Discord Investigators Achieve Unauthorized Access to Anthropic’s Mythos

As the discourse around the implications of advanced AI models on cybersecurity continues, Mozilla announced that it utilized early access to Anthropic’s Mythos Preview to identify and address 271 vulnerabilities in its latest Firefox 150 browser release. Concurrently, researchers have uncovered a group of North Korean hackers who have adeptly employed AI technologies for various illicit activities, including the development of malware and counterfeit company websites, netting as much as $12 million within a three-month span.

In a significant development, researchers have successfully analyzed disruptive malware known as Fast16, which predates the notorious Stuxnet, and is believed to have targeted Iran’s nuclear ambitions. Originally created in 2005, Fast16 is suspected to have been deployed by the U.S. or allied forces.

Legal challenges are mounting for Meta, as the Consumer Federation of America, a nonprofit organization, has filed a lawsuit regarding scam advertisements running on Facebook and Instagram. This lawsuit accuses Meta of misleading users about its measures against such scams. Meanwhile, a contentious U.S. surveillance program that allows the FBI to access American communications without a warrant is facing a potential renewal, but lawmakers remain at an impasse over its future. A newly proposed bill seeks to address concerns but lacks substantial detail.

For those interested in a comprehensive analysis, WIRED has conducted an investigation into the long-standing dispute surrounding GrapheneOS, a mobile operating system focused on privacy and security. Additionally, there is a peculiar narrative concerning how China reportedly monitored U.S. figure skater Alysa Liu and her father.

In another security revelation, a group of amateur investigators on Discord managed to access Anthropic’s Mythos Preview AI model through straightforward techniques, bypassing the stringent control measures intended to regulate its release. Their methodology involved analyzing a data breach from Mercor, an AI training startup, and making informed assumptions about the model’s online presence, which Bloomberg reported might reference a specific web URL.

Through careful excavations aided by their permissions from activities at an Anthropic contracting firm, these individuals gained access not only to Mythos but also to other unreleased Anthropic models. Fortunately, rather than engaging in malicious activities, the group has limited its usage to building simple websites to evade detection by Anthropic.

Concerns regarding telecommunications security are exacerbated by recent findings from the digital rights group Citizen Lab, which revealed that two surveillance companies exploited vulnerabilities in the telecom protocols known as Signaling System 7 (SS7) to clandestinely track high-profile individuals. These firms capitalized on their access to three small telecom providers, allowing them to monitor devices without permission. Citizen Lab’s findings indicate that such exploitation is likely not isolated and characterizes a significant threat landscape for global telecom security.

In the ongoing fight against human trafficking-related scams, the U.S. Department of Justice has charged two Chinese nationals for allegedly managing a scam operation in Myanmar, which exploited human trafficking victims by using fake job offers to draw them in. These individuals were reportedly involved in forcing victims to perpetrate scams, including cryptocurrency fraud targeting U.S. citizens, with efforts leading to the restraint of $700 million linked to the operation.

Finally, ethical concerns were raised as three British research institutions were discovered selling health data on Alibaba, sparking outrage regarding breaches of confidentiality and use of sensitive information without proper authorization. The UK Biobank, which typically facilitates research by sharing anonymized health data, confirmed that these actions constituted a breach of contract and has subsequently suspended the implicated accounts.

Amid these incidents, recent developments highlight the vulnerabilities of end-to-end encryption. The FBI has reportedly extracted deleted Signal messages from an iPhone via the push notification database, revealing a significant flaw in data retention practices. In response, Apple has rolled out a security update to rectify the issue, emphasizing the importance of being vigilant regarding notification settings, even in encrypted applications. As the landscape of cybersecurity evolves, it remains imperative for businesses and individuals alike to stay informed and proactive in safeguarding against emerging threats.

Source