{"id":602696,"date":"2026-04-12T20:20:15","date_gmt":"2026-04-12T20:20:15","guid":{"rendered":"https:\/\/www.newsbeep.com\/au\/602696\/"},"modified":"2026-04-12T20:20:15","modified_gmt":"2026-04-12T20:20:15","slug":"hacker-uses-claude-and-chatgpt-to-breach-multiple-government-agencies","status":"publish","type":"post","link":"https:\/\/www.newsbeep.com\/au\/602696\/","title":{"rendered":"Hacker Uses Claude and ChatGPT to Breach Multiple Government Agencies"},"content":{"rendered":"<p>            <a href=\"https:\/\/cybersecuritynews.com\/wp-content\/uploads\/2026\/04\/Hacker-Uses-Claude-and-ChatGPT-to-Breach-Multiple-Government-Agencies-1.webp\" data-caption=\"\" rel=\"nofollow noopener\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" width=\"696\" height=\"392\" class=\"entry-thumb td-modal-image\" src=\"https:\/\/www.newsbeep.com\/au\/wp-content\/uploads\/2026\/04\/Hacker-Uses-Claude-and-ChatGPT-to-Breach-Multiple-Government-Agencies-1-696x392.webp.webp\"   alt=\"\" title=\"Hacker Uses Claude and ChatGPT to Breach Multiple Government Agencies (1)\"\/><\/a><\/p>\n<p>A single threat actor compromised nine Mexican government agencies and <a href=\"https:\/\/cybersecuritynews.com\/hacker-from-shinyhunters-group\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">stole hundreds of millions of citizen records<\/a> in a highly sophisticated cyberattack.<\/p>\n<p>The campaign, which ran from late December 2025 through mid-February 2026, highlights a dangerous shift in the modern threat landscape.<\/p>\n<p><a href=\"https:\/\/gambit.security\/blog-post\/a-single-operator-two-ai-platforms-nine-government-agencies-the-full-technical-report\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Researchers at Gambit Security recently released <\/a>a full technical report detailing how the attacker relied on two major commercial artificial intelligence platforms. The publication was initially delayed to allow the affected agencies time to complete their incident response efforts.<\/p>\n<p>AI Models Power the Breach<\/p>\n<p>The attacker used Anthropic\u2019s Claude Code and OpenAI\u2019s GPT-4.1 not just for planning, but as <a href=\"https:\/\/cybersecuritynews.com\/user-access-management-tools\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">core operational tools<\/a> that drastically accelerated the attack.<\/p>\n<p>According to forensic evidence recovered, Claude Code generated and executed approximately 75% of all remote commands during the intrusion.<\/p>\n<p>Across 34 active sessions on live victim infrastructure, the hacker logged 1,088 individual prompts. These prompts translated into 5,317 AI-executed commands, demonstrating how deeply the AI was integrated into the exploitation phase.<\/p>\n<p><a href=\"https:\/\/www.google.com\/preferences\/source?q=cybersecuritynews.com\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">&#13;<br \/>\n<img decoding=\"async\" src=\"https:\/\/thecybernews.com\/csngoogle.svg&#13;&#10;\" alt=\"google\"\/><\/a><\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" width=\"553\" height=\"301\" src=\"https:\/\/www.newsbeep.com\/au\/wp-content\/uploads\/2026\/04\/1776025215_186_image-8.png\" alt=\"Claude Breach(Source: cdn)\" class=\"wp-image-147166\"  \/>Claude Breach(Source: cdn)<\/p>\n<p>Simultaneously, the attacker leveraged OpenAI\u2019s GPT-4.1 for rapid reconnaissance and data processing. The hacker developed a custom 17,550-line Python script designed to pipe<a href=\"https:\/\/cybersecuritynews.com\/chinese-hackers-using-custom-shadowpad-iis-listener-module\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"> raw data harvested from compromised servers<\/a> directly through the OpenAI API.<\/p>\n<p>This automated system analyzed information across 305 internal servers, rapidly producing 2,597 structured intelligence reports. By automating the data analysis phase, a single operator successfully processed an intelligence volume that would traditionally require an entire team.<\/p>\n<p>The<a href=\"https:\/\/cybersecuritynews.com\/what-risks-deepseek-poses-to-cybersecurity\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"> integration of artificial intelligence <\/a>allowed the attacker to turn unfamiliar networks into mapped targets in hours rather than days. Recovered materials showed the attacker possessed over 400 custom attack scripts.<\/p>\n<p>Furthermore, the hacker used AI to quickly develop 20 tailored exploits targeting 20 specific Common Vulnerabilities and Exposures (CVEs). This high-speed capability compressed the attack timeline, allowing the threat actor to operate well below standard detection and response windows.<\/p>\n<p>Despite the advanced methods used in the campaign, the actual vulnerabilities exploited were highly conventional. The targeted government agencies had basic security gaps that enabled the attacker to gain initial access and move laterally.<\/p>\n<p>The underlying issues were addressable through<a href=\"https:\/\/cybersecuritynews.com\/key-ai-development-solutions-for-cybersecurity-in-2026\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"> standard security controls<\/a>, highlighting a severe accumulation of technical debt within mission-critical infrastructure.<\/p>\n<p>While artificial intelligence has significantly lowered the cost and complexity of executing widespread cyberattacks, the defense strategy remains rooted in foundational security practices.<\/p>\n<p>Organizations must urgently address unpatched software and implement strict credential rotation policies. Enforcing network segmentation is also critical to restrict lateral movement once a perimeter is breached.<\/p>\n<p>Finally, deploying robust endpoint detection and response tools is necessary to identify these rapidly compressed attack timelines before data exfiltration occurs.<\/p>\n<p class=\"has-text-align-center has-background\" style=\"background:linear-gradient(180deg,rgb(238,238,238) 94%,rgb(169,184,195) 100%)\">Follow us on <a href=\"https:\/\/news.google.com\/publications\/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Google News<\/a>, <a href=\"https:\/\/www.linkedin.com\/company\/cybersecurity-news\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">LinkedIn<\/a>, and <a href=\"https:\/\/x.com\/cyber_press_org\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">X<\/a> for daily cybersecurity updates. <a href=\"https:\/\/cybersecuritynews.com\/contact-us\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Contact us<\/a> to feature your stories.<\/p>\n<p><a href=\"https:\/\/news.google.com\/publications\/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">&#13;<br \/>\n<img decoding=\"async\" src=\"https:\/\/thecybernews.com\/gnews.svg&#13;&#10;\" alt=\"googlenews\"\/><\/a>        <\/p>\n","protected":false},"excerpt":{"rendered":"A single threat actor compromised nine Mexican government agencies and stole hundreds of millions of citizen records in&hellip;\n","protected":false},"author":2,"featured_media":602697,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20],"tags":[256,254,255,64,63,105],"class_list":{"0":"post-602696","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-artificial-intelligence","8":"tag-ai","9":"tag-artificial-intelligence","10":"tag-artificialintelligence","11":"tag-au","12":"tag-australia","13":"tag-technology"},"_links":{"self":[{"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/posts\/602696","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/comments?post=602696"}],"version-history":[{"count":0,"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/posts\/602696\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/media\/602697"}],"wp:attachment":[{"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/media?parent=602696"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/categories?post=602696"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/tags?post=602696"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}