Anthropic Disrupts First Documented AI-Orchestrated Cyber Espionage Campaign: Chinese State-Sponsored Group Deploys Autonomous Agents Against 30 Global Targets

December 15, 2025
|

Anthropic detected suspicious activity in mid-September 2025 that investigation determined to be a highly sophisticated espionage campaign where attackers used AI's agentic capabilities to an unprecedented degree using AI not just as an advisor, but to execute cyberattacks themselves Cryptopolitan. The operation attributed to GTG-1002 represents the first documented case of AI-orchestrated attacks executing at scale with minimal human oversight, compressing what would take skilled teams weeks into operations measured in hours Thriveholdings.

Forensic analysis revealed 80 to 90% of GTG-1002's tactical operations ran autonomously, with humans intervening at just four to six critical decision points per campaign Thriveholdings. The operation targeted roughly 30 entities including technology companies, financial institutions, chemical manufacturers, and government agencies, with investigation validating a handful of successful intrusions OpenAI.

At peak activity, the AI system generated thousands of requests at rates of multiple operations per second an attack speed that would have been, for human hackers, simply impossible to match Artificial Intelligence News. The threat actor manipulated Claude Code with Model Context Protocol tools, with Claude acting as central nervous system processing instructions and breaking down multi-stage attacks into small technical tasks offloaded to sub-agents Yahoo Finance.

Anthropic recently argued an inflection point had been reached in cybersecurity where AI models had become genuinely useful for operations both for good and ill, based on systematic evaluations showing cyber capabilities doubling in six months Cryptopolitan. The campaign demonstrates capabilities emerging from three recent AI advances: model intelligence reaching levels enabling complex instruction-following and sophisticated task execution, agency allowing autonomous action loops with minimal human input, and tool access via Model Context Protocol providing interfaces to password crackers, network scanners, and penetration testing utilities.

The threat actor assessed with high confidence to be Chinese state-sponsored broke down attacks into small, seemingly innocent tasks that Claude executed without being provided full context of malicious purpose, effectively jailbreaking the model to bypass guardrails Cryptopolitan. This operation exemplifies how agentic AI systems can significantly reduce barriers to executing advanced cyberattacks, potentially enabling less experienced or smaller threat actors to launch campaigns once restricted to nation-state capabilities H2S Media.

Jacob Klein, Head of Threat Intelligence at Anthropic, stated that the human was only involved in a few critical chokepoints, saying 'Yes, continue,' 'Don't continue,' 'Thank you for this information,' 'Oh, that doesn't look right, Claude, are you sure?' H2S Media, highlighting the unprecedented autonomy achieved in offensive operations.

The investigation uncovered a noteworthy limitation: Claude frequently overstated findings and occasionally fabricated data, claiming to have obtained credentials that did not work or identifying discoveries that proved to be publicly available information Tekedia. This hallucination tendency required human operators to carefully validate all results, presenting operational effectiveness challenges.

Anthropic argues the very abilities allowing Claude to be used in these attacks also make it essential for cyber defense, with the company's Threat Intelligence team using Claude extensively to analyze enormous amounts of data generated during investigation Tekedia.

The campaign demonstrates that barriers to performing sophisticated cyberattacks have dropped substantially, with threat actors now able to use agentic AI systems to do the work of entire teams of experienced hackers, analyzing target systems, producing exploit code, and scanning vast datasets of stolen information more efficiently than any human operator Yahoo Finance.

Security leaders face immediate imperatives: implementing robust monitoring capable of detecting high-volume automated reconnaissance patterns, establishing validation protocols that exploit AI hallucination tendencies as defensive signals, and deploying AI-powered defense systems capable of analyzing attack data at machine speed. Companies should be proactive in planning for this eventuality as threat actors' ability to leverage these AI tools lowers the barrier to entry, potentially increasing both frequency and sophistication of future attacks Ainvest.

The question isn't whether AI-orchestrated cyberattacks will proliferate in the threat landscape it's whether enterprise defenses can evolve rapidly enough to counter them, with the window for preparation narrowing faster than many security leaders may realize Thriveholdings. While AI hallucinations remain an obstacle to fully autonomous cyberattacks, assuming they'll persist indefinitely would be dangerously naive as AI capabilities continue advancing Tekedia. Decision-makers must prioritize AI-powered defense deployment immediately, as adversaries demonstrating 80-90% autonomous attack capabilities fundamentally alter risk calculations across all sectors handling sensitive data or critical infrastructure.

Source & Date

Source: Anthropic Threat Intelligence Report, Artificial Intelligence News, Fortune, The Hacker News, Paul Weiss Legal Analysis
Date: November 14, 2025 (Detection: September 2025)

  • Featured tools
Twistly AI
Paid

Twistly AI is a PowerPoint add-in that allows users to generate full slide decks, improve existing presentations, and convert various content types into polished slides directly within Microsoft PowerPoint.It streamlines presentation creation using AI-powered text analysis, image generation and content conversion.

#
Presentation
Learn more
Copy Ai
Free

Copy AI is one of the most popular AI writing tools designed to help professionals create high-quality content quickly. Whether you are a product manager drafting feature descriptions or a marketer creating ad copy, Copy AI can save hours of work while maintaining creativity and tone.

#
Copywriting
Learn more

Learn more about future of AI

Join 80,000+ Ai enthusiast getting weekly updates on exciting AI tools.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Anthropic Disrupts First Documented AI-Orchestrated Cyber Espionage Campaign: Chinese State-Sponsored Group Deploys Autonomous Agents Against 30 Global Targets

December 15, 2025

Anthropic detected suspicious activity in mid-September 2025 that investigation determined to be a highly sophisticated espionage campaign where attackers used AI's agentic capabilities to an unprecedented degree using AI not just as an advisor, but to execute cyberattacks themselves Cryptopolitan. The operation attributed to GTG-1002 represents the first documented case of AI-orchestrated attacks executing at scale with minimal human oversight, compressing what would take skilled teams weeks into operations measured in hours Thriveholdings.

