Remix.run Logo
JKCalhoun 13 hours ago

Do public reports like this one often go deep enough into the weeds to name names, list specific tools and techniques, URLs?

I don't doubt of course that reports intended for government agencies or security experts would have those details, but I am not surprised that a "blog post" like this one is lacking details.

I just don't see how one goes from "this is lacking public evidence" to "this is likely a political stunt".

I guess I would also ask the skeptics (a bit tangentially, I admit), do you think what Anthropic suggested happened is in fact possible with AI tools? I mean are you denying that this is could even happen or just that Anthropic's specific account was fabricated or embellished?

Because if the whole scenario is plausible that should be enough to set off alarm bells somewhere.

snowwrestler 10 hours ago | parent | next [-]

There’s a big jump between “the attack came from China” and “the attack was sponsored by the Chinese government.” People generally make this jump in one of three ways.

1) Just a general assumption that all bad stuff from China must be state-sponsored because it’s generally a top-down govt-controlled society. This is not accurate and not really actionable for anyone in the U.S.

2) The attack produced evidence that aligns with signatures from “groups” that are already widely known / believed to be Chinese state sponsored, AKA APTs. In this case, disclosing the new evidence is fine since you’re comparing to, and hopefully adding to, signature data that is already public. It’s considered good manners to contribute to the public knowledge from which you benefited.

3) Actual intelligence work by government agencies like FBI, NSA, CIA, DIA, MI6, etc. is able to trace the connections within Chinese government channels. Obviously this is usually reserved for government statements of attribution and rarely shared with commercial companies.

Hopefully Anthropic is not using #1, and it’s unlikely they are benefiting from #3. So why not share details a la #2?

Of course it’s possible and plausible for people to be using Claude for attacks. But what good does saying that do? As the article says: defenders need actionable, technical attack information, not just a general sense of threat.

thinkingemote 10 hours ago | parent | next [-]

#3 much intelligence is to the benefit of industry and commercial companies. To a country their economy is their country. After the end of the cold war most state espionage was focused on industry. Sharing is possibly common but secret. The lack of details in the report to me smells of "we are not allowed to share the details". (It also smells of that law to attribute incompetence and not lies)

Now anthropic is new and I don't know how embedded they are with their hosts government compared to a FANG etc but I wouldn't discount some of #3

(If you see an American AI company requiring security clearance that gives a good indication of some level of state involvement. But it might also be just selling their software to a peaceful internal department...)

gishh 9 hours ago | parent | prev [-]

[flagged]

tehjoker 8 hours ago | parent [-]

this has to be satire

woooooo 12 hours ago | parent | prev | next [-]

There's an incentive to blame "Chinese/Russian state sponsored actors" because it makes them less culpable than "we got owned by a rando".

It's like the inverse of "nobody got fired for using IBM" -- "nobody can blame you for getting hacked by superspies". So, in the absence of any evidence, it's entirely possible they have no idea who did it and are reaching for the most convenient label.

JKCalhoun 12 hours ago | parent | next [-]

That's fair. If the actor (and it's a Chinese state actor here) is what is being questioned as "bullshit" then that should be the discourse in the article and in this thread.

Instead the lack of a paper trail from Anthropic seems to be having people questioning the whole event?

hnthrowaway747 11 hours ago | parent | next [-]

Exactly, and anyone without even needing much evidence to do so.

It’s allowed in the current day and time to criticize someone else for not providing evidence, even when that evidence would make it easier for the attackers to tune their attack to prevent being identified, and everyone will be like “Yeah, I’m mad, too! Anthropic sucks!” When in the process that only creates friction for the only company that’s spent significant ongoing effort to prevent an AI disasters by trying to be the responsible leader.

I’ve really had my fill of the current climate where people are quick to criticize an easy target just because they can rally anger. Anyone can rally anger. If you must rally anger, it should be against something like hypocrisy, not because you just get mad at things that everyone else hates.

dangus 8 hours ago | parent | prev [-]

State sponsorship can include the state looking the other way.

spopejoy 3 hours ago | parent | next [-]

Not really? APTs would seem to be either criminal enterprises or state-sponsored because SOMEBODY has to be paying the big bucks.

