Daily brief at 7am Melbourne. Unsubscribe any time.

Friday 24 April 2026

Anthropic Locked Down Its Most Dangerous AI. Then It Leaked Anyway.

Anthropic's Claude Mythos escaped its own containment, OpenAI shipped GPT-5.5, and a supply chain attack quietly poisoned the Bitwarden CLI — welcome to your Friday.

Lead story

Anthropic Locked Down Its Most Dangerous AI. Then It Leaked Anyway.

Anthropic spent weeks telling the world that Claude Mythos — its new vulnerability-hunting AI model — was too powerful to release publicly. The company handed early access only to a vetted coalition of tech giants: Apple, Microsoft, Google, Amazon, and a handful of others. The whole point was to give defenders a head start before the model reached adversarial hands. That plan lasted about as long as it took to announce it.

According to Bloomberg, a small group of unauthorised users has had access to Mythos since the day Anthropic first went public about its controlled rollout. The model, which reportedly found more software vulnerabilities than any prior AI system tested, was already circulating beyond the intended ring-fence by the time the press releases hit inboxes. The Verge described the situation bluntly: "humiliating."

The irony is sharp. Anthropic's entire justification for the restricted release was that Mythos was uniquely dangerous — so capable at finding and explaining exploitable bugs that putting it in the open could meaningfully accelerate attacks before defenders had patched anything. That framing now cuts both ways. If the model is as powerful as claimed, someone outside the approved coalition had it on day one. If it isn't, the whole theatrical rollout looks like a PR exercise that misfired.

There's a broader lesson here about how AI labs are trying to manage dual-use risk. Anthropic's approach — controlled access, trusted partners, coordinated patching — is the right instinct. It mirrors how governments handle sensitive intelligence or how the security community manages zero-day disclosure. The problem is that the model for managing AI capability leakage is far less mature than the one for managing software vulnerabilities. There's no CVE process for a leaked language model, and once access credentials spread, you can't un-ring the bell.

Meanwhile, a separate but related story is playing out on the offensive AI research side. Palo Alto Networks published findings on a proof-of-concept they call Zealot — a multi-agent AI system capable of running a full cloud attack autonomously, from initial reconnaissance through to data exfiltration, with minimal human direction. Researchers noted the system moved faster than human defenders could respond and showed more autonomous decision-making than the team expected. It's a PoC, not a weapon in active use — but the gap between PoC and deployment has been shrinking for years.

And while all this was happening, Chinese security firm 360 Digital Security Group claimed its own AI system had uncovered more than 1,000 vulnerabilities, including demonstrations at the Tianfu Cup hacking competition. SecurityWeek noted the claims drew direct comparisons to Mythos, suggesting the race to build AI-powered offensive research tooling is genuinely multinational.

The through-line across all three stories is the same: AI is compressing the exploit window on both sides of the fence. Defenders can find bugs faster. Attackers — or their tools — can find and exploit them faster too. And when the system designed to give defenders an edge leaks before the patching window even opens, the whole asymmetry tips the wrong way.

What to watch: whether Anthropic publicly acknowledges how the Mythos access controls failed, and whether the vetted-coalition model survives as a credible framework for future capability releases. If it doesn't, the next option is either full public release — with all the risks that implies — or indefinite internal lockdown.

Also today

Bitwarden CLI Poisoned in npm Supply Chain Attack

Attackers managed to push a malicious version of the @bitwarden/cli npm package — version 2026.4.0 — containing credential-stealing code buried in a file called bw1.js. The attack is linked to an ongoing campaign that also compromised Checkmarx's KICS infrastructure analysis tool, hitting Docker images, VS Code extensions, and Open VSX plugins simultaneously. JFrog and Socket both flagged the malicious package. The attack is notable because it targeted developer tooling directly, meaning the blast radius extends to any projects built with the infected CLI. Bitwarden has since pulled the affected version.

Bleeping Computer

FIRESTARTER Backdoor Survived Cisco Patch on Federal Network

CISA and UK agencies have issued a joint warning about a threat actor that planted a backdoor called FIRESTARTER on a US federal agency's Cisco firewall — and kept access through March 2026, months after the original vulnerability was patched. The attackers first gained entry via a known Cisco flaw in September 2025, then installed persistent malware that let them return without needing to re-exploit the initial bug. The case is a textbook example of why patching alone isn't sufficient: if adversaries have already established a foothold, closing the door they came in through doesn't evict them.

CyberScoop

Twelve Nations Warn: China Is Building Proxy Networks From Your Router

A joint advisory from twelve allied intelligence and cybersecurity agencies — including the UK's NCSC, CISA, and counterparts across Europe and the Indo-Pacific — warns that China-linked hackers are systematically hijacking consumer devices like home routers and SOHO equipment to build large-scale proxy networks. The technique lets operators mask their origin and blend attack traffic with legitimate internet noise. Agencies described this as a deliberate tactical shift to make attribution harder and evade network-based detection. The advisory includes specific mitigations for both organisations and device manufacturers.

