{"id":32879,"date":"2025-08-28T10:52:44","date_gmt":"2025-08-28T07:52:44","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=32879"},"modified":"2025-08-28T10:55:12","modified_gmt":"2025-08-28T07:55:12","slug":"fraudsters-exploit-claude-for-vibe-hacking","status":"publish","type":"post","link":"https:\/\/u1f987.com\/en\/fraudsters-exploit-claude-for-vibe-hacking\/","title":{"rendered":"Fraudsters Exploit Claude for Vibe Hacking"},"content":{"rendered":"<p>Cybercriminals have discovered methods to leverage the chat-bot Claude for large-scale cyberattacks, despite the presence of sophisticated security mechanisms. This was revealed by Anthropic in their Threat Intelligence report.<\/p>\n<p><iframe loading=\"lazy\" width=\"560\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/EsCNkDrIGCw?si=xD1lzZ_F_3_zpBvg\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<p>Alex Moix, Ken Lebedev, and Jacob Klein cited several instances where criminals employed AI. In some attacks, the ransom demands exceeded $500,000.<\/p>\n<p>The chat-bot was used not only for technical consultations but also to execute hacks through so-called vibe hacking. Such attacks require only basic knowledge of programming and encryption.<\/p>\n<p>Vibe hacking is a form of social engineering where perpetrators use AI agents to manipulate the emotions and trust of the victim. Unlike traditional phishing, which involves fake emails or websites, this attack appears as &#8220;friendly&#8221; or &#8220;convincing&#8221; interaction\u2014creating the &#8220;right vibe&#8221; of communication. AI can automatically adjust to the tone, style, and mood of the interlocutor to gain trust and persuade them to perform a malicious action.<\/p>\n<p>Anthropic identified a hacker who used vibe hacking and Claude to steal confidential data from at least 17 organizations, including medical institutions, emergency services, government bodies, and religious groups. He demanded ransoms ranging from $75,000 to $500,000 in Bitcoin.<\/p>\n<p>The hacker trained Claude to analyze stolen financial records, calculate appropriate ransom amounts, and draft personalized ransom letters to increase psychological pressure.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cPeople who are unable to independently implement basic encryption or understand the mechanics of system calls are now successfully creating ransomware with capabilities to bypass defenses and use methods to counteract analysis,\u201d company representatives stated.<\/p>\n<\/blockquote>\n<p>The AI startup also discovered that North Korean IT specialists used Claude to create convincing fake identities, pass technical programming tests, and even secure remote positions in American Fortune 500 tech companies. They used Claude to prepare interview responses.<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh7-qw.googleusercontent.com\/docsz\/AD_4nXf2eHeFasEKbCpQcjubwnvaRJtsru9wgti3JQMC5a-ZJXatVcx4vFCqvJVAkqVDf_cIOjQwRcyXOgsbQBAlj1pW4ihvNJ5jRroFFBdXAWt01LvSIP12YcsVmbfXYCY007b5Zh2nUw?key=jmJQB2ENus_aKY4xXVADUQ\" alt=\"Fraudsters Exploit Claude for Vibe Hacking\"\/><figcaption class=\"wp-element-caption\">Distribution of tasks performed by North Koreans using Claude. Data: <a href=\"https:\/\/www-cdn.anthropic.com\/b2a76c6f6992465c09a6f2fce282f6c0cea8c200.pdf\">Anthropic<\/a>.<\/figcaption><\/figure>\n<p>It is suggested that one of the perpetrators was interviewed for a programmer position at Polygon Labs. Other prepared responses indicated experience with OpenSea and Chainlink.<\/p>\n<p>Earlier, Anthropic <a href=\"https:\/\/u1f987.com\/en\/news\/anthropic-focuses-on-chatbot-claudes-well-being\">programmed<\/a> the Claude Opus 4 and 4.1 chat-bots to terminate dialogues with users \u201cin rare, extreme cases of systematically malicious or abusive interaction.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybercriminals have discovered methods to leverage the chat-bot Claude for large-scale cyberattacks, despite the presence of sophisticated security mechanisms.<\/p>\n","protected":false},"author":1,"featured_media":32880,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"Cybercriminals exploit Claude for large-scale attacks, bypassing security.","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1434,438],"class_list":["post-32879","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-anthropic","tag-artificial-intelligence"],"aioseo_notices":[],"amp_enabled":true,"views":"211","promo_type":"1","layout_type":"1","short_excerpt":"Cybercriminals exploit Claude for large-scale attacks, bypassing security.","is_update":"","_links":{"self":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/32879","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/comments?post=32879"}],"version-history":[{"count":1,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/32879\/revisions"}],"predecessor-version":[{"id":32881,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/32879\/revisions\/32881"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/media\/32880"}],"wp:attachment":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/media?parent=32879"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/categories?post=32879"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/tags?post=32879"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}