{"id":12333,"date":"2026-04-22T13:07:13","date_gmt":"2026-04-22T13:07:13","guid":{"rendered":"https:\/\/www.europesays.com\/ai\/12333\/"},"modified":"2026-04-22T13:07:13","modified_gmt":"2026-04-22T13:07:13","slug":"unauthorized-users-reportedly-gain-access-to-anthropics-mythos-ai-model","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/ai\/12333\/","title":{"rendered":"Unauthorized Users Reportedly Gain Access to Anthropic\u2019s Mythos AI Model"},"content":{"rendered":"<p>A group of unauthorized users reportedly has gained access to Anthropic\u2019s controversial Claude Mythos Preview AI frontier model despite the AI vendor\u2019s efforts to keep it out of public hands by limiting the organizations that can use it.<\/p>\n<p><a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2026-04-21\/anthropic-s-mythos-model-is-being-accessed-by-unauthorized-users\" target=\"_blank\" rel=\"noopener nofollow\">Bloomberg reported<\/a> that the unnamed group had tried multiple ways to gain access to the AI model since it was first announced earlier this month, and finally was able to get through via a third-party vendor. The users, who accessed Mythos on the day it was announced, are part of a Discord online forum group known to search for information about unreleased AI models.<\/p>\n<p>According to the report, the group, using knowledge it had about a format Anthropic had used for other models, \u201cmade an education guess about [Mythos\u2019] online location.\u201d A person inside the group that Bloomberg communicated with told the news outlet that they were \u201cinterested in playing around with new models, not wreaking havoc with them.\u201d<\/p>\n<p>In a <a href=\"https:\/\/techcrunch.com\/2026\/04\/21\/unauthorized-group-has-gained-access-to-anthropics-exclusive-cyber-tool-mythos-report-claims\/\" target=\"_blank\" rel=\"noopener nofollow\">statement<\/a> to TechCrunch, an Anthropic spokesperson said the company was investigating the claim of unauthorized access to Mythos through a third-party vendor, and that the company has not found indications that the group\u2019s activities have effected its systems.<\/p>\n<p>Mythos\u2019 Ongoing Ripple Effect<\/p>\n<p>Anthropic\u2019s <a href=\"https:\/\/securityboulevard.com\/2026\/04\/anthropic-unveils-restricted-ai-cyber-model-in-unprecedented-industry-alliance\/\" target=\"_blank\" rel=\"noopener nofollow\">announcement<\/a> of Mythos April 7 sent shockwaves through the cybersecurity industry. The vendor described a frontier model that is significantly better than any other developed at detecting and identifying software vulnerabilities, noting that in tests, Mythos was able to find a security flaw that had been present yet undetected for 27 years.<\/p>\n<p>However, the model also is <a href=\"https:\/\/www.anthropic.com\/glasswing\" target=\"_blank\" rel=\"noopener nofollow\">very good at creating exploits<\/a> for the vulnerabilities, which convinced Anthropic executives to limit the release of Mythos to a select group of organizations that will use them to create stronger defenses as part of the AI vendor\u2019s new <a href=\"https:\/\/red.anthropic.com\/2026\/mythos-preview\/\" target=\"_blank\" rel=\"noopener nofollow\">Project Glasswing<\/a>.<\/p>\n<p>OpenAI a week later followed a similar path with the <a href=\"https:\/\/securityboulevard.com\/2026\/04\/openai-follows-anthropic-in-limiting-access-to-its-cyber-focused-model\/\" target=\"_blank\" rel=\"noopener nofollow\">unveiling of GPT-5.4-Cyber<\/a>, a frontier model focused on cybersecurity that the vendor also designated for particular users, though granting access to more organizations and individuals than Anthropic.<\/p>\n<p>The introduction of Mythos ignited debates about everything from cybersecurity as such autonomous AI models come into play to what organizations need to do to secure their IT environments to whether Mythos\u2019 capabilities are unique.<\/p>\n<p>Speed is the Difference<\/p>\n<p>However, enterprises and their security teams need to pay attention, according to Brian Fox, co-founder and CTO of Sonatype, which provides a software supply chain management platform.<\/p>\n<p>\u201cIf the early reporting is right, Mythos could be a watershed moment,\u201d Fox said. \u201cWhat is not new is the reality it is forcing people to confront. Beneath the AI framing sits the same software supply chain reality we have been discussing for years: dependencies, build pipelines, third-party software, and infrastructure remain the attack surface.\u201d<\/p>\n<p>Fox added that \u201cwhat changed is speed. AI can now find and operationalize weaknesses across that stack faster than most organizations can inventory, prioritize, and patch them. What we are seeing in response to the Mythos news is many organizations coming to terms with a reality that has existed for a long time: they are not actually in control of their software supply chains.