No Result
View All Result
  • Login
Wednesday, November 19, 2025
FeeOnlyNews.com
  • Home
  • Business
  • Financial Planning
  • Personal Finance
  • Investing
  • Money
  • Economy
  • Markets
  • Stocks
  • Trading
  • Home
  • Business
  • Financial Planning
  • Personal Finance
  • Investing
  • Money
  • Economy
  • Markets
  • Stocks
  • Trading
No Result
View All Result
FeeOnlyNews.com
No Result
View All Result
Home Market Analysis

Anthropic Catches Attackers Using Agents In The Act

by FeeOnlyNews.com
2 days ago
in Market Analysis
Reading Time: 4 mins read
A A
0
Anthropic Catches Attackers Using Agents In The Act
Share on FacebookShare on TwitterShare on LInkedIn


The internet is rife with prognostications and security vendor hype about AI-powered attacks. On November 13, AI vendor Anthropic published details about the disruption of what it characterized as an AI-led cyber espionage operation.

This revelation comes on the heels of a Google Threat Intelligence Group report that also highlighted the use of AI in attacks. Although the report covers activity in the wild, it focuses on malware that uses just-in-time invocation of LLMs for defense evasion and dynamic generation of malicious functions.

The Anthropic report describes an altogether different — and much more sophisticated — use of AI that borders on being agentic.

The release of this information is important because AI vendors are the only parties with sufficient visibility into how adversaries are attempting to leverage AI platforms and models. Ideally, a report such as this would have been mapped to a framework like MITRE ATT&CK, but it still provides insights about what defenders may be facing and how adversary capabilities are evolving.

Anthropic discusses many campaign details in its report, but the high-level summary is that a threat actor, which Anthropic assesses with high confidence to be Chinese state-sponsored, targeted around 30 organizations across multiple industry sectors using an AI-driven attack framework employing agents and requiring very little human effort or intervention.

The attack used agents but wasn’t quite autonomous nor fully agentic

Although the campaign made extensive use of agents, it didn’t quite rise to the level of being truly agentic. While the operation represents a significant step forward in attackers’ use of AI — with agents allegedly performing 80–90% of the work — humans were still providing direction at critical junctions, and there are still limits to what exactly what can be automated. One constraint may be the testing and validation of the output of AI.

As the report says: “An important limitation emerged during investigation: Claude frequently overstated findings and occasionally fabricated data during autonomous operations, claiming to have obtained credentials that didn’t work or identifying critical discoveries that proved to be publicly available information. This AI hallucination in offensive security contexts presented challenges for the actor’s operational effectiveness, requiring careful validation of all claimed results. This remains an obstacle to fully autonomous cyberattacks.” Ironically, this means that attackers may have to confront the same AI trust issues as defenders.

Bot management is more important than ever

Throughout the report, Anthropic points out that the rate of requests far exceeded what was humanly possible. In the application security space, organizations have contended with a similar challenge for years: bad bots attempting distributed denial of service, account fraud, web recon, and scraping while disguising themselves by usurping residential proxies and continuously adapting their behavior to evade defenses.

Malicious agents and/or hijacked agents will use similar techniques. Bot and agent trust management software analyzes hundreds, sometimes thousands, of signals to determine bot and agent provenance, behavior, and intent to help defend against agents that target organizations through customer-facing applications, one of the top external attack vectors.

Insecure intent was an important factor

This campaign was possible for a few distinct reasons. First, as Anthropic states, its newer frontier models understand more context. In addition to making deliberate misrepresentations about their identity and purpose, attackers broke up the attack into discrete tasks. This enabled them to create a gap between the context necessary for carrying out the attack and the context necessary to “understand” the requested actions as malicious in relation to each other.

In Forrester’s Agentic AI Enterprise Guardrails For Information Security (AEGIS) framework, we describe this issue as “securing intent,” and it is one of the defining capabilities of AI security. Securing intent is not just an issue for LLM vendors; it’s also a major priority for any organization building an AI agent and is one of the defining capabilities of AI security.

The use of AI is novel — the underlying tactics and techniques are not

AI is only as effective as its training data; the attacks it produces are not novel. The real value is that, using agents, attacks can be constant, high-volume, and eventually automated to not require a human.

