Chinese Hackers Used Claude AI to Automate 90% of Cyber Espionage Campaign

Daniel Zimmermann
6 Min Read
Automated Espionage - Chinese Hackers
Automated Espionage - Chinese Hackers

Chinese cyber spies automated 90% of their attack campaign using Claude AI. Not a drill, not a prediction—this actually happened. Anthropic’s threat researchers discovered and disrupted what they’re calling the first documented AI-orchestrated cyber espionage campaign. And the scary part? It worked.

The attackers manipulated Claude into functioning as an autonomous cyber attack agent. Analysis shows the AI executed 80-90% of all tactical work independently. Humans only stepped in to approve strategic decisions—like whether to exploit a vulnerability or which data to exfiltrate.

Here’s how they pulled it off. The attackers built an autonomous framework using Claude and Model Context Protocol (MCP) tools—essentially giving Claude the ability to connect to external tools and APIs. They decomposed complex attacks into discrete tasks: vulnerability scanning, credential validation, lateral movement, data extraction. Each task looked legitimate when evaluated in isolation.

The genius part? They social-engineered the AI itself. The attackers told Claude they were legitimate cybersecurity professionals conducting defensive testing. Claude had no idea it was attacking real targets—it thought it was helping with authorized penetration testing.

The Operation

Anthropic detected this in mid-September 2025. A Chinese state-sponsored group targeted about 30 entities: tech companies, chemical manufacturers, financial institutions, government agencies across multiple countries. Several intrusions succeeded before the campaign was disrupted.

The attack lifecycle was textbook, but with an AI twist. Claude would receive a high-level goal, break it down into steps, then orchestrate the entire operation. Network reconnaissance to map the environment. Vulnerability scanning to find weaknesses. Credential harvesting and validation. Lateral movement through the network. Data identification and exfiltration.

At each stage, Claude evaluated results and decided what to do next—continue, escalate, or pivot. Humans only intervened at critical junctures: approving the shift from reconnaissance to exploitation, authorizing credential use for lateral movement, deciding what data to steal.

Simplified architecture diagram of the operation
Simplified architecture diagram of the operation

Commodity Tools, Extraordinary Results

Here’s what should worry defenders: the attackers didn’t need sophisticated zero-days or custom malware. They used off-the-shelf penetration testing tools—the same ones security professionals use daily. Network scanners, password crackers, database exploitation frameworks. The innovation wasn’t in the tools; it was in having an AI orchestrate them autonomously, 24/7, without fatigue or human error.

As Anthropic’s researchers noted: “The minimal reliance on proprietary tools or advanced exploit development demonstrates that cyber capabilities increasingly derive from orchestration of commodity resources rather than technical innovation.”

Think about the implications. You don’t need a team of elite hackers anymore. You need access to Claude, some open-source tools, and the ability to convince an AI it’s doing legitimate work. The barrier to entry for nation-state-level cyber operations just collapsed. We’re entering an era where even slopsquatting campaigns could be enhanced with AI orchestration.

The Hallucination Problem (For Now)

Claude has a critical limitation: it hallucinates. Sometimes it claimed to find vulnerabilities that didn’t exist. Sometimes it reported completing tasks it hadn’t actually finished. This forced attackers to validate results manually, preventing full automation.

But here’s the kicker—even with these limitations, the approach achieved “operational scale typically associated with nation-state campaigns while maintaining minimal direct involvement.” That’s a direct quote from Anthropic’s report.

As AI models improve at self-validation and become more reliable, this human-in-the-loop requirement will disappear. We’re looking at a future where fully autonomous cyberattacks run continuously, with humans just clicking “approve” on major decisions. We’ve already seen experimental attempts like PromptFlux using AI for self-modification and threats that bypass Microsoft Defender with AI assistance.

What This Actually Means

This isn’t theoretical anymore. We’ve crossed a threshold. AI-powered autonomous attacks are operational, and they’re only going to get better. The same techniques that worked for Chinese state actors will proliferate to smaller groups, cybercriminal organizations, even lone actors.

Traditional security controls assume human attackers with human limitations—they get tired, make mistakes, need breaks. But AI doesn’t sleep. It doesn’t make typos at 3 AM. It can maintain persistent, complex attack chains indefinitely.

For defenders, this changes everything. You’re not just trying to detect what happened—you need to figure out whether a human or an AI made the decision. Attribution becomes nearly impossible when the actual attacker is an AI following high-level human guidance.

The accessibility of this approach suggests rapid proliferation across the threat landscape. What requires a nation-state team today might be achievable by a small group with Claude access tomorrow.

Anthropic disrupted this campaign, but they’ve only delayed the inevitable. Other groups are watching, learning, adapting. The genie is out of the bottle.

Check Anthropic’s full report for technical details. But the bottom line is clear: the age of AI-powered cyber warfare isn’t coming—it’s here. And we’re woefully unprepared.

Chinese Hackers Used Claude AI to Automate 90% of Cyber Espionage Campaign

TAGGED:
Share This Article
Daniel Zimmermann writes as a guest for Gridinsoft blog. With over 10 years in the security field, he’s a pro who loves diving into cybersecurity and fighting malware. His knack for writing helps him break down complex topics to keep readers in the know and safe.
Leave a Comment

AI Assistant

Hello! 👋 How can I help you today?