{"id":194481,"date":"2025-09-02T15:53:09","date_gmt":"2025-09-02T15:53:09","guid":{"rendered":"https:\/\/www.europesays.com\/us\/194481\/"},"modified":"2025-09-02T15:53:09","modified_gmt":"2025-09-02T15:53:09","slug":"when-ai-becomes-a-cybercriminals-best-friend","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/us\/194481\/","title":{"rendered":"When AI Becomes A Cybercriminal\u2019s Best Friend"},"content":{"rendered":"<p>The Wiretap is your weekly digest of cybersecurity, internet privacy and surveillance news. To get it in your inbox, <a href=\"https:\/\/www.forbes.com\/newsletter\/thewiretap\/#194e252376cf\" target=\"_self\" class=\"color-link\" title=\"https:\/\/www.forbes.com\/newsletter\/thewiretap\/#194e252376cf\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/newsletter\/thewiretap\/#194e252376cf\" aria-label=\"subscribe here\" rel=\"noopener\">subscribe here<\/a>.<\/p>\n<p>Last week, AI giant <strong>Anthropic<\/strong> <a href=\"https:\/\/www.anthropic.com\/news\/detecting-countering-misuse-aug-2025\" rel=\"nofollow noopener noreferrer\" target=\"_blank\" class=\"color-link\" title=\"https:\/\/www.anthropic.com\/news\/detecting-countering-misuse-aug-2025\" data-ga-track=\"ExternalLink:https:\/\/www.anthropic.com\/news\/detecting-countering-misuse-aug-2025\" aria-label=\"said\">said<\/a> it had uncovered three particularly <strong>alarming uses of its Claude tool<\/strong>: a large-scale extortion operation, a fraudulent employment scheme from North Korea and AI-generated ransomware.<\/p>\n<p>Its assessment was stark: \u201c<strong>Agentic AI has been weaponized<\/strong>. AI models are now being used to perform sophisticated cyberattacks, not just advise on how to carry them out.\u201d<\/p>\n<p>Cybersecurity experts have long feared AI agents would drastically increase the scale of digital crime. It\u2019s now being borne out in reality.<\/p>\n<p>In an \u201cunprecedented\u201d extortion case, Anthropic said the hacker used Claude Code to automate reconnaissance on 17 different organizations by gathering employees\u2019 usernames and passwords to find a way onto target networks. Claude did plenty of malicious work on its own: it decided what data to steal and how much ransom to demand to make based on victims\u2019 financial information. It even came up with the language used to threaten to release the pilfered data if the company didn\u2019t pay up.<\/p>\n<p>Anthropic also found that North Koreans had used Claude to create convincing fake people who could pass coding tests in job interviews at major American technology companies. Once they secured jobs, Claude would then carry out technical tasks.<\/p>\n<p>Finally, the company also learned its AI was used by someone with minimal technical skills to code up ransomware packages, which were then sold online to other cybercriminals for up to $1,200.<\/p>\n<p>Benevolent hackers have caught onto AI\u2019s power too. Various offensive and defensive-focused companies are looking to AI agents to find ways into company networks on behalf of defense and intelligence agencies to gather data on foreign governments, or to help their customers\u2019 IT teams figure out where their weaknesses lie.<\/p>\n<p>One of the more prominent companies in this new era of AI-powered hacks is XBOW, whose AI tries to find vulnerabilities in commonly-used software. Its software rose to the top of HackerOne\u2019s leaderboard for identifying such bugs earlier this year. In August, it <a href=\"https:\/\/xbow.com\/blog\/gpt-5\" rel=\"nofollow noopener noreferrer\" target=\"_blank\" class=\"color-link\" title=\"https:\/\/xbow.com\/blog\/gpt-5\" data-ga-track=\"ExternalLink:https:\/\/xbow.com\/blog\/gpt-5\" aria-label=\"said\">said<\/a> OpenAI\u2019s GPT-5 model, when integrated into XBOW\u2019s agent, led to a \u201csignificant leap in performance\u201d and helped find \u201cvastly more exploits.\u201d If XBOW and competitors can get such powerful tools into the hands of defenders before criminals, it may help prevent new, AI-powered attacks from happening.<\/p>\n<p>With both cyber defenders and criminals making use of these new AI tools, it\u2019s clear we\u2019ve entered a new cybersecurity arms race pitting AI vs. AI. Only time will tell which side will emerge victorious.<\/p>\n<p><strong>Got a tip on surveillance or cybercrime? Get me on Signal<\/strong> at <a href=\"https:\/\/tel:+19295127964\" rel=\"nofollow noopener noreferrer\" target=\"_blank\" class=\"color-link invalid-url\" title=\"https:\/\/tel:+19295127964\" data-ga-track=\"ExternalLink:https:\/\/tel:+19295127964\" aria-label=\"+1 929-512-7964\">+1 929-512-7964<\/a>.