Unlock your business transformation with our smart IT infrastructure services and solutions.
Ensure your unique data and process requirements are being met with IT solutions built on deep domain experience and expertise.
At Coretelligent, we’re redefining the essence of IT services to emphasize true partnership and business alignment.
Get our perspective on the connections between technology and business and how they affect you.
Monthly Intelligence Report
In September 2025, Anthropic disrupted a China-linked espionage operation (GTG-1002) that used its Claude Code model inside an automated “agentic” framework to run reconnaissance, exploit vulnerabilities, move laterally, and extract data across roughly 30 organizations in technology, finance, chemicals, and government. Anthropic estimates AI handled 80–90% of the hands-on intrusion work, with humans guiding and reviewing outputs; despite AI errors and false positives, the attackers still achieved multiple successful intrusions before the campaign was shut down.
Some experts question how “first-of-its-kind” and large-scale this campaign truly was, but there is broad agreement that AI has shifted attacker economics: automation makes targeted campaigns cheaper to run, which increases the likelihood your organization gets probed. For CFOs, this marks a new phase of cyber risk: faster, wider, lower-cost intrusions driven by automation rather than human labor.
Who They Are: A China-affiliated state-sponsored espionage group focused on strategic intelligence and data theft.
Who They Targeted: Approximately 30 organizations, primarily in –
Targets skewed toward organizations with high-value IP, regulated data, or complex vendor ecosystems.
Why This Campaign Is Significant
Anthropic detected anomalies in mid-September, contained the operation within roughly 10 days, banned accounts, notified impacted organizations, and issued a public disclosure.
Anthropic’s investigation showed a familiar attack chain executed at machine speed
Boards and executives are now expected to demonstrate ransomware governance. Legal, finance, and technology leaders should coordinate on incident-reporting readiness and disclosure language.
This was not a laboratory demonstration. GTG-1002 executed a real espionage campaign, scaled through automation, that succeeded against several targets before detection.
As you prioritize investment and oversight, it helps to understand where exposure is highest.
Higher-Exposure Sectors
Elevated but Indirect Exposure
Lower Exposure (in this campaign)
When AI performs the work, attackers can run targeted campaigns at scale. That means:
This shifts cyber risk from “rare but severe” to “frequent and fast.”
Reconnaissance and exploitation that previously took days now occur within hours, increasing:
CFO consideration: your response budget and resourcing must match this new tempo.
AI agents are exceptionally effective at scanning: Cloud identity systems; SaaS integrations; financial and HR APIs; and vendor-hosted assets.
This expands risk into environments you do not directly control, creating:
Even without ransom payments, the financial consequences of an espionage incident include:
These costs regularly reach seven figures for mid-market firms.
For CFOs, expect tougher audits, higher documentation standards, and stricter underwriting requirements.
Connect with your Coretelligent Account Lead to assess where automation creates the greatest exposure in your environment – and where the most cost-effective improvements can be made.
Email: info@coretelligent.com
Phone: 1-855-841-5888
Our engineers provide help desk support, innovative business IT solutions, and a whole lot more.