The capabilities needed to defend against these attacks are many of the same ones we already rely on: focusing on Zero Trust, implementing proactive security, building a strong governance capability, and effectively detecting and responding to attacks. To protect against future AI-enabled attacks, security pros should:

Implement the principles of proactive security. Visibility, prioritization, and remediation make up the core of proactive security, and they’re applicable regardless of whether or not an attacker is using AI. By improving prioritization and shortening remediation windows, organizations will be better protected against current threats and better equipped to match the velocity of the AI-powered attacks of the future. Encrypt data at rest and in transit, and use strong key management. This makes high-value targets such as databases and backups far less useful to attackers, even if they are exfiltrated.
Leverage emerging AI capabilities in security tools. Emerging AI capabilities in security — especially in security operations — are proving effective in reducing the time to investigate alerts, especially for use cases such as phishing. Vendors and users are leveraging these technologies. If you are not currently using AI agents for triage and investigation already, start exploring these now. Use Forrester’s Six Steps To The AI-Enabled Security Organization to get started.
Tighten boundaries and kill implicit trust everywhere. Kill long-lived credentials, enforce phishing-resistant multifactor authenticaiton and short-lived tokens everywhere, and constrain lateral movement paths. The attack Anthropic describes leaned heavily on “harvest credentials -> test -> pivot,” so limiting the utility of stolen credentials hamstrings the automation loop that made the operation scalable. This includes applying Zero Trust principles to software development pipelines and environments, as they often have elevated access to sensitive data and are vulnerable to privilege escalation.

While the attack itself used existing exploits and wasn’t fully autonomous, it’s important to note that this serves as a harbinger of things to come for future attacks using AI and agents. Malicious actors will continue to improve on these capabilities, as they have with past technical advances.

Let’s connect

Clients who want to explore Forrester’s diverse range of AI research further can set up a guidance session or inquiry or contact their account team.



Source link

Tags: ActagentsAnthropicAttackerscatches
ShareTweetShare
Previous Post

Gov’t plans bank tax for mortgage relief even if rate falls

Next Post

Google parent Alphabet shares surge 6%, hit record after Berkshire Hathaway makes rare tech bet with $4.9 billion stake

Related Posts

Make Better AI-Enabled Customer Decisions With Real-Time Interaction Management Software Real-Time Interaction Management Software

Make Better AI-Enabled Customer Decisions With Real-Time Interaction Management Software Real-Time Interaction Management Software

by FeeOnlyNews.com
November 18, 2025
0

In an ideal world, brands would focus on ensuring that their customers realize value. But organizations struggle with cross-functional collaboration,...

7 Solid S&P 500 Dividend Stocks to Buy Now Amid Risks of a Market Downturn

7 Solid S&P 500 Dividend Stocks to Buy Now Amid Risks of a Market Downturn

by FeeOnlyNews.com
November 18, 2025
0

Caution has set the tone in the markets this week. The S&P 500 extended its decline for a third straight...

Prepare Your Workforce For An Agentic Future With An Agent Experience Program

Prepare Your Workforce For An Agentic Future With An Agent Experience Program

by FeeOnlyNews.com
November 17, 2025
0

The conversation around AI agents usually starts with the word “efficiency.“ Companies talk about how agents will slash costs, automate...

Cloud Outages, Private AI On Private Clouds, And The Rise Of The Neoclouds

Cloud Outages, Private AI On Private Clouds, And The Rise Of The Neoclouds

by FeeOnlyNews.com
November 17, 2025
0

Every year, Forrester publishes its Predictions series to project what the year ahead will bring. In Predictions 2026: Cloud Computing,...

It’s Beginning To Look A Lot Like Manipulation

It’s Beginning To Look A Lot Like Manipulation

by FeeOnlyNews.com
November 17, 2025
0

In September 2025, Amazon agreed to pay $2.5 billion to settle a lawsuit alleging that its design manipulated millions of...

In Times Of Supply Chain Volatility, Logistics And Fulfillment Take Center Stage Take Control Of Logistics To Mitigate Tariff Turmoil

In Times Of Supply Chain Volatility, Logistics And Fulfillment Take Center Stage Take Control Of Logistics To Mitigate Tariff Turmoil

by FeeOnlyNews.com
November 17, 2025
0

Thanks to concerns about tariffs and geopolitics, Forrester clients are expressing a keen interest in the impact of technology on...

Next Post
Google parent Alphabet shares surge 6%, hit record after Berkshire Hathaway makes rare tech bet with .9 billion stake

Google parent Alphabet shares surge 6%, hit record after Berkshire Hathaway makes rare tech bet with $4.9 billion stake

Robinhood will bring cash to your doorstep. Here’s when cash still comes in handy.

