Discord侦探未经授权获取了Anthropic公司“神话”系统的访问权限

qimuai 发布于 阅读:11 一手编译

Discord侦探未经授权获取了Anthropic公司“神话”系统的访问权限

内容来源:https://www.wired.com/story/security-news-this-week-discord-sleuths-gained-unauthorized-access-to-anthropics-mythos/

内容总结:

网络安全领域一周动态速览

AI模型助力漏洞修补:Mozilla利用Anthropic工具修复271个安全漏洞
周二,Mozilla宣布借助Anthropic公司的“Mythos Preview”AI模型提前访问权限,在其新版Firefox 150浏览器中发现了271个漏洞并完成修复。与此同时,研究人员发现一群“中等成功水平”的朝鲜黑客正利用AI技术进行从编写恶意代码到搭建虚假公司网站的全流程操作,三个月内窃取资金高达1200万美元。

古老恶意软件被破解:或曾用于针对伊朗核计划
研究人员成功破解了名为“Fast16”的破坏性恶意软件。该软件问世于2005年,比著名的“震网”病毒更早,可能曾被美国或其盟友用于攻击伊朗核项目。

Meta遭遇诉讼:美国消费者联合会控告其虚假广告问题
美国非营利组织“消费者联合会”对Meta提起诉讼,指控Facebook和Instagram平台上的诈骗广告泛滥,且Meta在打击这些广告方面误导消费者。此外,一项允许联邦调查局在无授权情况下查看美国人通讯的监控项目面临续期争议,两党议员在下一步行动上陷入僵局;新提出的法案虽试图回应议员关切,但缺乏实质性内容。

深度调查:GrapheneOS隐私系统内斗与神秘间谍案
《连线》杂志深度调查了知名隐私安全移动操作系统GrapheneOS背后长达数年的团队内讧,并披露了中国间谍监视美国花样滑冰选手刘美贤及其父亲的离奇故事。


更多热点新闻:

Discord侦探绕过权限,非法访问Anthropic AI模型
尽管Anthropic对Mythos Preview模型的访问权限严格限制,一群Discord用户通过简单侦察手段成功获取了访问权。他们利用AI训练初创公司Mercor数据泄露的信息,推测出模型的网络地址,并借助为Anthropic合作承包商工作获得的现有权限,最终不仅接触到Mythos,还访问了其他未发布模型。报道称,该团队目前仅用该模型搭建简单网站,以避免被检测。

监控公司利用老旧电信协议漏洞从事间谍活动
公民实验室发现,至少两家商业监控公司利用电信协议SS7及其下一代协议漏洞,通过接入三家小型电信运营商(以色列019Mobile、英国Tango Mobile、泽西岛Airtel Jersey)的权限,对“高价值目标”的定位信息进行非法追踪。研究人员警告,此类漏洞在全球范围内仍是手机监控的潜在通道。

美国司法部起诉两名涉嫌诈骗园区管理者
美国司法部宣布对两名中国公民姜文杰和黄星山提起指控,称其涉嫌在缅甸管理诈骗园区,并试图在柬埔寨开设第二个据点。二人今年早些时候在泰国被捕,现被指通过虚假招聘诱骗人口贩卖受害者,强迫其利用加密货币投资骗局对美国等国民众实施诈骗,涉案金额达数百万美元。美方已冻结相关账户约7亿美元资金,并查封了用于诱骗受害者的Telegram频道。

英国50万份健康数据遭泄露,在阿里巴巴平台被挂牌售卖
英国政府与非营利组织UK Biobank披露,三家科研机构违反合同,在阿里巴巴平台上出售英国公民的健康信息,涉及超过50万名研究对象的医疗影像、基因数据及病历。目前涉事机构账号已被暂停,相关商品信息已下架。

苹果修复推送通知漏洞:FBI此前可由此获取Signal加密消息
本月早些时候,有媒体报道称FBI曾利用iOS推送通知数据库的存储机制,在嫌疑人手机中获取已删除Signal应用的加密消息内容。苹果现已发布iOS/iPadOS安全更新,修复了“通知标记删除后意外保留”的漏洞。专家提醒,即便端到端加密应用如Signal能保护传输中的数据,一旦设备被他人物理接触并解锁,所有内容仍有泄露风险。

中文翻译:

