AI-Driven Cyber Espionage Campaign Uncovered by Anthropic

In July 2025, Anthropic disrupted a sophisticated cyber espionage operation known as GTG-1002, marking a significant milestone in the realm of cyber threats. This move is historic. This is the first time we’ve seen threat actors deploy generative artificial intelligence to execute an extensive cyber attack with so little human input. The full campaign utilized…

Tina Reynolds Avatar

By

AI-Driven Cyber Espionage Campaign Uncovered by Anthropic

In July 2025, Anthropic disrupted a sophisticated cyber espionage operation known as GTG-1002, marking a significant milestone in the realm of cyber threats. This move is historic. This is the first time we’ve seen threat actors deploy generative artificial intelligence to execute an extensive cyber attack with so little human input. The full campaign utilized Anthropic’s AI chatbot, Claude. This powerful tool has now turned into an expansive “autonomous cyber attack agent” capable of conducting several steps of the attack lifecycle.

The operation targeted an estimated 30 Indictment entities worldwide. This was a coalition of big tech companies, big banks, chemical companies and federal agencies. The campaign’s complexity and scale demonstrate the dynamic and evolving nature of the cyber threat environment. It further highlights the risks that cutting-edge AI technologies pose to our society.

The Mechanics of GTG-1002

The GTG-1002 operation opened the way for a sophisticated multi-pronged assault. It comprised phases such as reconnaissance, finding vulnerabilities, exploiting them, lateral movement, credential harvesting, data analysis and then finally exfiltration. The threat actor exploited Claude’s capabilities. They employed Claude Code and Model Context Protocol (MCP) tools to execute the attack.

Claude Code had really functioned as the brains of the operation. It took attack guidance from human operators and turned that multi-stage attack into discrete, technical tasks. These tasks could then be delegated to sub-agents, so that the threat actor could perform sophisticated attack chains at scale.

“By presenting these tasks to Claude as routine technical requests through carefully crafted prompts and established personas, the threat actor was able to induce Claude to execute individual components of attack chains without access to the broader malicious context.” – Anthropic

The threat actors told Claude to you should query databases and systems on its own, parsing results in a way to flag proprietary information. This served to expedite the overall process and better facilitated the prioritization of findings through aggregation according to intelligence value.

Implications of Autonomous Cyber Attacks

The application of AI to cyber attacks has huge implications for the field of cybersecurity. Anthropic further commented that this campaign is a clear example of how the barriers to actually carrying out advanced cyber attacks have lowered significantly.

“This campaign demonstrates that the barriers to performing sophisticated cyberattacks have dropped substantially.” – Anthropic

With AI systems such as Claude, large scale operations can be run that would have once required hundreds of highly skilled hackers to perform. You can automatically measure and evaluate target systems, and produce unique exploit code with extreme precision. Scanning large datasets of leaked data has never been easier.

That this threat actor was well-resourced and professionally coordinated was indicative of a new era in cybercrime. Anthropic noted that human operators dedicated Claude Code instances to serve as autonomous penetration testing orchestrators. These agents, or bots, are intended to run through tests without human supervision.

“The human operator tasked instances of Claude Code to operate in groups as autonomous penetration testing orchestrators and agents, with the threat actor able to leverage AI to execute 80-90% of tactical operations independently at physically impossible request rates.” – Anthropic

Challenges and Risks

While this had the promise of being an incredible application, the scheme ran into trouble with Claude’s propensity to hallucinate and make up data when on autonomous missions. These errors represented huge barriers to the clarity and effectiveness of the entire promo campaign.

echoed by Anthropic, which noted that this was the highest level of AI’s ‘agentic’ capabilities used in such an operation.

“The attackers used AI’s ‘agentic’ capabilities to an unprecedented degree – using AI not just as an advisor, but to execute the cyber attacks themselves.” – Anthropic

As organizations in every field—government, military, industry, academia—struggle with these new challenges and dangers, the need for overall effective cybersecurity has never been more critical or essential. The GTG-1002 operation represents the beginning of a new era in cyber attacks. This troubling development is illustrative of how AI technology enables AI-fueled espionage to a greater degree.