No Result
View All Result
  • Login
Thursday, February 26, 2026
FeeOnlyNews.com
  • Home
  • Business
  • Financial Planning
  • Personal Finance
  • Investing
  • Money
  • Economy
  • Markets
  • Stocks
  • Trading
  • Home
  • Business
  • Financial Planning
  • Personal Finance
  • Investing
  • Money
  • Economy
  • Markets
  • Stocks
  • Trading
No Result
View All Result
FeeOnlyNews.com
No Result
View All Result
Home Market Analysis

Anthropic Catches Attackers Using Agents In The Act

by FeeOnlyNews.com
3 months ago
in Market Analysis
Reading Time: 4 mins read
A A
0
Anthropic Catches Attackers Using Agents In The Act
Share on FacebookShare on TwitterShare on LInkedIn


The internet is rife with prognostications and security vendor hype about AI-powered attacks. On November 13, AI vendor Anthropic published details about the disruption of what it characterized as an AI-led cyber espionage operation.

This revelation comes on the heels of a Google Threat Intelligence Group report that also highlighted the use of AI in attacks. Although the report covers activity in the wild, it focuses on malware that uses just-in-time invocation of LLMs for defense evasion and dynamic generation of malicious functions.

The Anthropic report describes an altogether different — and much more sophisticated — use of AI that borders on being agentic.

The release of this information is important because AI vendors are the only parties with sufficient visibility into how adversaries are attempting to leverage AI platforms and models. Ideally, a report such as this would have been mapped to a framework like MITRE ATT&CK, but it still provides insights about what defenders may be facing and how adversary capabilities are evolving.

Anthropic discusses many campaign details in its report, but the high-level summary is that a threat actor, which Anthropic assesses with high confidence to be Chinese state-sponsored, targeted around 30 organizations across multiple industry sectors using an AI-driven attack framework employing agents and requiring very little human effort or intervention.

The attack used agents but wasn’t quite autonomous nor fully agentic

Although the campaign made extensive use of agents, it didn’t quite rise to the level of being truly agentic. While the operation represents a significant step forward in attackers’ use of AI — with agents allegedly performing 80–90% of the work — humans were still providing direction at critical junctions, and there are still limits to what exactly what can be automated. One constraint may be the testing and validation of the output of AI.

As the report says: “An important limitation emerged during investigation: Claude frequently overstated findings and occasionally fabricated data during autonomous operations, claiming to have obtained credentials that didn’t work or identifying critical discoveries that proved to be publicly available information. This AI hallucination in offensive security contexts presented challenges for the actor’s operational effectiveness, requiring careful validation of all claimed results. This remains an obstacle to fully autonomous cyberattacks.” Ironically, this means that attackers may have to confront the same AI trust issues as defenders.

Bot management is more important than ever

Throughout the report, Anthropic points out that the rate of requests far exceeded what was humanly possible. In the application security space, organizations have contended with a similar challenge for years: bad bots attempting distributed denial of service, account fraud, web recon, and scraping while disguising themselves by usurping residential proxies and continuously adapting their behavior to evade defenses.

Malicious agents and/or hijacked agents will use similar techniques. Bot and agent trust management software analyzes hundreds, sometimes thousands, of signals to determine bot and agent provenance, behavior, and intent to help defend against agents that target organizations through customer-facing applications, one of the top external attack vectors.

Insecure intent was an important factor

This campaign was possible for a few distinct reasons. First, as Anthropic states, its newer frontier models understand more context. In addition to making deliberate misrepresentations about their identity and purpose, attackers broke up the attack into discrete tasks. This enabled them to create a gap between the context necessary for carrying out the attack and the context necessary to “understand” the requested actions as malicious in relation to each other.

In Forrester’s Agentic AI Enterprise Guardrails For Information Security (AEGIS) framework, we describe this issue as “securing intent,” and it is one of the defining capabilities of AI security. Securing intent is not just an issue for LLM vendors; it’s also a major priority for any organization building an AI agent and is one of the defining capabilities of AI security.

The use of AI is novel — the underlying tactics and techniques are not

AI is only as effective as its training data; the attacks it produces are not novel. The real value is that, using agents, attacks can be constant, high-volume, and eventually automated to not require a human.