研究人员和从业者正在讨论新AI模型对网络安全的影响之际,Mozilla周二宣布,它利用Anthropic旗下Mythos Preview的早期访问权限,在其新版Firefox 150浏览器发布前发现并修复了271个漏洞。与此同时,研究人员发现一群中等水平的朝鲜黑客正在利用AI从事各种活动,从编写恶意软件到创建虚假公司网站——三个月内盗取了高达1200万美元。

研究人员终于破解了名为Fast16的破坏性恶意软件,该软件出现时间早于震网病毒,可能曾被用于攻击伊朗核计划。它于2005年创建,极有可能由美国或其盟国部署。

美国消费者联合会(一家非营利组织)正在起诉Meta,原因是Facebook和Instagram上的诈骗广告,以及该公司涉嫌在打击这些广告的努力方面误导消费者。美国一项允许联邦调查局在没有搜查令的情况下查看美国人通信内容的监控项目即将面临续期,但立法者就下一步行动陷入僵局。一项新法案旨在解决立法者日益增长的担忧,但缺乏实质内容。

如果你想深入了解,《连线》调查了备受瞩目的注重隐私和安全的移动操作系统GrapheneOS背后持续多年的恩怨。此外,我们还探讨了中国如何监视美国花样滑冰运动员刘美贤及其父亲这一离奇故事。

还有更多。每周,我们都会汇总我们未深入报道的安全和隐私新闻。点击标题阅读完整故事。保持安全,各位。

Discord侦探未经授权访问Anthropic的Mythos AI工具

Anthropic的Mythos Preview AI模型被誉为一种极其危险的、能够发现软件和网络漏洞的工具,其强大程度甚至让创造者严格限制了它的发布。但Discord上的一群业余侦探找到了自己的相对简单的方法——不需要AI黑客技术——来未经授权获取一个令人垂涎的数字奖品:Mythos本身。

尽管Anthropic努力控制谁能使用Mythos Preview,一群Discord用户还是通过一些相当简单的侦探工作获得了该工具的访问权限:他们检查了最近一次Mercor(一家与开发者合作的AI培训初创公司)数据泄露事件中的数据,并“根据对Anthropic为其他模型所用格式的了解,对模型的在线位置做出了合理推断”——据最先报道此事的彭博社称,许多观察人士猜测这指的是一个网页URL。

据报道,此人还利用他们因在一家Anthropic分包公司工作而已经拥有的权限,访问了Anthropic的其他模型。然而,由于他们的探查,他们不仅获得了Mythos的访问权限,还获得了其他未发布的Anthropic AI模型。幸运的是,据彭博社报道,访问Mythos的团队到目前为止只用它来构建简单的网站——这一决定旨在防止被Anthropic发现——而不是入侵全球。

监控公司正利用存在一年的电信漏洞进行间谍活动

安全研究人员长期以来一直警告称,被称为7号信令系统(SS7)的电信协议(这些协议管理着电话网络如何相互连接以及如何路由电话和短信)容易受到滥用,从而允许秘密监控。本周,数字权利组织公民实验室的研究人员透露,至少有两家营利性监控供应商实际上利用了这些漏洞——或下一代电信协议中的类似漏洞——对真实受害者进行监控。公民实验室发现,两家监控公司实际上充当了流氓电话运营商,利用对三家小型电信公司(以色列运营商019Mobile、英国手机提供商Tango Mobile和位于英吉利海峡泽西岛的Airtel Jersey)的访问权限来追踪目标手机的位置。公民实验室的研究人员表示,这两家监控公司追踪了“知名”人士,但拒绝透露公司名称或目标对象。研究人员还警告说,他们发现的这两家滥用协议的公司可能并非孤例,全球电信协议的漏洞仍然是全球手机监控的一个非常真实的载体。

两名涉嫌东南亚诈骗园区管理者被起诉

美国司法部本周宣布对两名中国男子提起指控,罪名是涉嫌帮助管理缅甸的一个诈骗园区,并试图在柬埔寨开设第二个园区——这表明美国执法部门对东南亚以人口贩卖为燃料的庞大诈骗犯罪行业的打击力度正在加大,尽管为时已晚。据检察官称,姜文杰和黄兴山今年早些时候在泰国因移民罪名被捕,现在又面临指控,他们涉嫌运营一个庞大的诈骗团伙,通过虚假工作邀请诱骗人口贩卖受害者进入其园区,然后强迫他们对包括美国人在内的受害者进行诈骗,通过加密货币欺诈投资骗取数百万美元。美国司法部还表示,它已“冻结”了属于该团伙的7亿美元资金——基本上是冻结这些资金以备没收——并查封了即时通讯应用Telegram上的一个频道,检察官称该频道被用来诱骗和奴役人口贩卖受害者。司法部的声明称,黄亲自参与了对一个园区内工人的体罚,而姜曾一度负责监督从一名美国诈骗受害者手中盗取300万美元。

