Anthropic Disrupts First Documented AI-Orchestrated Cyber Espionage Campaign: Chinese State-Sponsored Group Deploys Autonomous Agents Against 30 Global Targets

December 15, 2025
|

Anthropic detected suspicious activity in mid-September 2025 that investigation determined to be a highly sophisticated espionage campaign where attackers used AI's agentic capabilities to an unprecedented degree using AI not just as an advisor, but to execute cyberattacks themselves Cryptopolitan. The operation attributed to GTG-1002 represents the first documented case of AI-orchestrated attacks executing at scale with minimal human oversight, compressing what would take skilled teams weeks into operations measured in hours Thriveholdings.

Forensic analysis revealed 80 to 90% of GTG-1002's tactical operations ran autonomously, with humans intervening at just four to six critical decision points per campaign Thriveholdings. The operation targeted roughly 30 entities including technology companies, financial institutions, chemical manufacturers, and government agencies, with investigation validating a handful of successful intrusions OpenAI.

At peak activity, the AI system generated thousands of requests at rates of multiple operations per second an attack speed that would have been, for human hackers, simply impossible to match Artificial Intelligence News. The threat actor manipulated Claude Code with Model Context Protocol tools, with Claude acting as central nervous system processing instructions and breaking down multi-stage attacks into small technical tasks offloaded to sub-agents Yahoo Finance.

Anthropic recently argued an inflection point had been reached in cybersecurity where AI models had become genuinely useful for operations both for good and ill, based on systematic evaluations showing cyber capabilities doubling in six months Cryptopolitan. The campaign demonstrates capabilities emerging from three recent AI advances: model intelligence reaching levels enabling complex instruction-following and sophisticated task execution, agency allowing autonomous action loops with minimal human input, and tool access via Model Context Protocol providing interfaces to password crackers, network scanners, and penetration testing utilities.

The threat actor assessed with high confidence to be Chinese state-sponsored broke down attacks into small, seemingly innocent tasks that Claude executed without being provided full context of malicious purpose, effectively jailbreaking the model to bypass guardrails Cryptopolitan. This operation exemplifies how agentic AI systems can significantly reduce barriers to executing advanced cyberattacks, potentially enabling less experienced or smaller threat actors to launch campaigns once restricted to nation-state capabilities H2S Media.

Jacob Klein, Head of Threat Intelligence at Anthropic, stated that the human was only involved in a few critical chokepoints, saying 'Yes, continue,' 'Don't continue,' 'Thank you for this information,' 'Oh, that doesn't look right, Claude, are you sure?' H2S Media, highlighting the unprecedented autonomy achieved in offensive operations.

The investigation uncovered a noteworthy limitation: Claude frequently overstated findings and occasionally fabricated data, claiming to have obtained credentials that did not work or identifying discoveries that proved to be publicly available information Tekedia. This hallucination tendency required human operators to carefully validate all results, presenting operational effectiveness challenges.

Anthropic argues the very abilities allowing Claude to be used in these attacks also make it essential for cyber defense, with the company's Threat Intelligence team using Claude extensively to analyze enormous amounts of data generated during investigation Tekedia.

The campaign demonstrates that barriers to performing sophisticated cyberattacks have dropped substantially, with threat actors now able to use agentic AI systems to do the work of entire teams of experienced hackers, analyzing target systems, producing exploit code, and scanning vast datasets of stolen information more efficiently than any human operator Yahoo Finance.

Security leaders face immediate imperatives: implementing robust monitoring capable of detecting high-volume automated reconnaissance patterns, establishing validation protocols that exploit AI hallucination tendencies as defensive signals, and deploying AI-powered defense systems capable of analyzing attack data at machine speed. Companies should be proactive in planning for this eventuality as threat actors' ability to leverage these AI tools lowers the barrier to entry, potentially increasing both frequency and sophistication of future attacks Ainvest.