\u201d<\/p>\n<p>Addressing the Threats<\/p>\n<p>Tech vendors are beginning to roll out offerings aimed at helping organizations deal with the cyber risks posed by such frontier models. IBM Consulting last week <a href=\"https:\/\/securityboulevard.com\/2026\/04\/new-ibm-security-services-aim-to-counter-risks-of-frontier-ai-models\/\" target=\"_blank\" rel=\"noopener nofollow\">introduced IBM Autonomous Security<\/a>, a collection of specialized agents created to make enterprises\u2019 often sprawling security stacks work a more unified and coordinated fashion and creating what the vendor called \u201ca systemic defense\u201d that is needed to address the autonomous and fast-moving threats from such models.<\/p>\n<p>At the same time, IBM is offering a new service for assessing a company\u2019s security weaknesses and responding to them.<\/p>\n<p>Likewise, Palo Alto Networks launched <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2026\/04\/introducing-unit-42-frontier-ai-defense\/\" target=\"_blank\" rel=\"noopener nofollow\">Unit 42 Frontier AI Defense<\/a>, an offering that uses AI models to help organizations \u201cidentify and validate the exposures most likely to be chained into real attacks before attackers weaponize them,\u201d with Sam Rubin, senior vice president of consulting and threat intelligence at Unit 42, writing that \u201cfrontier AI is changing what is possible for attackers. In the hands of defenders, it can become a decisive advantage.\u201d<\/p>\n<p>What Publicly Available Models Can Do<\/p>\n<p>Mythos and GPT-5.4-Cyber have garnered much of the attention about the cybersecurity risks such frontier models represent. However, some security vendors wrote that they tested publicly available AI models and found that many of them came close to or matched Mythos\u2019 ability to find and identify zero-day vulnerabilities.<\/p>\n<p>Executives with startup Aisle, which offers an AI-native app security platform, <a href=\"https:\/\/aisle.com\/blog\/ai-cybersecurity-after-mythos-the-jagged-frontier\" target=\"_blank\" rel=\"noopener nofollow\">wrote<\/a> that over the past year, they had built an AI system for discovering, validating, and patching zero-days in open source software.\u00a0In tests, they \u201ctook the specific vulnerabilities Anthropic showcases in their announcement, isolated the relevant code, and ran them through small, cheap, open-weights models. Those models recovered much of the same analysis.\u201d<\/p>\n<p>The models included GPT-OSS-120b, DeepSeek R1, Qwen3, and Gemma 4. The results varied depending on the model and the task, they wrote.<\/p>\n<p>The Real Story<\/p>\n<p>Researchers with Vidoc Security Lab, another AI-based cybersecurity startup, <a href=\"https:\/\/blog.vidocsecurity.com\/blog\/we-reproduced-anthropics-mythos-findings-with-public-models\" target=\"_blank\" rel=\"noopener nofollow\">wrote<\/a> that they came up with similar results with OpenAI\u2019s GPT-5.4 and Anthropic\u2019s Claude Opus 4.6 models running OpenCode, an open source AI coding agent, scanning for security flaws in open software like OpenBSD and FFmpeg.<\/p>\n<p>\u201cIf public models can already do useful work inside that kind of workflow, then the story is not \u2018Anthropic has a magical cyber artifact,\u2019\u201d they wrote. \u201cThe story is that serious AI-assisted vulnerability research is no longer confined to a single frontier lab. That does not make the workflow easy. It means the moat is moving up the stack, from model access to validation, prioritization, and remediation.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"A group of unauthorized users reportedly has gained access to Anthropic\u2019s controversial Claude Mythos Preview AI frontier model&hellip;\n","protected":false},"author":2,"featured_media":12334,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[53,2445,7539,7540],"class_list":{"0":"post-12333","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-anthropic","8":"tag-anthropic","9":"tag-event","10":"tag-icon","11":"tag-link"},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts\/12333","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/comments?post=12333"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts\/12333\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/media\/12334"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/media?parent=12333"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/categories?post=12333"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/tags?post=12333"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}