{"id":7895,"date":"2026-04-22T13:57:18","date_gmt":"2026-04-22T13:57:18","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=7895"},"modified":"2026-04-22T13:57:18","modified_gmt":"2026-04-22T13:57:18","slug":"unauthorized-group-gains-access-to-anthropics-mythos-ai","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=7895","title":{"rendered":"Unauthorized Group Gains Access to Anthropic\u2019s Mythos AI"},"content":{"rendered":"<p>Anthropic is investigating reports that an unauthorized group gained access to its restricted Mythos AI cybersecurity tool just days after its limited release in April 2026.\u00a0<\/p>\n<p>\u201cWe\u2019re investigating a report claiming unauthorized access to Claude Mythos Preview through one of our third-party vendor environments,\u201d an Anthropic spokesperson said.<\/p>\n<p>The tool was shared with a small group of enterprise partners, including Apple and Goldman Sachs, and was not intended for public use. Reports noted a handful of users accessed Mythos through a contractor-linked system and have been using it since its launch, raising concerns about its capabilities to identify vulnerabilities and simulate cyberattacks.<\/p>\n<h2 class=\"wp-block-heading\">Access linked to a third-party environment<\/h2>\n<p>According to several reports, Anthropic is investigating claims that a private online group accessed Mythos through a third-party vendor system and has found no evidence that the activity extended beyond that environment or affected its internal systems.<\/p>\n<p><a href=\"https:\/\/www.theguardian.com\/technology\/2026\/apr\/22\/anthropic-investigates-report-of-rogue-access-to-hack-enabling-mythos-ai\" target=\"_blank\" rel=\"noopener\">The Guardian noted<\/a> that a handful of users gained access on the same day Mythos was introduced to select partners.\u00a0<\/p>\n<p><a href=\"https:\/\/techcrunch.com\/2026\/04\/21\/unauthorized-group-has-gained-access-to-anthropics-exclusive-cyber-tool-mythos-report-claims\/\" target=\"_blank\" rel=\"noopener\">TechCrunch also stated<\/a> that the group used a range of methods to gain access, including relying on the \u201caccess\u201d of a person interviewed by Bloomberg who works for a third-party <a href=\"https:\/\/www.eweek.com\/news\/anthropic-claude-opus-4-7-ai-release-cycle-rumors\/\">contractor supporting Anthropic<\/a>.<\/p>\n<p>Members of the group are part of a private Discord community that seeks out unreleased AI models. Bloomberg reported that they have been using Mythos since gaining access and provided screenshots and a live demonstration to verify their claims.<\/p>\n<h2 class=\"wp-block-heading\">A high-risk AI tool under scrutiny<\/h2>\n<p>Mythos is part of Anthropic\u2019s Project Glasswing initiative, which restricts access to a limited group of enterprise partners. The company has emphasized the model\u2019s dual-use nature. While it can help organizations identify vulnerabilities, it could also allow attackers to exploit them.\u00a0<\/p>\n<p>Regulators have raised concerns about the model\u2019s potential misuse, even as the UK\u2019s AI Security Institute has vetted Mythos and described it as a <a href=\"https:\/\/www.eweek.com\/news\/anthropic-briefed-trump-administration-on-mythos\/\">step forward in cyber capability<\/a>, according to The Guardian.<\/p>\n<p>In testing, Mythos completed a 32-step simulated cyberattack in several attempts, a task that would typically take human professionals days.\u00a0<\/p>\n<p>UK AI minister Kanishka Narayan said businesses \u201cshould be worried\u201d about the <a href=\"https:\/\/www.eweek.com\/news\/canva-ai-platform-anthropic-claude-design-neuron\/\">model\u2019s ability<\/a> to uncover vulnerabilities that attackers could exploit.<\/p>\n<h2 class=\"wp-block-heading\">Vendor risk draws global attention<\/h2>\n<p>The reported access highlights ongoing challenges in managing third-party risk, especially as AI systems become more powerful and widely deployed. Even when core systems remain secret, vendor environments can introduce exposure points.\u00a0<\/p>\n<p>Financial Review highlighted that Anthropic said it had no evidence that the incident extended beyond the vendor system. \u201cAI labs commonly use third-party contractors for tasks such as model testing, although it was not clear which vendor was involved in the incident,\u201d the publication added.\u00a0<\/p>\n<p>Global regulators are also monitoring the situation. The Reserve Bank of Australia said it is engaging with regulators and government agencies to assess the <a href=\"https:\/\/www.eweek.com\/news\/anthropic-claude-blackmail-agentic-ai-risk\/\">implications for financial system resiliency<\/a>.\u00a0<\/p>\n<p>Anthropic\u2019s investigation is ongoing, and the <a href=\"https:\/\/www.eweek.com\/news\/anthropic-mythos-ai-leak-cybersecurity-risks\/\">full scope of the access<\/a> remains unclear. The outcome may influence how AI companies handle controlled releases of high-risk models.<\/p>\n<p><strong>Also read: <\/strong><a href=\"https:\/\/www.eweek.com\/news\/nsa-anthropic-mythos-ai-dod-supply-chain-risk\/\"><strong>NSA reportedly uses Anthropic\u2019s Mythos AI<\/strong><\/a><strong> despite a \u201csupply chain risk\u201d designation.<\/strong><\/p>\n<p>The post <a href=\"https:\/\/www.eweek.com\/news\/anthropic-mythos-unauthorized-access-investigation\/\">Unauthorized Group Gains Access to Anthropic\u2019s Mythos AI<\/a> appeared first on <a href=\"https:\/\/www.eweek.com\/\">eWEEK<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>Anthropic is investigating reports that an unauthorized group gained access to its restricted Mythos AI cybersecurity tool just days after its limited release in April 2026.\u00a0 \u201cWe\u2019re investigating a report claiming unauthorized access to Claude Mythos Preview through one of our third-party vendor environments,\u201d an Anthropic spokesperson said. The tool was shared with a small [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-7895","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/7895"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=7895"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/7895\/revisions"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=7895"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=7895"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=7895"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}