<\/p>\n<p>THE BIG STORY:<br \/>\nChinese Hackers May Have Stolen Data On \u2018Nearly Every American\u2019<\/p>\n<p>A hacking group known as <strong>Salt Typhoon<\/strong>, believed to be sponsored by the Chinese government, has <strong>hacked into as many as 200 American organizations<\/strong>, including major telecoms companies like AT&amp;T and Verizon, according to the FBI.<\/p>\n<p>Last week, intelligence agencies from the western world identified three organizations that allegedly assisted in the attacks: Sichuan Juxinhe Network Technology, Beijing Huanyu Tianqiong Information Technology and Sichuan Zhixin Ruijie Network Technology.<\/p>\n<p>\u201cWe are deeply concerned by the irresponsible behaviour of the named commercial entities based in China that has enabled an unrestrained campaign of malicious cyber activities on a global scale,\u201d <a href=\"https:\/\/www.ncsc.gov.uk\/news\/uk-allies-expose-china-tech-companies-enabling-cyber-campaign\" rel=\"nofollow noopener noreferrer\" target=\"_blank\" class=\"color-link\" title=\"https:\/\/www.ncsc.gov.uk\/news\/uk-allies-expose-china-tech-companies-enabling-cyber-campaign\" data-ga-track=\"ExternalLink:https:\/\/www.ncsc.gov.uk\/news\/uk-allies-expose-china-tech-companies-enabling-cyber-campaign\" aria-label=\"said\">said<\/a> Dr Richard Horne, chief executive of the U.K.\u2019s National Cyber Security Centre, a branch of the GCHQ signals intelligence agency.<\/p>\n<p>Stories You Have To Read Today<\/p>\n<p>WhatsApp users have been encouraged to update the messaging app after a warning that a <a href=\"https:\/\/www.whatsapp.com\/security\/advisories\/2025\" rel=\"nofollow noopener noreferrer\" target=\"_blank\" class=\"color-link\" title=\"https:\/\/www.whatsapp.com\/security\/advisories\/2025\" data-ga-track=\"ExternalLink:https:\/\/www.whatsapp.com\/security\/advisories\/2025\" aria-label=\"vulnerability\">vulnerability<\/a> \u201cmay have been <strong>exploited in a sophisticated attack against specific targeted users<\/strong>.\u201d It specifically targeted users of the iOS and Mac versions of the app, and experts have suggested the attacks could\u2019ve been launched by a spyware vendor.<\/p>\n<p>One such surveillance company, <strong>Paragon Solutions<\/strong>, just had its <strong>$2 million contract with Immigration Customs Enforcement reactivated<\/strong>, according to independent reporter <a href=\"https:\/\/jackpoulson.substack.com\/p\/exclusive-ice-has-reactivated-its?utm_source=post-email-title&amp;publication_id=1269175&amp;post_id=172515924&amp;utm_campaign=email-post-title&amp;isFreemail=true&amp;r=1eyo6&amp;triedRedirect=true&amp;utm_medium=email\" rel=\"nofollow noopener noreferrer\" target=\"_blank\" class=\"color-link\" title=\"https:\/\/jackpoulson.substack.com\/p\/exclusive-ice-has-reactivated-its?utm_source=post-email-title&amp;publication_id=1269175&amp;post_id=172515924&amp;utm_campaign=email-post-title&amp;isFreemail=true&amp;r=1eyo6&amp;triedRedirect=true&amp;utm_medium=email\" data-ga-track=\"ExternalLink:https:\/\/jackpoulson.substack.com\/p\/exclusive-ice-has-reactivated-its?utm_source=post-email-title&amp;publication_id=1269175&amp;post_id=172515924&amp;utm_campaign=email-post-title&amp;isFreemail=true&amp;r=1eyo6&amp;triedRedirect=true&amp;utm_medium=email\" aria-label=\"Jack Poulson\">Jack Poulson<\/a>. ICE had been ordered to put the work with Paragon on hold after the Biden administration sought to explore whether it\u2019d breached rules on acquiring spyware.<\/p>\n<p>Winner of the Week<\/p>\n<p><strong>Cloudflare<\/strong> claims to have <a href=\"https:\/\/www.linkedin.com\/posts\/omeryoachimik_largest-ddos-attacks-every-mitigated-by-cloudflare-ugcPost-7368360568476385280-SLVx\/?utm_source=share&amp;utm_medium=member_ios&amp;rcm=ACoAAAuVLEMBHawQsxeDlvzOcsqZeBcN18FrFs4\" rel=\"nofollow noopener noreferrer\" target=\"_blank\" class=\"color-link\" title=\"https:\/\/www.linkedin.com\/posts\/omeryoachimik_largest-ddos-attacks-every-mitigated-by-cloudflare-ugcPost-7368360568476385280-SLVx\/?utm_source=share&amp;utm_medium=member_ios&amp;rcm=ACoAAAuVLEMBHawQsxeDlvzOcsqZeBcN18FrFs4\" data-ga-track=\"ExternalLink:https:\/\/www.linkedin.com\/posts\/omeryoachimik_largest-ddos-attacks-every-mitigated-by-cloudflare-ugcPost-7368360568476385280-SLVx\/?utm_source=share&amp;utm_medium=member_ios&amp;rcm=ACoAAAuVLEMBHawQsxeDlvzOcsqZeBcN18FrFs4\" aria-label=\"stopped\">stopped<\/a> a <strong>record distributed denial of service attack<\/strong> in recent weeks. It measured in at 11.5 terabits per second (Tbps), beating the <a href=\"https:\/\/blog.cloudflare.com\/defending-the-internet-how-cloudflare-blocked-a-monumental-7-3-tbps-ddos\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\" class=\"color-link\" title=\"https:\/\/blog.cloudflare.com\/defending-the-internet-how-cloudflare-blocked-a-monumental-7-3-tbps-ddos\/\" data-ga-track=\"ExternalLink:https:\/\/blog.cloudflare.com\/defending-the-internet-how-cloudflare-blocked-a-monumental-7-3-tbps-ddos\/\" aria-label=\"previous record\">previous record<\/a> of 7.3 Tbps.