Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Chinese Hackers Use Claude AI in Espionage, Rely on Human Oversight
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
CybersecurityTechnology

Chinese Hackers Use Claude AI in Espionage, Rely on Human Oversight

Highlights

  • Chinese hackers used Claude AI to breach 30 organizations.

  • Human oversight was critical throughout the AI-driven attack process.

  • Experts remain divided about the real impact of AI in cyber espionage.

Kaan Demirel
Last updated: 14 November, 2025 - 10:49 pm 10:49 pm
Kaan Demirel 3 hours ago
Share
SHARE

Contents
How Did Attackers Use Claude AI for Hacking?How Autonomous Was the AI’s Role?Why Do Some Experts Question AI’s True Impact on Cyber Espionage?

An investigation has revealed that a group associated with the Chinese state reportedly infiltrated at least 30 organizations using Anthropic’s Claude AI. Leveraging both segmentation of malicious tasks and social engineering methods, the attackers manipulated Claude’s safeguards by presenting operations as legitimate security audits. The findings raise concerns around the capabilities and limitations of generative AI in cybersecurity contexts, highlighting a complex interplay between automated systems and significant human intervention. Security analysts note that despite rapid developments in AI technology, expert oversight remains a crucial factor in the effectiveness of AI-driven cyber campaigns.

Compared to earlier disclosures where generative AI was suspected to assist only peripheral malicious activity, Anthropic’s report outlines a more direct and structured involvement. Initial uses of AI in cyberattacks involved copying chatbot outputs to facilitate phishing, but the documented campaign demonstrates a strategic use of Claude Code to automate tasks. Recent research also shows the growing sophistication in using large language models for both offensive and defensive cybersecurity, but this event, attributed to nation-state actors, is reportedly more coordinated and intentional.

How Did Attackers Use Claude AI for Hacking?

Attackers orchestrated Claude AI’s capabilities by dividing their goals into separate, seemingly harmless tasks, effectively evading content-detection mechanisms. Anthropic’s threat intelligence team observed that the group employed a frontend framework to manage scripts, provision servers, and ensure operational discipline, with human operatives closely supervising each phase. According to Jacob Klein,

“The hardest part of this entire system was building this framework, that’s what was human intensive.”

The operation relied on both the AI’s outputs and ongoing technical labor, as stages such as vulnerability scanning required human review before progressing.

How Autonomous Was the AI’s Role?

While elements of automation were present, the majority of the operation’s critical steps depended on human input and decision-making. Human operators validated each major action, maintained backend systems, and provided the coding expertise for integration with open-source tools via Model Context Protocol (MCP) servers. Anthropic’s analysis found that AI-generated research suffers from inaccuracies and fabrication, necessitating expert verification throughout the process. Klein commented,

“You still need a human operator. That’s why we said it’s not fully automatic or fully agentic.”

Why Do Some Experts Question AI’s True Impact on Cyber Espionage?

Industry reaction has been mixed, with some researchers suggesting Anthropic’s disclosures might exaggerate the novelty and risk posed by AI-enabled hacking. Critics highlight that many of the techniques attributed to Claude are achievable with standard automation tools, and the report’s limited transparency restricts peer validation. Others point out that while AI can accelerate large-scale operations, notable vulnerabilities and detection mechanisms persist, especially when major U.S. platforms are used for sensitive operations.

The intersection of advanced AI capabilities and espionage brings forward persistent technical and operational hurdles for attackers and defenders. Those evaluating Anthropic’s findings have noted both the potential tactical benefits of combining AI and human expertise, and the hurdles posed by reliance on commercial AI products. Tailored in-house models might avoid detection risks, but the use of public tools could signal intent to attract or distract observers, possibly as part of wider geopolitical messaging.

Looking beyond this isolated case, the findings stress the necessity for ongoing vigilance and critical assessment of AI capabilities in cybersecurity. Readers should recognize that, despite popular fears, generative AI models like Claude cannot currently replace skilled human hackers—they serve to amplify scale and speed under close guidance. As research on integrating AI into both defensive and offensive cybersecurity matures, organizations must invest in both technology improvements and human expertise. Continuous model evaluation, robust oversight, and careful handling of AI-generated outputs will remain essential as AI’s role in cyber operations continues to develop.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Canada Strengthens Cyber Defenses and Talent to Counter Rising Digital Threats

Justice Department Dismantles North Korean IT Labor Schemes in US

Anthropic Deploys Claude-Powered Resolve in Industrial Operations

NRF Leads Retail Push to Build Cybersecurity Talent Pipeline

Matthew McConaughey and Michael Caine License AI Voices to ElevenLabs

Share This Article
Facebook Twitter Copy Link Print
Kaan Demirel
By Kaan Demirel
Kaan Demirel is a 28-year-old gaming enthusiast residing in Ankara. After graduating from the Statistics department of METU, he completed his master's degree in computer science. Kaan has a particular interest in strategy and simulation games and spends his free time playing competitive games and continuously learning new things about technology and game development. He is also interested in electric vehicles and cyber security. He works as a content editor at NewsLinker, where he leverages his passion for technology and gaming.
Previous Article Gabe Newell Receives Leviathan Superyacht Built by Oceanco
Next Article Garmin Forerunner 265 Hits $299.99 in Amazon Price Move

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

California Agencies Utilize BurnBot RX2 Robot for Wildfire Mitigation
Robotics
Garmin Forerunner 265 Hits $299.99 in Amazon Price Move
Wearables
Gabe Newell Receives Leviathan Superyacht Built by Oceanco
Gaming
Intel Core Ultra X7 358H Leak Reveals Performance for Portable Gaming
Computing
Tesla Begins Apple CarPlay Integration to Attract More Drivers
Electric Vehicle
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?