Hacking Claude: Cybercriminals Turn AI Into a Ransomware Tool

criminals are using AI for hacks

Despite its “sophisticated” safeguards, Anthropic says criminals are still finding ways to exploit its Claude AI chatbot for large-scale cyberattacks.

In a Threat Intelligence report published Wednesday, Anthropic researchers Alex Moix, Ken Lebedev, and Jacob Klein detailed several cases in which attackers misused Claude, with some incidents involving ransom demands exceeding $500,000.

According to the report, hackers relied on Claude not only for technical guidance but also to directly execute attacks through a method called “vibe hacking.” This approach uses AI-driven social engineering to manipulate emotions, trust, and decision-making, enabling criminals with only basic coding or encryption skills to launch complex operations.

Anthropic highlighted one case where a hacker used Claude to target at least 17 organizations, including healthcare providers, emergency services, government bodies, and religious institutions, demanding ransoms ranging from $75,000 to $500,000 in Bitcoin.

The findings echo earlier warnings. In February, blockchain security firm Chainalysis predicted that 2025 could mark a record year for crypto scams, fueled by generative AI making such attacks more scalable and cost-effective.

The attacker went as far as training Claude to analyze stolen financial records, determine ransom demands, and draft customized ransom notes designed to heighten psychological pressure on victims.

Although Anthropic eventually banned the hacker, the case underscores how AI is enabling even low-skill criminals to conduct cyberattacks at an unprecedented scale.

Hacking the Job Market: North Korea’s AI-Assisted Schemes

Anthropic also discovered that North Korean IT workers had been using Claude to fabricate convincing identities, pass technical assessments, and even secure remote positions at U.S. Fortune 500 tech companies. The chatbot was further employed to help them prepare interview responses and later perform the actual coding work once hired.

According to the report, these schemes were designed to funnel profits back to the North Korean regime in violation of international sanctions. Earlier this month, a counter-hack exposed one such operation: a six-person team managing at least 31 fake identities, complete with forged government IDs, phone numbers, and purchased LinkedIn and Upwork accounts, all aimed at disguising themselves and landing crypto-related jobs.

DISCLAIMER AND RISK WARNING

The content published on Coin Medium is intended solely for informational and educational purposes. It should not be interpreted as financial, investment, legal, or other professional advice. While we strive to ensure accuracy, readers are strongly encouraged to conduct their own research and consult with a qualified professional before making any financial decisions. Coin Medium is not responsible for any losses or damages resulting from reliance on any content, products, or services mentioned in our articles or content belonging to the Coin Medium brand, including but not limited to its social media, newsletters, or posts related to Coin Medium team members.

Share:
Picture of Mohamed Hussein

Mohamed Hussein

With a BA in Journalism and over 11 years of experience in Arabic and English media, I bring a newsroom mindset to the fast-paced world of crypto content. From breaking news to in-depth features, I’ve worked across leading platforms. Today, as a content writer in the Web3 space, I aim to make complex topics like blockchain, crypto, and digital innovation accessible to a wider audience, without compromising clarity or credibility.
X

Table of Contents

Latest Posts