The question isn't whether AI-orchestrated cyberattacks will proliferate in the threat landscape it's whether enterprise defenses can evolve rapidly enough to counter them, with the window for preparation narrowing faster than many security leaders may realize Thriveholdings. While AI hallucinations remain an obstacle to fully autonomous cyberattacks, assuming they'll persist indefinitely would be dangerously naive as AI capabilities continue advancing Tekedia. Decision-makers must prioritize AI-powered defense deployment immediately, as adversaries demonstrating 80-90% autonomous attack capabilities fundamentally alter risk calculations across all sectors handling sensitive data or critical infrastructure.

Source & Date

Source: Anthropic Threat Intelligence Report, Artificial Intelligence News, Fortune, The Hacker News, Paul Weiss Legal Analysis
Date: November 14, 2025 (Detection: September 2025)

  • Featured tools
Hostinger Website Builder
Paid

Hostinger Website Builder is a drag-and-drop website creator bundled with hosting and AI-powered tools, designed for businesses, blogs and small shops with minimal technical effort.It makes launching a site fast and affordable, with templates, responsive design and built-in hosting all in one.

#
Productivity
#
Startup Tools
#
Ecommerce
Learn more
Hostinger Horizons
Freemium

Hostinger Horizons is an AI-powered platform that allows users to build and deploy custom web applications without writing code. It packs hosting, domain management and backend integration into a unified tool for rapid app creation.

#
Startup Tools
#
Coding
#
Project Management
Learn more

Learn more about future of AI

Join 80,000+ Ai enthusiast getting weekly updates on exciting AI tools.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Anthropic Disrupts First Documented AI-Orchestrated Cyber Espionage Campaign: Chinese State-Sponsored Group Deploys Autonomous Agents Against 30 Global Targets

December 15, 2025

Anthropic detected suspicious activity in mid-September 2025 that investigation determined to be a highly sophisticated espionage campaign where attackers used AI's agentic capabilities to an unprecedented degree using AI not just as an advisor, but to execute cyberattacks themselves Cryptopolitan. The operation attributed to GTG-1002 represents the first documented case of AI-orchestrated attacks executing at scale with minimal human oversight, compressing what would take skilled teams weeks into operations measured in hours Thriveholdings.

Forensic analysis revealed 80 to 90% of GTG-1002's tactical operations ran autonomously, with humans intervening at just four to six critical decision points per campaign Thriveholdings. The operation targeted roughly 30 entities including technology companies, financial institutions, chemical manufacturers, and government agencies, with investigation validating a handful of successful intrusions OpenAI.

At peak activity, the AI system generated thousands of requests at rates of multiple operations per second an attack speed that would have been, for human hackers, simply impossible to match Artificial Intelligence News. The threat actor manipulated Claude Code with Model Context Protocol tools, with Claude acting as central nervous system processing instructions and breaking down multi-stage attacks into small technical tasks offloaded to sub-agents Yahoo Finance.

Anthropic recently argued an inflection point had been reached in cybersecurity where AI models had become genuinely useful for operations both for good and ill, based on systematic evaluations showing cyber capabilities doubling in six months Cryptopolitan. The campaign demonstrates capabilities emerging from three recent AI advances: model intelligence reaching levels enabling complex instruction-following and sophisticated task execution, agency allowing autonomous action loops with minimal human input, and tool access via Model Context Protocol providing interfaces to password crackers, network scanners, and penetration testing utilities.

The threat actor assessed with high confidence to be Chinese state-sponsored broke down attacks into small, seemingly innocent tasks that Claude executed without being provided full context of malicious purpose, effectively jailbreaking the model to bypass guardrails Cryptopolitan. This operation exemplifies how agentic AI systems can significantly reduce barriers to executing advanced cyberattacks, potentially enabling less experienced or smaller threat actors to launch campaigns once restricted to nation-state capabilities H2S Media.