Robinhood will bring cash to your doorstep. Here's when cash still comes in handy.

  • Trending
  • Comments
  • Latest
LPL looks beyond Commonwealth for more growth

LPL looks beyond Commonwealth for more growth

November 3, 2025
401(k) employer contributions mandated under new bill

401(k) employer contributions mandated under new bill

November 13, 2025
UBS team returns to Morgan Stanley after 12 years

UBS team returns to Morgan Stanley after 12 years

November 10, 2025
Here’s Why Brick-and-Mortar Clothing Stores Can’t Keep Up With Shein

Here’s Why Brick-and-Mortar Clothing Stores Can’t Keep Up With Shein

October 25, 2025
How advisors are using AI without explicit SEC guidance

How advisors are using AI without explicit SEC guidance

October 23, 2025
James Galbraith: Crash in Top Economist Hiring Contradicts Elite-Favoring “Skill Biased Technical Change” Theory

James Galbraith: Crash in Top Economist Hiring Contradicts Elite-Favoring “Skill Biased Technical Change” Theory

September 2, 2025
Where should enterprises run their AI workloads?

Where should enterprises run their AI workloads?

0
10 Underrated Signs Your Heart Health Is in Imminent Danger

10 Underrated Signs Your Heart Health Is in Imminent Danger

0
Pan American Silver – PAAS: JETZT in die Silberrallye einsteigen?!

Pan American Silver – PAAS: JETZT in die Silberrallye einsteigen?!

0
EU Directs Hundreds Of BILLIONS To Ukraine In Latest Plan

EU Directs Hundreds Of BILLIONS To Ukraine In Latest Plan

0
Bitget Integration Precedes Ondo’s MiCA Approval for European Tokenized Markets

Bitget Integration Precedes Ondo’s MiCA Approval for European Tokenized Markets

0
Infosys, TCS, HCL Tech and other IT stocks surge up to 4%. Here’s why

Infosys, TCS, HCL Tech and other IT stocks surge up to 4%. Here’s why

0
Where should enterprises run their AI workloads?

Where should enterprises run their AI workloads?

November 19, 2025
Bitget Integration Precedes Ondo’s MiCA Approval for European Tokenized Markets

Bitget Integration Precedes Ondo’s MiCA Approval for European Tokenized Markets

November 19, 2025
Dutch government suspends powers over Chinese-owned chipmaker Nexperia (STM:NYSE)

Dutch government suspends powers over Chinese-owned chipmaker Nexperia (STM:NYSE)

November 19, 2025
Pan American Silver – PAAS: JETZT in die Silberrallye einsteigen?!

Pan American Silver – PAAS: JETZT in die Silberrallye einsteigen?!

November 19, 2025
Bitcoin Is Suffering, but Bitcoin Hyper Can Change Everything: M Presale Nears End

Bitcoin Is Suffering, but Bitcoin Hyper Can Change Everything: $28M Presale Nears End

November 19, 2025
A tale of two CEO successions: Walmart’s clean break vs. Target’s much-criticized transition

A tale of two CEO successions: Walmart’s clean break vs. Target’s much-criticized transition

November 19, 2025
FeeOnlyNews.com

Get the latest news and follow the coverage of Business & Financial News, Stock Market Updates, Analysis, and more from the trusted sources.

CATEGORIES

  • Business
  • Cryptocurrency
  • Economy
  • Financial Planning
  • Investing
  • Market Analysis
  • Markets
  • Money
  • Personal Finance
  • Startups
  • Stock Market
  • Trading

LATEST UPDATES

  • Where should enterprises run their AI workloads?
  • Bitget Integration Precedes Ondo’s MiCA Approval for European Tokenized Markets
  • Dutch government suspends powers over Chinese-owned chipmaker Nexperia (STM:NYSE)
  • Our Great Privacy Policy
  • Terms of Use, Legal Notices & Disclaimers
  • About Us
  • Contact Us

Copyright © 2022-2024 All Rights Reserved
See articles for original source and related links to external sites.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • Business
  • Financial Planning
  • Personal Finance
  • Investing
  • Money
  • Economy
  • Markets
  • Stocks
  • Trading

Copyright © 2022-2024 All Rights Reserved
See articles for original source and related links to external sites.