<\/p>\n<p>Loser of the Week<\/p>\n<p>Cybersecurity giant <strong>Palo Alto Networks has suffered a data breach<\/strong>. It was one of hundreds of victims whose Salesforce information has been taken thanks to another hack at sales automation platform Salesloft. That breach allowed hackers to steal authentication tokens for a Drift chat agent that was integrated with Salesforce, allowing access to many customers\u2019 data, Bleeping Computer <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/palo-alto-networks-data-breach-exposes-customer-info-support-tickets\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\" class=\"color-link\" title=\"https:\/\/www.bleepingcomputer.com\/news\/security\/palo-alto-networks-data-breach-exposes-customer-info-support-tickets\/\" data-ga-track=\"ExternalLink:https:\/\/www.bleepingcomputer.com\/news\/security\/palo-alto-networks-data-breach-exposes-customer-info-support-tickets\/\" aria-label=\"reports\">reports<\/a>.<\/p>\n<p><strong>More On Forbes<\/strong><a class=\"embed-base color-body color-body-border link-embed embed-1044\" href=\"https:\/\/www.forbes.com\/sites\/iainmartin\/2025\/09\/02\/how-an-ai-notetaker-became-one-of-the-few-profitable-ai-startups\/\" target=\"_blank\" aria-label=\"How An AI Notetaker Became One Of The Few Profitable AI Startups\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/iainmartin\/2025\/09\/02\/how-an-ai-notetaker-became-one-of-the-few-profitable-ai-startups\/\" rel=\"noopener\">ForbesHow An AI Notetaker Became One Of The Few Profitable AI StartupsBy Iain Martin<\/a><a class=\"embed-base color-body color-body-border link-embed embed-1047\" href=\"https:\/\/www.forbes.com\/sites\/jeremybogaisky\/2025\/08\/29\/moon-mining-heiium-interlune\/\" target=\"_blank\" aria-label=\"This Startup Is Racing To Be The First To Mine Helium On The Moon\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/jeremybogaisky\/2025\/08\/29\/moon-mining-heiium-interlune\/\" rel=\"noopener\">ForbesThis Startup Is Racing To Be The First To Mine Helium On The MoonBy Jeremy Bogaisky<\/a><a class=\"embed-base color-body color-body-border link-embed embed-1050\" href=\"https:\/\/www.forbes.com\/sites\/giacomotognini\/2025\/09\/01\/chicagos-hot-dog-king-dick-portillo-on-selling-out-and-moving-on\/\" target=\"_blank\" aria-label=\"Chicago\u2019s Hot Dog King Dick Portillo On Selling Out And Moving On\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/giacomotognini\/2025\/09\/01\/chicagos-hot-dog-king-dick-portillo-on-selling-out-and-moving-on\/\" rel=\"noopener\">ForbesChicago\u2019s Hot Dog King Dick Portillo On Selling Out And Moving OnBy Giacomo Tognini<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"The Wiretap is your weekly digest of cybersecurity, internet privacy and surveillance news. To get it in your&hellip;\n","protected":false},"author":3,"featured_media":194482,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[691,24142,738,74,12993,13337,59543,409,108412,108411,158,67,132,68,108413],"class_list":{"0":"post-194481","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-artificial-intelligence","8":"tag-ai","9":"tag-anthropic","10":"tag-artificial-intelligence","11":"tag-china","12":"tag-cloudflare","13":"tag-cybercrime","14":"tag-hackers","15":"tag-immigration","16":"tag-paragon","17":"tag-salt-typhoon","18":"tag-technology","19":"tag-united-states","20":"tag-unitedstates","21":"tag-us","22":"tag-xbow"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@us\/115135512971015679","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts\/194481","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/comments?post=194481"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts\/194481\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/media\/194482"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/media?parent=194481"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/categories?post=194481"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/tags?post=194481"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}