Transcript
A (0:00)
Foreign and welcome to Risky Business. My name is Patrick Gray. We'll be chatting about the week's security news with Adam Boileau in just a moment. And then we'll be hearing from this week's sponsor. And this week we're speaking with Arooj Bernie, who is the global head of risk and resilience at mastercard. And we're talking to him about, I guess, why fraud and cyber departments at financial institutions were traditionally separate and why they're unifying. That is an interesting conversation and it is coming up later. But first up, yeah, Adam, we got some great stuff to talk about this week and one interesting conversation to kick us off, which is this report from Anthropic about apparently a Chinese APT group using Anthropic to heavily automate operations. Now what makes this an interesting conversation, I guess is, I mean there's the report itself, but then there's been the reaction to the report with a lot of people poo pooing it. And we're going to sort of wade through all of that. But first of all, why don't you just walk us through what the Anthropic report actually says.
B (1:06)
So they spotted a campaign that was using their CLAUDE LLM tooling to carry out some kind of attacks. And they went and kind of pulled that thread. And it turns out that a Chinese group was, you know, had built some kind of framework to orchestrate attacks using CLAUDE as one of the components. And they were attacking, I think in the end something like 30 companies with this set of tooling and in some cases were successful, able to break in. And judging by the speed of the operation and the kind of amount of human interaction, Anthropic have written it up as kind of like a reasonably automated set of attacks that was able to do initial reconnaissance, submit those results back to a human for approval, carry out attacks. We saw some conversation about using credentials that are discovered, some using SQL injection, some using server side request forgery flaws. So using technical flaws that the LLMs had kind of pulled together to break in, escalate some access, exit the data, triage that data for further credentials and access, and then use that eventually to extract information from the target organization. So a pretty reasonable end to end hacking campaign orchestrated by an LLM on behalf of maybe the Chinese mss. So it's pretty cool.
A (2:25)
I mean, it's extremely cool. Right. So what's kind of surprised me about this is the number of people taking a cricket bat to the findings. Right. Taking a cricket bat to the report. And there's this Strange line of attack that a few people have participated in. Right. So one of them is, is Kevin Beaumont, who is quoted in, I have to say, an excellent write up on all of this by Derek B. Johnson at cyberscoop. If you're going to read one story about this, it should be that one. But you know, it quotes Kevin Beaumont in that piece, you know, saying that Anthropics report lacks transparency. Okay, fair. We'll get into why that might be a little bit later on. But he also describes, he said it describes actions that are already achievable with existing tools. And I've seen multiple people, you know, criticize the report saying, oh, it's not a big deal because they used existing tools. I mean, that's not the novel part here. I mean, that's entirely what you would expect from this sort of campaign. So I don't understand that criticism.