50万份英国健康记录在阿里巴巴上挂牌出售

英国政府和英国非营利组织UK Biobank本周透露,已有三家科研机构被发现通过阿里巴巴出售英国公民的健康信息。在过去二十年里,超过50万人与UK Biobank分享了他们的健康数据——包括医学影像、基因信息和医疗记录——UK Biobank允许世界各地的科学家访问这些信息以进行医学研究。然而,该慈善机构表示,数据泄露涉及这三家组织违反了所签署的合同,其中一个待售的数据集据信包含了所有50万研究对象的数据。它没有详细说明待售数据的具体类型,但表示已暂停了那些被指控出售信息人员的UK Biobank账户。相关数据广告也已被移除。

苹果修复漏洞,该漏洞曾允许FBI获取来自Signal的推送通知

本月初,404 Media报道称,FBI能够从一名被告的iPhone上获取Signal消息的副本,因为这些消息的内容(在Signal内部是加密的)被保存在iOS推送通知数据库中。在这种情况下,即使Signal已从手机上删除,这些消息的副本仍然可被访问——不过该问题影响了所有发送推送通知的应用程序。

本周,苹果针对该问题发布了iOS和iPadOS安全更新以修复此漏洞。“标记为删除的通知可能会意外保留在设备上,”苹果针对iOS 26.4.2的安全更新说明中写道。“通过改进的数据编辑功能解决了日志记录问题。”

虽然问题已得到修复,但仍然有必要更改设备上通知中显示的内容。对于Signal,你可以打开应用程序,进入“设置”、“通知”,然后将通知切换为仅显示名称或不显示名称或内容。这再次提醒我们,虽然像Signal这样的应用程序是端到端加密的,但这仅适用于数据在设备之间传输时的内容:如果有人能够物理访问并解锁你的手机,他们就有可能访问你设备上的所有内容。

英文来源:

