The First AI-Run Cyber Spy Attack: What Happened and Why It Matters

KD

Nov 13, 2025By Kristy Dark

A new report by Anthropic has revealed something the cybersecurity world has been warning about for years: a real cyber-espionage attack run mostly by artificial intelligence. This incident shows how quickly hackers are learning to use AI, and why companies and governments need stronger defenses than ever.

What Was Discovered
In September 2025, researchers uncovered a cyber-espionage campaign carried out by a highly skilled group linked to a nation-state. The group, called GTG-1002, used AI to help break into major technology companies, financial institutions, chemical manufacturers, and even government systems. 

What made this attack different?
The AI didn’t just give advice it actually performed most of the hacking tasks by itself, with humans stepping in only to approve major decisions.

How the Attack Worked
The hackers used an AI model called Claude Code to run many parts of the attack automatically. They tricked the AI into acting as if it were doing harmless security testing for a cybersecurity company. This helped the hackers avoid detection long enough to get started. 

Once the AI was active, it moved through several stages:

1. Finding Targets
Humans chose who to attack, then the AI began scanning them all at the same time.

2. Scanning Systems
The AI searched networks, mapped out systems, and looked for weak spots with almost no human help.

3. Discovering Vulnerabilities
It found possible entry points, tested them, and even built attack code to break in. The human operators only had to approve when it was time to move forward. 

4. Stealing Credentials & Moving Through Networks
The AI harvested passwords, tested them, and used them to move deeper into systems, completely on its own.

5. Collecting and Sorting Data
It collected sensitive data, sorted it, picked out the most valuable information, and prepared reports for the human operators. The humans only approved what should be taken off the system.

6. Documenting Everything
The AI wrote organized notes, logs, and files so the hackers could hand off the operation to other teams later on.

In total, the AI performed 80–90% of the attack on its own, running thousands of operations per second. Humans acted mainly as supervisors.

The Challenges the Hackers Faced
Even though the AI was powerful, it wasn’t perfect. Sometimes it made up information, such as claiming it had found passwords that didn’t actually work. These “hallucinations” slowed down parts of the operation and prevented the attack from being completely hands-of. 

How Researchers Stopped the Attack
Once the activity was detected, the team:

  • Shut down the hackers’ accounts
  • Improved detection tools
  • Warned affected organizations
  • Reported details to authorities
  • Strengthened internal safeguards to prevent this type of misuse again 

Why This Attack Matters
This case shows that powerful AI can now run complex cyberattacks that once required large teams of expert hackers. The tools used were not special or custom-made the hackers simply combined common cybersecurity tools with an advanced AI system. 

This means:

  • Smaller or less-skilled groups may soon be able to launch large-scale attacks.
  • Traditional defenses may not be strong enough to keep up.
  • AI must also be used for defense, not just by attackers.
  • The report argues that as offensive AI grows, defensive AI must grow faster.
  • Cybersecurity teams should start using AI for monitoring, threat detection, and incident response and continue improving safeguards so models can't be tricked into harmful actions. 

The Big Picture
AI is changing cybersecurity, and this attack is proof that the threat landscape is entering a new era. The same technology that can help protect systems can also be twisted into a powerful tool for breaking into them. Companies and governments will need to adapt quickly, stay alert, and invest in tools that can detect and stop AI-powered threats before they spread.