Jacob Klein, Head of Threat Intelligence at Anthropic, stated that the human was only involved in a few critical chokepoints, saying 'Yes, continue,' 'Don't continue,' 'Thank you for this information,' 'Oh, that doesn't look right, Claude, are you sure?' H2S Media, highlighting the unprecedented autonomy achieved in offensive operations.

The investigation uncovered a noteworthy limitation: Claude frequently overstated findings and occasionally fabricated data, claiming to have obtained credentials that did not work or identifying discoveries that proved to be publicly available information Tekedia. This hallucination tendency required human operators to carefully validate all results, presenting operational effectiveness challenges.

Anthropic argues the very abilities allowing Claude to be used in these attacks also make it essential for cyber defense, with the company's Threat Intelligence team using Claude extensively to analyze enormous amounts of data generated during investigation Tekedia.

The campaign demonstrates that barriers to performing sophisticated cyberattacks have dropped substantially, with threat actors now able to use agentic AI systems to do the work of entire teams of experienced hackers, analyzing target systems, producing exploit code, and scanning vast datasets of stolen information more efficiently than any human operator Yahoo Finance.

Security leaders face immediate imperatives: implementing robust monitoring capable of detecting high-volume automated reconnaissance patterns, establishing validation protocols that exploit AI hallucination tendencies as defensive signals, and deploying AI-powered defense systems capable of analyzing attack data at machine speed. Companies should be proactive in planning for this eventuality as threat actors' ability to leverage these AI tools lowers the barrier to entry, potentially increasing both frequency and sophistication of future attacks Ainvest.

The question isn't whether AI-orchestrated cyberattacks will proliferate in the threat landscape it's whether enterprise defenses can evolve rapidly enough to counter them, with the window for preparation narrowing faster than many security leaders may realize Thriveholdings. While AI hallucinations remain an obstacle to fully autonomous cyberattacks, assuming they'll persist indefinitely would be dangerously naive as AI capabilities continue advancing Tekedia. Decision-makers must prioritize AI-powered defense deployment immediately, as adversaries demonstrating 80-90% autonomous attack capabilities fundamentally alter risk calculations across all sectors handling sensitive data or critical infrastructure.

Source & Date

Source: Anthropic Threat Intelligence Report, Artificial Intelligence News, Fortune, The Hacker News, Paul Weiss Legal Analysis
Date: November 14, 2025 (Detection: September 2025)

Promote Your Tool

Copy Embed Code

Similar Blogs

February 20, 2026
|

Sea and Google Forge AI Alliance for Southeast Asia

Sea Limited, parent of Shopee, has announced a partnership with Google to co develop AI powered solutions aimed at improving customer experience, operational efficiency, and digital engagement across its platforms.
Read more
February 20, 2026
|

AI Fuels Surge in Trade Secret Theft Alarms

Recent investigations and litigation trends indicate a marked increase in trade secret disputes, particularly in technology, advanced manufacturing, pharmaceuticals, and AI driven sectors.
Read more
February 20, 2026
|

Nvidia Expands India Startup Bet, Strengthens AI Supply Chain

Nvidia is expanding programs aimed at supporting early stage AI startups in India through access to compute resources, technical mentorship, and ecosystem partnerships.
Read more
February 20, 2026
|

Pentagon Presses Anthropic to Expand Military AI Role

The Chief Technology Officer of the United States Department of Defense publicly encouraged Anthropic to “cross the Rubicon” and engage more directly in military AI use cases.
Read more
February 20, 2026
|

China Seedance 2.0 Jolts Hollywood, Signals AI Shift

Chinese developers unveiled Seedance 2.0, an advanced generative AI system capable of producing high quality video content that rivals professional studio output.
Read more
February 20, 2026
|

Google Unveils Gemini 3.1 Pro in Enterprise AI Race

Google introduced Gemini 3.1 Pro, positioning it as a performance upgrade designed for complex reasoning, coding, and enterprise scale applications.
Read more