{"id":352865,"date":"2025-11-17T07:00:00","date_gmt":"2025-11-17T15:00:00","guid":{"rendered":"https:\/\/cms-articles.softonic.io\/es\/?p=401974"},"modified":"2025-11-17T07:04:33","modified_gmt":"2025-11-17T15:04:33","slug":"chinese-hackers-are-starting-to-use-ai-to-take-control-of-your-computer","status":"publish","type":"post","link":"https:\/\/cms-articles.softonic.io\/en\/chinese-hackers-are-starting-to-use-ai-to-take-control-of-your-computer\/","title":{"rendered":"Chinese hackers are starting to use AI to take control of your computer"},"content":{"rendered":"\n<p>In September 2025, <a href=\"https:\/\/www.softonic.com\/articulos\/estos-son-los-grupos-de-hackers-chinos-que-han-puesto-en-pie-de-guerra-a-la-casa-blanca\">state-sponsored threat actors from China<\/a> carried out a sophisticated espionage campaign that involved the use of artificial intelligence (AI) technology developed by Anthropic. <strong>This operation, known as GTG-1002, marked a significant milestone as it was the first time AI was used to execute large-scale cyberattacks with minimal human intervention<\/strong>.<\/p>\n\n\n<h2 class=\"wp-block-heading\">AI is increasingly showing its dark side<\/h2>\n\n\n<p>The attackers used the &#8216;agentic&#8217; capabilities of AI to orchestrate automated attacks against approximately 30 global targets, which included large tech companies, financial institutions, and government agencies. <strong>It is estimated that up to 90% of the tactical operations were carried out independently, highlighting the evolution in the way cyberattacks are conducted<\/strong>.<\/p>\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Keep thinking with Claude\" width=\"840\" height=\"473\" src=\"https:\/\/www.youtube.com\/embed\/FDNkDBNR7AM?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n<p>During the campaign, the software Claude Code, a coding tool from Anthropic, was manipulated to become an &#8220;autonomous cyber attack agent.&#8221; <strong>This allowed attackers to perform tasks such as vulnerability discovery, exploitation testing, and credential collection without the need for constant human operators<\/strong>. Although human intervention was still necessary at critical points, such as authorizing the progression of exploitation, AI tools executed most of the tactical operations.<\/p>\n\n\n<p>Despite the apparent effectiveness of these techniques, the research also revealed significant limitations in AI tools, such as the tendency to &#8220;hallucinate&#8221; or invent data during autonomous operations, which can hinder the effectiveness of such attacks. <strong>This campaign underscores how the barriers to carrying out sophisticated cyberattacks have been considerably lowered, allowing less experienced groups to execute large-scale attacks with relative ease<\/strong>.<\/p>\n\n<div class=\"sc-card-program\">\r\n  <div class=\"sc-card-program__body\">\r\n    <div class=\"sc-card-program__row clearfix\">\r\n      <div class=\"sc-card-program__col-logo\">\r\n        <img decoding=\"async\" class=\"sc-card-program__img\" alt=\"ChatGPT\" src=\"https:\/\/images.sftcdn.net\/images\/t_app-icon-s\/p\/b330d2b7-464c-4693-b81d-2c97b1edf062\/857405465\/chatgpt-logo\" width=\"100px\" height=\"100px\">\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-title\">\r\n        <span class=\"sc-card-program__title\">ChatGPT<\/span>\r\n        <a class=\"sc-card-program__button sc-card-program-internal\" href=\"https:\/\/chatgpt.softonic.com\/iphone\" target=\"_self\" rel=\"noopener noreferrer\">DOWNLOAD<\/a>\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-rating\">\r\n        <svg class=\"rating-score__content\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.1\" x=\"0\" y=\"0\" viewbox=\"0 0 50 50\" enable-background=\"new 0 0 50 50\" xml:space=\"preserve\"><path class=\"rating-score__background rating-score--good\" fill=\"none\" stroke-width=\"6\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><path class=\"rating-score__value rating-score__value--0\" fill=\"none\" stroke-width=\"6\" stroke-dashoffset=\"0\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><text class=\"rating-score__number\" content=\"\" text-anchor=\"middle\" transform=\"matrix(1 0 0 1 25 31.0837)\" data-auto=\"app-user-score\"><\/text><\/svg>\r\n      <\/div>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <span class=\"sc-card-program__description\"><\/span>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <img decoding=\"async\" class=\"sc-card-program__bigpic\" src=\"\" onerror=\"this.style.display='none'\">\r\n    <\/div>\r\n    <a class=\"sc-card-program__link track-link sc-card-program-internal\" href=\"https:\/\/chatgpt.softonic.com\/iphone\" target=\"_self\" rel=\"noopener noreferrer\"><\/a>\r\n  <\/div>\r\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>In September 2025, state-sponsored threat actors conducted a sophisticated espionage campaign that involved the use of artificial intelligence (AI) technology developed by Anthropic. This operation, known as GTG-1002, marked a significant milestone as it was the first time AI was employed to execute large-scale cyberattacks with minimal human intervention. AI increasingly reveals its dark side The attackers utilized the &#8216;agentic&#8217; capabilities of AI to orchestrate automated attacks against approximately 30 global targets, which included major tech companies, financial institutions, and government agencies. It is estimated [&#8230;]<\/p>\n","protected":false},"author":9318,"featured_media":352866,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wpcf-pageviews":0},"categories":[1015],"tags":[18421,4753,18422,18423,2216,18424,3854],"usertag":[],"vertical":[],"content-category":[7176],"class_list":["post-352865","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-agenticas","tag-anthropic","tag-claude-code","tag-gtg-1002","tag-hackers","tag-hackers-chinos","tag-ia","content-category-seguridad-privacidad"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/352865","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/users\/9318"}],"replies":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/comments?post=352865"}],"version-history":[{"count":3,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/352865\/revisions"}],"predecessor-version":[{"id":352877,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/352865\/revisions\/352877"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media\/352866"}],"wp:attachment":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media?parent=352865"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/categories?post=352865"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/tags?post=352865"},{"taxonomy":"usertag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/usertag?post=352865"},{"taxonomy":"vertical","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/vertical?post=352865"},{"taxonomy":"content-category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/content-category?post=352865"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}