Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Darktrace Flags 32 Million Phishing Emails in 2025 as Identity Attacks

February 26, 2026

Dell RecoverPoint for VMs Zero-Day CVE-2026-22769 Exploited Since Mid-2024

February 26, 2026

Google Disrupts ‘Prolific’ and ‘Elusive’ China-Linked Hacking Campaign

February 26, 2026
Facebook X (Twitter) Instagram
Thursday, February 26
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Chinese AI Firms Hit Claude with Distillation Attacks, Anthropic Warns
News

Chinese AI Firms Hit Claude with Distillation Attacks, Anthropic Warns

Team-CWDBy Team-CWDFebruary 26, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Generative AI firm Anthropic said three Chinese AI companies have generated millions of queries with the Claude large language model (LLM) in order to copy the model – a technique called ‘model distillation attack.’

In a new blog published on February 23, Anthropic said three GenAI labs based in China, DeepSeek, Moonshot and MiniMax, have generated over 16 million exchanges with Claude through approximately 24,000 fraudulent accounts, in violation of Anthropic’s terms of service and regional access restrictions.

Model distillation is a legitimate AI training method that involves training a less capable model on the outputs of a stronger one.

It can also be used maliciously to rapidly and inexpensively gain advanced capabilities from other labs, bypassing the significant time and resources required for independent development.

Beyond concerns about trade secrets and competitive advantage, Anthropic warned that illicitly distilled models can be used for malicious and harmful purposes that the original owner of the stolen model has built guardrails against, such as developing bioweapons or carrying out malicious cyber activities, and thus create security risks.

“Foreign labs that distill American models can then feed these unprotected capabilities into military, intelligence, and surveillance systems, enabling authoritarian governments to deploy frontier AI for offensive cyber operations, disinformation campaigns and mass surveillance,” the Anthropic blog noted.

Anthropic does not currently offer commercial access to Claude in China or to subsidiaries of Chinese companies located outside of the country for security reasons.

How Anthropic Fights Against Distillation Attacks

While the three distillation campaigns pursued different goals (e.g. improving agentic reasoning or coding capabilities), they all followed a similar playbook, using fraudulent accounts and proxy services to access Claude at scale while evading detection.

The volume, structure and focus of the prompts used by DeepSeek, Moonshot and MiniMax were distinct from normal usage patterns, reflecting deliberate capability extraction rather than legitimate use, Anthropic said.

The US-based GenAI company attributed the campaigns based on IP address correlation, request metadata, infrastructure indicators and reports of similar behaviors from industry partners.

To prevent and mitigate illicit distillation attacks targeting Claude, Anthropic implemented the following security controls:

  • Detection systems to identify attack patterns in API traffic
  • Tools to detect chain-of-thought elicitation and coordinated account activity
  • Stronger verification for high-risk accounts (educational, research, startups)
  • Product, API and model-level safeguards to reduce misuse



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleNotepad++ Fixes Hijacked Update Mechanism Used to Deliver Targeted Malware
Next Article 3 Ways to Start Your Intelligent Workflow Program
Team-CWD
  • Website

Related Posts

News

Darktrace Flags 32 Million Phishing Emails in 2025 as Identity Attacks

February 26, 2026
News

Dell RecoverPoint for VMs Zero-Day CVE-2026-22769 Exploited Since Mid-2024

February 26, 2026
News

Global Cyber Agencies Urge Immediate Patching of Cisco SD-WAN Zero Day

February 26, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Why you should never pay to get paid

September 15, 2025

Drowning in spam or scam emails lately? Here’s why

January 27, 2026

‘What happens online stays online’ and other cyberbullying myths, debunked

September 11, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.