The capabilities needed to defend against these attacks are many of the same ones we already rely on: focusing on Zero Trust, implementing proactive security, building a strong governance capability, and effectively detecting and responding to attacks. To protect against future AI-enabled attacks, security pros should:

Implement the principles of proactive security. Visibility, prioritization, and remediation make up the core of proactive security, and they’re applicable regardless of whether or not an attacker is using AI. By improving prioritization and shortening remediation windows, organizations will be better protected against current threats and better equipped to match the velocity of the AI-powered attacks of the future. Encrypt data at rest and in transit, and use strong key management. This makes high-value targets such as databases and backups far less useful to attackers, even if they are exfiltrated.
Leverage emerging AI capabilities in security tools. Emerging AI capabilities in security — especially in security operations — are proving effective in reducing the time to investigate alerts, especially for use cases such as phishing. Vendors and users are leveraging these technologies. If you are not currently using AI agents for triage and investigation already, start exploring these now. Use Forrester’s Six Steps To The AI-Enabled Security Organization to get started.
Tighten boundaries and kill implicit trust everywhere. Kill long-lived credentials, enforce phishing-resistant multifactor authenticaiton and short-lived tokens everywhere, and constrain lateral movement paths. The attack Anthropic describes leaned heavily on “harvest credentials -> test -> pivot,” so limiting the utility of stolen credentials hamstrings the automation loop that made the operation scalable. This includes applying Zero Trust principles to software development pipelines and environments, as they often have elevated access to sensitive data and are vulnerable to privilege escalation.

While the attack itself used existing exploits and wasn’t fully autonomous, it’s important to note that this serves as a harbinger of things to come for future attacks using AI and agents. Malicious actors will continue to improve on these capabilities, as they have with past technical advances.

Let’s connect

Clients who want to explore Forrester’s diverse range of AI research further can set up a guidance session or inquiry or contact their account team.



Source link

Tags: ActagentsAnthropicAttackerscatches
ShareTweetShare
Previous Post

Gov’t plans bank tax for mortgage relief even if rate falls

Next Post

Google parent Alphabet shares surge 6%, hit record after Berkshire Hathaway makes rare tech bet with $4.9 billion stake

Related Posts

Vendor Specialization Is In The Spotlight In Forrester’s B2B and B2C Commerce Landscape

Vendor Specialization Is In The Spotlight In Forrester’s B2B and B2C Commerce Landscape

by FeeOnlyNews.com
February 25, 2026
0

Two things are true: The Commerce Solutions market continues to evolve, and more vendors that once specialized in B2B or...

B2B Hyperpersonalization Is Not A Feature — It Is An Expectation!

B2B Hyperpersonalization Is Not A Feature — It Is An Expectation!

by FeeOnlyNews.com
February 25, 2026
0

A procurement manager logs into your portal at 10:47 p.m. They don’t want to browse. They want to finish: Reorder...

Channel Incentives

Channel Incentives

by FeeOnlyNews.com
February 25, 2026
0

Computer Market Research (CMR): The Ultimate Channel Management Compendium PART 1 Table of Contents for Part 1 Introduction to Channel...

Nvidia Earnings Preview: A Make-or-Break Moment for the AI Trade

Nvidia Earnings Preview: A Make-or-Break Moment for the AI Trade

by FeeOnlyNews.com
February 25, 2026
0

Nvidia is scheduled to release its highly anticipated fiscal Q4 earnings report on Wednesday evening. The AI bellwether’s results and...

Lightweight Rooftop Solar PV Market: Competitive Landscape & Insights

Lightweight Rooftop Solar PV Market: Competitive Landscape & Insights

by FeeOnlyNews.com
February 25, 2026
0

The Lightweight Rooftop Solar PV Market is expanding steadily as commercial and industrial players adopt innovative solar technologies that are...

Bitcoin Sentiment Hits Extreme Fear — Technicals Point to K Retest

Bitcoin Sentiment Hits Extreme Fear — Technicals Point to $60K Retest

by FeeOnlyNews.com
February 25, 2026
0

Bitcoin heads for fifth monthly loss as $60,000 support faces pressure. ETF outflows and exchange inflows signal rising sell intent....

Next Post
Google parent Alphabet shares surge 6%, hit record after Berkshire Hathaway makes rare tech bet with .9 billion stake

Google parent Alphabet shares surge 6%, hit record after Berkshire Hathaway makes rare tech bet with $4.9 billion stake

Robinhood will bring cash to your doorstep. Here’s when cash still comes in handy.

