:

UNAUTHORIZED USERS ACCESS ANTHROPIC'S MYTHOS MODEL

AI DESK2 MIN READ
WED, APR 22, 2026

■ AI-SUMMARIZED FROM 3 SOURCES BELOW

A small group of unauthorized users gained access to Anthropic's Mythos cybersecurity AI model through a third-party contractor portal, according to Bloomberg. The company is investigating the breach but says there is no evidence its systems were compromised.

Anthropic is looking into claims that unauthorized users accessed its Mythos model, a powerful AI tool designed to identify cybersecurity vulnerabilities. The group obtained access through a third-party contractor portal and used internet research techniques to gain entry, Bloomberg reported. The unauthorized access began around the time Anthropic announced the Mythos model. The group involved reportedly has no malicious intent and is simply testing the model's capabilities, according to a person familiar with the matter. When contacted by TechCrunch, Anthropic confirmed it is investigating the claims but emphasized that it has found no evidence of system compromise. The company did not provide additional details about the scope of the unauthorized access or how long it persisted. Mythos represents a significant development in AI-powered cybersecurity tools. The model's ability to detect security flaws makes it a high-value target, which adds urgency to Anthropic's investigation. The breach highlights ongoing security challenges for AI companies managing access to powerful models. Third-party contractor portals, while necessary for business operations, create potential vulnerability points that attackers and curious users can exploit. Anthropirc has not disclosed whether the unauthorized users remain able to access the model or if access has been revoked. The company also has not indicated whether it plans to enhance security protocols for its contractor portal or other systems. This incident comes as major AI companies face increasing scrutiny over model security and unauthorized access. Anthropic's response and findings from its investigation could influence how other organizations approach access control for sensitive AI systems.

■ SOURCES

TechmemeTechCrunchEngadget

■ SUMMARY WRITTEN BY AI FROM THE LINKS ABOVE

■ MORE FROM THE SECURITY DESK

A new Linux variant of the GoGra backdoor exploits Microsoft's legitimate infrastructure to evade detection, using Outlook inboxes as a covert command-and-control channel for payload delivery.

2H AGODev Desk

Major cyber insurers including QBE and Beazley are limiting coverage for losses and regulatory fines tied to artificial intelligence use and LLMjacking attacks, citing rapid technological advancement and emerging risks.

4H AGOAI Desk

GrapheneOS, widely regarded as the gold standard in mobile security, emerged from a legal dispute between lead developer Daniel Micay and his former partner James Donaldson over CopperheadOS ownership.

7H AGODev Desk

UK cybersecurity officials report that state-linked hackers from Iran and China are responsible for most "nationally significant" cyberattacks targeting British infrastructure and institutions.

11H AGOSecurity Desk

■ SUBSCRIBE TO THE DAILY BRIEF

ONE EMAIL, 5 STORIES, 06:00 UTC. UNSUBSCRIBE ANYTIME.