As researchers and practitioners debate the impact that new AI models will have on cybersecurity, Mozilla said on Tuesday it used early access to Anthropic's Mythos Preview to find and fix 271 vulnerabilities in its new Firefox 150 browser release. Meanwhile, researchers identified a group of moderately successful North Korean hackers using AI for everything from vibe coding malware to creating fake company websites—stealing up to $12 million in three months.
Researchers have finally cracked disruptive malware known as Fast16 that predates Stuxnet and may have been used to target Iran’s nuclear program. It was created in 2005 and was likely deployed by the US or an ally.
Meta is being sued by the Consumer Federation of America, a nonprofit, over scam ads on Facebook and Instagram and allegedly misleading consumers about the company’s efforts to combat them. A United States surveillance program that lets the FBI view Americans’ communications without a warrant is up for renewal, but lawmakers are deadlocked on next steps. A new bill aims to address mounting lawmaker concerns, but lacks substance.
And if you’re looking for a deep dive, WIRED investigated the yearslong feud behind the prominent privacy and security conscious mobile operating system GrapheneOS. Plus we looked at the strange tale of how China spied on US figure skater Alysa Liu and her dad.
And there’s more. Each week, we round up the security and privacy news we didn’t cover in depth ourselves. Click the headlines to read the full stories. And stay safe out there.
Discord Sleuths Gained Unauthorized Access to Anthropic’s Mythos AI Tool
Anthropic’s Mythos Preview AI model has been touted as a dangerously capable tool for finding security vulnerabilities in software and networks, so powerful that its creator has carefully restricted its release. But one group of amateur sleuths on Discord found their own, relatively simple ways—no AI hacking required—to gain unauthorized access to a coveted digital prize: Mythos itself.
Despite Anthropic’s efforts to control who can use Mythos Preview, a group of Discord users gained access to the tool through some straightforward relatively detective work: They examined data from a recent breach of Mercor, an AI training startup that works with developers, and “made an educated guess about the model’s online location based on knowledge about the format Anthropic has used for other models”—a phrase that many observers have speculated refers to a web URL—according to Bloomberg, which broke the story.
The person also reportedly took advantage of permissions they already possessed to access other Anthropic models, thanks to their work for an Anthropic contracting firm. As a result of their probing, however, they allegedly gained access to not only Mythos but other unreleased Anthropic AI models, too. Thankfully, according to Bloomberg, the group that accessed Mythos has only used it so far to build simple websites—a decision designed to prevent its detection by Anthropic—rather than hack the planet.
Surveillance Firms Are Exploiting Year-Old Telecom Vulnerabilities for Spying
Security researchers have long warned that the telecom protocols known as Signaling System 7, or SS7, which govern how phone networks connect to one another and route calls and texts, are vulnerable to abuse that would allow surreptitious surveillance. This week researchers at the digital rights organization Citizen Lab revealed that at least two for-profit surveillance vendors have actually used those vulnerabilities—or similar ones in the next generation of telecom protocols—to spy on real victims. Citizen Lab found that two surveillance firms had essentially acted as rogue phone carriers, exploiting access to three small telecom firms—Israeli carrier 019Mobile, British cell provider Tango Mobile, and Airtel Jersey, based on the island of Jersey in the English Channel—to track the location of targets’ phones. Citizen Lab’s researchers say that “high-profile” people were tracked by the two surveillance firms, though it declined to name either the firms or their targets. Researchers warn, too, that the two companies they discovered abusing the protocols are likely not alone, and that the vulnerability of global telecom protocols remains a very real vector for phone spying worldwide.
2 Alleged Southeast Asian Scam Compound Managers Charged
In a sign of a growing—if belated—crackdown by US law enforcement on the sprawling criminal industry of human-trafficking-fueled scam compounds across Southeast Asia, the Department of Justice this week announced charges against two Chinese men for allegedly helping to manage a scam compound in Myanmar and seeking to open a second compound in Cambodia. Jiang Wen Jie and Huang Xingshan were both arrested in Thailand earlier this year on immigration charges, according to prosecutors, and now face charges for allegedly running a vast scamming operation that lured human trafficking victims to their compound with fake job offers and then forced them to scam victims, including Americans, for millions of dollars with cryptocurrency fraudulent investments. The DOJ says it also “restrained” $700 million in funds belonging to the operation—essentially freezing the funds in preparation for seizure—and also seized a channel on the messaging app Telegram prosecutors say was used to bait and enslave trafficking victims. The Justice Department’s statement claims that Huang personally took part in the physical punishment of workers in one compound, and that Jiang at one point oversaw the theft of $3 million from a single US scam victim.
500,000 UK Health Records Listed for Sale on Alibaba
Three scientific research institutions have been found selling British citizens’ health information on Alibaba, the British government and the nonprofit UK Biobank revealed this week. Over the last two decades, more than 500,000 people have shared their health data—including medical images, genetic information, and health care records—with UK Biobank, which allows scientists around the world to access the information to conduct medical research. However, the charity said the data leak involved a “breach of the contract” signed by three organizations, with one of the datasets for sale believed to have included data on all half-million research subjects. It did not detail the full types of data that were listed for sale but said it has suspended the Biobank accounts of those allegedly selling the information. The ads for the data have also been removed.
Apple Fixes Bug That Allowed FBI to Get Push Notifications From Signal
Earlier this month, 404 Media reported that the FBI was able to get copies of Signal messages from a defendant’s iPhone as the content of the messages, which are encrypted within Signal, were saved in an iOS push notification database. In this instance, the copies of the messages were still accessible even though Signal had been removed from the phone—though the issue affected all apps that send push notifications.
This week, in response to the issue, Apple released an iOS and iPadOS security update to fix the flaw. “Notifications marked for deletion could be unexpectedly retained on the device,” Apple’s security update for iOS 26.4.2 says. “A logging issue was addressed with improved data redaction.”
While the issue has been fixed, it is still worth changing what appears in notifications on your device. For Signal you can open the app, go to Settings, Notifications, and toggle notifications to show Name Only or No Name or Content. It is another reminder that while apps such as Signal are end-to-end encrypted, this applies to the content as it moves between devices: If someone can physically access and unlock your phone, there is the potential they can access everything on your device.

连线杂志AI最前沿

文章目录


    扫描二维码,在手机上阅读