Robinhood will bring cash to your doorstep. Here's when cash still comes in handy.

  • Trending
  • Comments
  • Latest
York IE Appoints Chuck Saia to its Strategic Advisory Board

York IE Appoints Chuck Saia to its Strategic Advisory Board

February 18, 2026
Super Bowl ads go for silliness, tears and nostalgia as Americans reel from ‘collective trauma’ of recent upheaval — ‘Everybody is stressed out’

Super Bowl ads go for silliness, tears and nostalgia as Americans reel from ‘collective trauma’ of recent upheaval — ‘Everybody is stressed out’

February 8, 2026
York IE Adds OpenView Veteran Tom Holahan as General Partner for New Early Growth Fund

York IE Adds OpenView Veteran Tom Holahan as General Partner for New Early Growth Fund

February 11, 2026
The Weekly Notable Startup Funding Report: 2/9/26 – AlleyWatch

The Weekly Notable Startup Funding Report: 2/9/26 – AlleyWatch

February 9, 2026
Self-driving startup Waabi raises up to  billion, partners with Uber to deploy 25,000 robotaxis

Self-driving startup Waabi raises up to $1 billion, partners with Uber to deploy 25,000 robotaxis

January 28, 2026
FPA partners with Snappy Kraken to update PlannerSearch

FPA partners with Snappy Kraken to update PlannerSearch

February 25, 2026
Bitcoin’s rally towards ,000 revives Jane Street debate

Bitcoin’s rally towards $70,000 revives Jane Street debate

0
Mizrahi Tefahot 2025 profit up 3.2%

Mizrahi Tefahot 2025 profit up 3.2%

0
I watched my wife stop explaining herself to everyone after she turned 50, and what happened next changed how I see every woman in my life

I watched my wife stop explaining herself to everyone after she turned 50, and what happened next changed how I see every woman in my life

0
B2B Hyperpersonalization Is Not A Feature — It Is An Expectation!

B2B Hyperpersonalization Is Not A Feature — It Is An Expectation!

0
6 Ways New Insurance Requirements Are Adding 0–0 a Year to Auto Costs

6 Ways New Insurance Requirements Are Adding $200–$500 a Year to Auto Costs

0
Tapestry (TPR): Ausbruch oder Verschnaufpause?

Tapestry (TPR): Ausbruch oder Verschnaufpause?

0
I watched my wife stop explaining herself to everyone after she turned 50, and what happened next changed how I see every woman in my life

I watched my wife stop explaining herself to everyone after she turned 50, and what happened next changed how I see every woman in my life

February 26, 2026
Bitcoin’s rally towards ,000 revives Jane Street debate

Bitcoin’s rally towards $70,000 revives Jane Street debate

February 26, 2026
Rockport Wealth Buys  Million of AIRR

Rockport Wealth Buys $9 Million of AIRR

February 26, 2026
Tapestry (TPR): Ausbruch oder Verschnaufpause?

Tapestry (TPR): Ausbruch oder Verschnaufpause?

February 26, 2026
Mizrahi Tefahot 2025 profit up 3.2%

Mizrahi Tefahot 2025 profit up 3.2%

February 26, 2026
Synopsys Q1 2026 Earnings Results

Synopsys Q1 2026 Earnings Results

February 26, 2026
FeeOnlyNews.com

Get the latest news and follow the coverage of Business & Financial News, Stock Market Updates, Analysis, and more from the trusted sources.

CATEGORIES

  • Business
  • Cryptocurrency
  • Economy
  • Financial Planning
  • Investing
  • Market Analysis
  • Markets
  • Money
  • Personal Finance
  • Startups
  • Stock Market
  • Trading

LATEST UPDATES

  • I watched my wife stop explaining herself to everyone after she turned 50, and what happened next changed how I see every woman in my life
  • Bitcoin’s rally towards $70,000 revives Jane Street debate
  • Rockport Wealth Buys $9 Million of AIRR
  • Our Great Privacy Policy
  • Terms of Use, Legal Notices & Disclaimers
  • About Us
  • Contact Us

Copyright © 2022-2024 All Rights Reserved
See articles for original source and related links to external sites.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • Business
  • Financial Planning
  • Personal Finance
  • Investing
  • Money
  • Economy
  • Markets
  • Stocks
  • Trading

Copyright © 2022-2024 All Rights Reserved
See articles for original source and related links to external sites.