquired Twitter for $44 billion in 2022, alleged that the previous platform outage was due to a cyberattack. Musk previously claimed a “massive DDOS attack” caused the crash of his live-streamed interview with Donald Trump last year, although company sources later told The Verge there was no attack.

The X outage adds to the challenges facing Musk’s businesses and initiatives. A SpaceX rocket exploded in flight near the Bahamas on Friday, scattering debris. “Tesla Takedown” protests across the nation targeted Tesla dealers, with owners selling vehicles, and the company’s stock prices hitting a low on Monday. Trump also had a heated meeting with Musk and his Cabinet Secretary, hinting at curbing Musk’s influence against government officials who fired many from various agencies.

Source: www.theguardian.com

Britain’s security chief warns of underestimated cyberattack threats from hostile states and gangs

Britain is being warned by its cybersecurity chief about the seriousness of online threats from hostile states and criminal organizations. Richard Horne, director of the GCHQ National Cyber Security Center, highlighted a threefold increase in “serious” incidents due to Russia’s “aggression and recklessness” and China’s “highly sophisticated” digital operations.

In his recent speech, Mr. Horne emphasized the growing hostile activity in UK cyberspace, driven by adversaries aiming to cause disruption and destruction. He mentioned Russia’s aggressiveness and recklessness and China’s continued sophistication as cyber attackers.

Despite the increasing risks, Horne expressed concern that the severity of the threats facing the UK has been underestimated. This serves as a wake-up call for businesses and public sector organizations.

The NCSC reported a significant increase in serious cyber incidents over the past year, with 430 incidents requiring assistance compared to 371 in the previous year. Horne stressed the need to enhance protection and resilience against cyber threats across critical infrastructure, supply chains, and the economy.

The NCSC’s investigation does not differentiate between nation-state attacks and criminal incidents, but ransomware attacks remain a significant concern in the UK. Recent incidents targeting high-profile organizations like the British Library and Synnovis highlight the reliance on technology and the potential human cost of cyberattacks.

With various cyber threats emanating from Russia, China, Iran, and North Korea, the NCSC is urging organizations to ramp up their cybersecurity measures and stay vigilant. The warning signals the need for a collective effort to safeguard against cyber dangers.

Alan Woodward, a cybersecurity expert, reiterated the importance of staying alert to cyber threats. The government’s warning serves as a reminder for both public and private sectors to prioritize cybersecurity measures.

Source: www.theguardian.com

Car dealerships in US and Canada face third consecutive day of shutdown due to cyberattack

A cyber outage at a major retail software provider for auto dealerships entered its third day on Friday, causing delays in car sales across North America, the affected company said, with software provider CDK saying there is no end in sight.

“The CDK outage is affecting auto dealers across the United States and Canada, including some BMW Group dealers,” a BMW North America spokesman told Reuters.

CDK, which provides a range of software to auto dealerships, said it experienced another cyber incident on Wednesday that caused it to proactively shut down most of its systems, but that it is working to restore services and get dealers’ business back to normal soon. CDK sent a letter The company responded to customers by saying that it was unclear how long it would take to resolve the issue.

The company did not disclose in its statement how many dealerships would be affected. But according to its website, CDK works with more than 15,000 retailers in North America. Representatives from major automakers including Ford, Volkswagen and Mercedes-Benz said: Confirmed by Bloomberg They were working with dealers affected by the outage.

“Dealers are extremely committed to protecting customer information and are proactively receiving information from CDK to help determine the nature and scope of the cyber incident and respond appropriately,” the National Automobile Dealers Association said. Independently owned car dealer Holman also said the outage affected its phone system.

Investment firm Brookfield Business Partners acquired CDK in April 2022 for $6.41 billion in cash, taking private the last major publicly traded company that provides software to auto dealerships and manufacturers.

Source: www.theguardian.com

Report Warns UK Vulnerable to Cyberattack that Could Shut Down Country at Any Time

The UK is unprepared for a major ransomware attack and could face an outage “at any time”, according to a new report.

Parliament’s Joint Committee on National Security Strategy (JCNSS) has been accused in a report of shifting responsibility for tackling ransomware attacks away from the Home Office, which is politically prioritizing other issues. He said it should be given to the Cabinet Office and directly supervised by the deputy prime minister. Minister.

The report claimed that former Home Secretary Suela Braverman “showed no interest” in the issue and instead focused on illegal immigration and small vessels.

Russian ‘Star Blizzard’ spy accused of years-long cyber attack on UK

Ransomware is a cyber attack in which a hacker infiltrates your system, locks access to your data and files, and demands payment to release the files or prevent the leak.

It has been used in many high-profile cyberattacks, including: Want to cry Attacks on the NHS in 2017.

In a report, JCNSS said the UK’s regulatory framework is inadequate and outdated, warning that much of the country’s critical infrastructure relies on legacy IT systems and remains vulnerable to ransomware. ing.

The report notes that even though government agencies such as the National Cyber ​​Security Center (NCSC) have warned of ransomware attacks from groups linked to Moscow, Beijing and Pyongyang, among others, there are They say they are not investing enough in safety measures.

read more:
Election Commission targeted by cyber attack
University of Manchester says data ‘may have been copied’
Increase in “hackers for hire”

As part of its report, the commission has requested a private briefing from the NCSC on its preparations to protect the UK from cyber-attacks ahead of the next general election, citing concerns about potential interference with the democratic process. did.

Dame Margaret Beckett, Chair of JCNSS, said: ‘The UK has the dubious distinction of being one of the most cyber-attacked countries in the world.

image:
Dame Margaret Beckett

“It is clear to the committee that government investment and response to this threat is not the best in the world, leaving us exposed to devastating costs and destabilizing political interference.

“When a large-scale, devastating ransomware attack is likely to occur, failure to meet this challenge rightly qualifies as an inexcusable strategic failure.

“If the UK is to avoid having its wealth held hostage, ransomware will become a more pressing political priority and more resources will be committed to tackling this pernicious threat to UK national security.” That is extremely important.”

A Home Office spokesperson said: “We welcome the JCNSS report and will publish a full response in due course.”

“The UK is well prepared to respond to cyber threats, including investing £2.6 billion under our Cyber ​​Security Strategy and rolling out the first ever government-backed minimum standards for cyber security through the NCSC’s Cyber ​​Essentials. The scheme is taking strong steps to strengthen its cyber defences.

“We also sanctioned 18 criminals who spread large quantities of ransomware this year, removed malware that infected 700,000 computers, and condemned the unprecedented ransom payments signed by 46 countries. He became a leader in international statements.”

A government spokesperson said: “We welcome the JCNSS report and will publish a full response in due course.”

“The UK is well prepared to respond to cyber threats, including investing £2.6 billion under our Cyber ​​Security Strategy and rolling out the first ever government-backed minimum standards for cyber security through the NCSC’s Cyber ​​Essentials. The scheme is taking strong steps to strengthen its cyber defences.

“We also sanctioned 18 criminals who spread large amounts of ransomware this year, removed malware that infected 700,000 computers, and condemned the unprecedented ransom payments signed by 46 countries. He became a leader in international statements.”

Source: news.sky.com