Forensic analysis revealed 80 to 90% of GTG-1002's tactical operations ran autonomously, with humans intervening at just four to six critical decision points per campaign Thriveholdings. The operation targeted roughly 30 entities including technology companies, financial institutions, chemical manufacturers, and government agencies, with investigation validating a handful of successful intrusions OpenAI.

At peak activity, the AI system generated thousands of requests at rates of multiple operations per second an attack speed that would have been, for human hackers, simply impossible to match Artificial Intelligence News. The threat actor manipulated Claude Code with Model Context Protocol tools, with Claude acting as central nervous system processing instructions and breaking down multi-stage attacks into small technical tasks offloaded to sub-agents Yahoo Finance.

Anthropic recently argued an inflection point had been reached in cybersecurity where AI models had become genuinely useful for operations both for good and ill, based on systematic evaluations showing cyber capabilities doubling in six months Cryptopolitan. The campaign demonstrates capabilities emerging from three recent AI advances: model intelligence reaching levels enabling complex instruction-following and sophisticated task execution, agency allowing autonomous action loops with minimal human input, and tool access via Model Context Protocol providing interfaces to password crackers, network scanners, and penetration testing utilities.

The threat actor assessed with high confidence to be Chinese state-sponsored broke down attacks into small, seemingly innocent tasks that Claude executed without being provided full context of malicious purpose, effectively jailbreaking the model to bypass guardrails Cryptopolitan. This operation exemplifies how agentic AI systems can significantly reduce barriers to executing advanced cyberattacks, potentially enabling less experienced or smaller threat actors to launch campaigns once restricted to nation-state capabilities H2S Media.

Jacob Klein, Head of Threat Intelligence at Anthropic, stated that the human was only involved in a few critical chokepoints, saying 'Yes, continue,' 'Don't continue,' 'Thank you for this information,' 'Oh, that doesn't look right, Claude, are you sure?' H2S Media, highlighting the unprecedented autonomy achieved in offensive operations.

The investigation uncovered a noteworthy limitation: Claude frequently overstated findings and occasionally fabricated data, claiming to have obtained credentials that did not work or identifying discoveries that proved to be publicly available information Tekedia. This hallucination tendency required human operators to carefully validate all results, presenting operational effectiveness challenges.

Anthropic argues the very abilities allowing Claude to be used in these attacks also make it essential for cyber defense, with the company's Threat Intelligence team using Claude extensively to analyze enormous amounts of data generated during investigation Tekedia.

The campaign demonstrates that barriers to performing sophisticated cyberattacks have dropped substantially, with threat actors now able to use agentic AI systems to do the work of entire teams of experienced hackers, analyzing target systems, producing exploit code, and scanning vast datasets of stolen information more efficiently than any human operator Yahoo Finance.

Security leaders face immediate imperatives: implementing robust monitoring capable of detecting high-volume automated reconnaissance patterns, establishing validation protocols that exploit AI hallucination tendencies as defensive signals, and deploying AI-powered defense systems capable of analyzing attack data at machine speed. Companies should be proactive in planning for this eventuality as threat actors' ability to leverage these AI tools lowers the barrier to entry, potentially increasing both frequency and sophistication of future attacks Ainvest.

The question isn't whether AI-orchestrated cyberattacks will proliferate in the threat landscape it's whether enterprise defenses can evolve rapidly enough to counter them, with the window for preparation narrowing faster than many security leaders may realize Thriveholdings. While AI hallucinations remain an obstacle to fully autonomous cyberattacks, assuming they'll persist indefinitely would be dangerously naive as AI capabilities continue advancing Tekedia. Decision-makers must prioritize AI-powered defense deployment immediately, as adversaries demonstrating 80-90% autonomous attack capabilities fundamentally alter risk calculations across all sectors handling sensitive data or critical infrastructure.

Source & Date

Source: Anthropic Threat Intelligence Report, Artificial Intelligence News, Fortune, The Hacker News, Paul Weiss Legal Analysis
Date: November 14, 2025 (Detection: September 2025)

Promote Your Tool

Copy Embed Code

Similar Blogs

March 18, 2026
|

Micron Set for Earnings Surge from AI Demand

Micron is set to report its Q1 2026 earnings next week, with analysts forecasting substantial year-over-year growth due to heightened demand for DRAM and NAND memory in AI applications.
Read more
March 18, 2026
|

Meta Manus Expands AI Agent Desktop Reach

Meta’s Manus desktop app allows users to deploy the AI agent outside cloud-only environments, enhancing speed, personalization, and offline capabilities.
Read more
March 18, 2026
|

AI Advertising Crackdown Bans “Remove Anything” Claims

The ruling by the Advertising Standards Authority determined that the ad’s claims were misleading and could exaggerate the app’s capabilities.
Read more
March 18, 2026
|

Court Ruling Boosts Perplexity AI Competition

A court decision has halted efforts by Amazon to ban or limit AI agents developed by Perplexity AI on its platform. The ruling allows continued deployment and operation of these AI tools, at least temporarily.
Read more
March 18, 2026
|

Compute Divide Intensifies US China AI Rivalry

The growing disparity in computing power driven by access to advanced semiconductors and large-scale data centers is becoming central to AI competitiveness.
Read more
March 18, 2026
|

Samsung Signals AI Driven Chip Boom Into 2026

An executive at Samsung Electronics indicated that demand for AI-related semiconductors is expected to remain robust through 2026, driven by expanding use cases in data.
Read more