So yes, probably 100% of criminal enterprises are paying off officials, but if that's the definition of "state sponsored" then the term loses any meaning.

EDIT I guess there's also "legit" businesses like Palantir/NSO group, but I would argue any firm like that is effectively state-sponsored as they are usually revolving doors with NSA-type agencies, the military etc.

brookst 8 hours ago | parent | prev [-]

So all attacks anywhere are state sponsored?

oarsinsync 7 hours ago | parent [-]

> > State sponsorship can include the state looking the other way.

> So all attacks anywhere are state sponsored?

There's a difference between a deliberate decision to look away, and unawareness through lack of oversight.

You steal candy from a store. There's a difference between the security guard seeing you and deliberately looking away, compared to just not seeing you at all.

6 hours ago | parent [-]
[deleted]
jsnell 7 hours ago | parent | prev [-]

> There's an incentive to blame "Chinese/Russian state sponsored actors" because it makes them less culpable than "we got owned by a rando".

But they didn't get hacked by anyone. I don't see how that applies.

WNWceAJ9R9Ezc4 8 hours ago | parent | prev | next [-]

> Do public reports like this one often go deep enough into the weeds to name names, list specific tools and techniques, URLs?

Yes, it is very standard. Anthropic did none of that. Case in point:

- https://cloud.google.com/blog/topics/threat-intelligence/apt...

- https://www.crowdstrike.com/en-us/blog/two-birds-one-stone-p...

- https://media.defense.gov/2021/Apr/15/2002621240/-1/-1/0/CSA...

cmiles74 11 hours ago | parent | prev | next [-]

The report itself reads like a humblebrag at best, marketing materials at worst. I have to agree with the OP: taking this report at face value requires that you trust Anthropic, a lot.

Their August threat intelligence report struck similar chords.

https://www-cdn.anthropic.com/b2a76c6f6992465c09a6f2fce282f6...

rfoo 12 hours ago | parent | prev | next [-]

> Do public reports like this one often go deep enough into the weeds to name names

Yes. They often include IoCs, or at the very least, the rationale behind the attribution, like "sharing infrastructure with [name of a known APT effort here]".

For example, here is a proper decade-old report from the most unpopular country right now: https://media.kasperskycontenthub.com/wp-content/uploads/sit...

It established solid technical links between the campaign they are tracking to earlier, already attributed campaigns.

So, even our enemy got this right, ten years ago, there really is no excuse for this slop.

zaphirplane 12 hours ago | parent | prev | next [-]

Not vested in the argument but it stood out to me that, Your argument is similar to tv courts if it’s plausible the report is true. Very far from the report is credible

JKCalhoun 12 hours ago | parent [-]

You're right, lacking information I am coming across as instead willing to give Entropic the benefit of the doubt here.

But I'm also often a Devil's Advocate and the tide in this thread (well, the very headline as well) seemed to be condemning Anthropic.

dangus 8 hours ago | parent [-]

Honest companies with good reputations tend to get the benefit of the doubt.

E.g., how much do you expect Costco or Valve to intentionally harm their customers compared to Comcast or Electronic Arts? That’s just the old school concept of reputation at work. Companies can “buy” benefit of the doubt by being genuine and avoiding blowing smoke up people’s ass.

Anthropic has been spitting bullshit about how the AGI they’re working on is so smart it’s dangerous. So those chumps having no answers when they get hacked smells like something.

Are they telling us their magical human AGI brain and their security professionals being paid top industry rates can’t trace what happened in a breach?

freehorse 7 hours ago | parent | prev | next [-]

> Do public reports like this one often go deep enough into the weeds to name names, list specific tools and techniques, URLs?

This is literally answered in the second subsection of the linked article ("where are the IoCs, Mr.Claude ?").

9 hours ago | parent | prev | next [-]
[deleted]
rdiddly 7 hours ago | parent | prev [-]

The complaint is that there's no actionable information whatsoever. Alarm bells are just noise.