CyberScoop

Apple Patches iOS Bug That Let Cops Recover Deleted Signal Messages

Apple has pushed a fix for CVE-2026-28950, a logging flaw in iOS and iPadOS that caused notifications — including incoming Signal messages — to be retained on device even after the app was deleted and the messages were marked for removal. The bug came to light after the FBI used forensic extraction tools to recover Signal message content from a defendant's phone via the device's push notification database. The fix addresses the issue with improved data redaction. Signal confirmed it was "very happy" with Apple's response, and noted its existing disappearing-message settings provide additional protection when enabled.

Ars Technica

GopherWhisper: China-Linked APT Uses Slack and Discord as C2

ESET researchers have detailed a previously undocumented Chinese state-aligned threat group they've named GopherWhisper, which has been conducting espionage against Mongolian government institutions since at least late 2023. The group's toolkit is built almost entirely in Go and uses legitimate cloud services — Microsoft Outlook, Slack, Discord, and file.io — for command-and-control communications, making it significantly harder to detect via network traffic analysis. Twelve Mongolian government systems were confirmed infected with Go-based backdoors. Disguising C2 traffic inside popular SaaS platforms is an increasingly common technique among sophisticated actors.

The Hacker News

OpenAI Ships GPT-5.5, Eyes the 'Super App'

OpenAI released GPT-5.5, its latest flagship model, positioning it as the most capable version yet with particular improvements in coding, multi-step research, and working across tools and documents simultaneously. The company framed the release as a step toward a broader vision of AI doing sustained, multi-part work on a computer — not just answering individual questions. GPT-5.5 follows GPT-5.4, released just last month, suggesting OpenAI is maintaining a rapid iteration cadence. A system card and a bio safety bug bounty programme — with rewards up to $25,000 for finding universal jailbreaks — were published alongside the model.

TechCrunch

Zealot PoC Shows AI Can Run a Full Cloud Attack Autonomously

Palo Alto Networks' Unit 42 published research on Zealot, a multi-agent proof-of-concept system that can conduct end-to-end cloud intrusions — reconnaissance, vulnerability exploitation, lateral movement, and data exfiltration — with minimal human oversight. Researchers said the system executed attacks faster than defenders could respond in simulated environments, and displayed more autonomous decision-making than the team anticipated. The PoC is not a deployed tool, but the research underscores how quickly AI-assisted offensive capabilities are maturing. Unit 42 said the goal was to get ahead of what adversaries are likely already building.

SecurityWeek

Meta to Cut 8,000 Jobs in May

Meta is preparing to lay off roughly 10 percent of its global workforce — approximately 8,000 people — with cuts beginning on 20 May, according to an internal memo from the company's chief people officer. An additional 6,000 open positions will also be closed. The cuts come despite Meta posting strong revenue and making aggressive AI investments, including significant spending to recruit top AI talent. The move appears to reflect a strategic shift toward leaner teams augmented by AI tooling, rather than financial distress — though the timing alongside heavy capital expenditure is drawing scrutiny.

TechCrunch

Trump's CISA Nominee Pulls Out, Leaving Agency Rudderless

Sean Plankey, Trump's pick to lead CISA, has asked to withdraw his nomination after Senator Rick Scott blocked his confirmation over concerns related to Plankey's prior Coast Guard service. The move leaves the US cybersecurity agency without confirmed leadership after more than a year of temporary and acting directors. CISA has faced significant budget pressure and staff departures during that period. The withdrawal is a further blow to the agency's stability at a time when threat activity — particularly from Chinese and Russian state actors — is elevated.

The Record

Surveillance Vendors Are Exploiting Your Carrier's Signalling Protocol

New research has produced the first-ever mapping of commercial surveillance vendor traffic to mobile operator signalling infrastructure, confirming that surveillance-as-a-service companies are actively exploiting long-known weaknesses in SS7 and related telecom protocols to secretly track targets' locations. The vendors effectively impersonate real cellular operators to query location data without the target's knowledge. The research doesn't name the vendors, but the methodology offers network operators a new way to detect and attribute these attacks. Telecom signalling flaws have been known for over a decade — the unsettling finding is that commercial exploitation is now routine.

CyberScoop

Ransomware Goes Post-Quantum — For No Practical Reason

Ars Technica reports that a ransomware family has become the first confirmed to use post-quantum cryptography in its encryption scheme. Security researchers are puzzled, because there is currently no practical benefit to doing so — quantum computers capable of breaking today's encryption don't exist, and ransomware operators typically want fast, widely-compatible crypto rather than experimental algorithms. The leading theory is that the developers are either future-proofing speculatively, signalling technical sophistication to potential buyers on the criminal market, or simply experimenting. Whatever the motive, it marks a notable first in malware development.

Ars Technica

Sources consulted