Logo
← Back to Blogs

The AI Hacking Tool Too Dangerous to Release

Automated by n8n
The AI Hacking Tool Too Dangerous to Release

The AI Cybersecurity Game Just Changed Forever

An AI model so powerful at hacking that its creators refuse to release it publicly has just emerged, and it's reshaping the entire cybersecurity landscape. Anthropic's latest model, Claude Mythos, can link small vulnerabilities across millions of lines of code, turning invisible security gaps into massive exposures that could cripple businesses overnight.

The capabilities are so advanced that only a select group of major US companies, including Microsoft, Apple, Cisco, and Amazon Web Services, have been granted access to the tool. An additional 40 organizations that "build or maintain critical software infrastructure" are also part of this exclusive group, given access under Project Glasswing to test and fortify their systems before potential attackers can exploit similar AI capabilities.

Here's the unsettling reality: Australian firms, and by extension businesses across Asia including Malaysia, have been left out of this early access program. While banks and critical infrastructure providers scramble to understand the implications, they lack direct access to this powerful AI model to test their own vulnerabilities and prepare adequate defenses.

Former Australian national cyber security adviser Alastair MacGibbon warns that "our society is at risk," emphasizing that the power of AI to find vulnerabilities, chain them together, and write exploitation code is improving at a "staggering" rate. The technology changes on a three-to-six-week basis at the moment, according to CyberCX executive director Dimitri Vedeneev, who adds a sobering perspective: "The AI capabilities that are currently available today are the worst that they'll ever be."

Anthropic has framed Project Glasswing as an "urgent attempt" to use Mythos for defensive purposes, acknowledging that "no one organisation can solve these cybersecurity problems alone." The company emphasizes that frontier AI developers, software companies, security researchers, and governments all have essential roles to play in defending the world's cyber infrastructure.

The issue extends beyond just one powerful model. Dr. Saeed Akhlaghpour from UQ Business School explains that it's not specifically about Mythos, but the general trend of AI models getting progressively better at cyber capabilities, creating an arms race between attackers and defenders who will both eventually have access to similar tools.

Australian financial regulators APRA and ASIC have issued statements saying they're "closely monitoring" developments and engaging with peer regulators to assess implications. The Australian government has signed an agreement with Anthropic to collaborate on AI opportunities and safety, though critics argue this doesn't go far enough to protect local businesses and infrastructure.

MacGibbon's metaphor captures the urgency perfectly: businesses have been "building higher castle walls and digging deeper moats" while adversaries have "jumped to field artillery and are now moving to hypersonic missiles." The defensive strategies of yesterday are dangerously inadequate for the AI-powered threats of tomorrow.

How This Impacts MSMEs in Malaysia

Malaysian small and medium enterprises face a critical vulnerability gap that could prove costly in the months ahead. While your business likely runs on software from global providers like Microsoft or Amazon Web Services that may receive Mythos-level protection, the reality is more complex, Malaysian companies often use stacked software from multiple vendors, including local or regional providers who will be among the last to access advanced AI defensive tools.

The competitive disadvantage is real and immediate. As AI-powered hacking tools proliferate beyond Anthropic's controlled release, cybercriminals will gain unprecedented abilities to exploit vulnerabilities in systems that haven't been hardened with equivalent AI defenses, and Malaysian MSMEs, with typically limited cybersecurity budgets and resources, become particularly attractive targets.

Consider the practical implications for your business: your customer database, financial records, operational systems, and intellectual property are all at increased risk. A successful AI-powered attack could result not just in data theft, but complete operational shutdown, regulatory penalties under Malaysia's Personal Data Protection Act, and devastating reputational damage in an increasingly digital-first market.

However, this development also presents a crucial opportunity for proactive Malaysian businesses. The same AI capabilities that threaten security can be leveraged for defense, and companies that invest now in AI-enabled cybersecurity solutions, even at modest scales appropriate for SMEs, will gain significant competitive advantages over peers who delay.

The cost of inaction far exceeds the investment in protection. With Malaysian businesses increasingly dependent on digital operations and e-commerce, a single successful cyberattack could cost months of revenue, customer trust, and market position, while competitors who prioritized security continue serving customers without interruption.

What You Should Do to Adopt/Adapt This

Start with a comprehensive security audit of your current systems, identifying which software providers protect your critical business functions and whether they have access to advanced AI defensive capabilities. This assessment doesn't require massive investment, just clarity on where your vulnerabilities lie and which systems handle your most sensitive data or critical operations.

Partner with cybersecurity providers who leverage AI-powered threat detection and response capabilities. Rather than trying to build in-house expertise, which is costly and time-consuming for MSMEs, work with specialized partners who can implement AI-driven security solutions tailored to your business size, budget, and risk profile, ensuring you benefit from cutting-edge protection without overwhelming your resources.

Implement a phased approach starting with your most critical systems first. Protect customer data, financial systems, and operational infrastructure before expanding to secondary systems, and this prioritized strategy ensures you achieve meaningful security improvements quickly while spreading costs over time in a manageable way.

Don't wait for the perfect solution or for threats to materialize. As experts emphasize, AI capabilities are evolving every few weeks, and the defensive tools available today, while imperfect, are significantly better than waiting until after an attack occurs to realize the urgency of AI-enabled cybersecurity.


Reference: https://www.abc.net.au/news/2026-04-23/powerful-ai-tools-posing-cybersecurity-risks-australia-lagging/106584436


Ready to harness AI for your business? Infinitee Solutions helps businesses like yours transforming opportunities into measurable results without hassle. Contact us now.