One of the most important aspects of this attack is how the attackers initially began collaborating with Claude. They did not exploit a software vulnerability or bypass authentication controls, but instead used prompt injection to circumvent the model’s defences:
“The key was role-playing: the attackers claimed to be employees of legitimate cybersecurity firms and convinced Claude that they were using it for cybersecurity penetration testing.”
Prompt injection, whereby attackers use instructions in queries to elicit malicious or undesirable behaviour from a model, is the number one risk in the OWASP Top 10 Risks for LLM applications, as it represents a potential ‘front door’ into corporate AI systems that requires robust protection.
CrowdStrike maintains the industry’s most comprehensive prompting taxonomy through its acquisition of Pangea, tracking over 150 different techniques. Enterprises that build and deploy their own AI systems must also recognise that these systems can be manipulated and weaponised through prompting.
Traditional security controls such as firewalls, antivirus software, and access controls do not protect against attackers who can successfully persuade an AI system to return information or perform an action contrary to its original purpose and limitations.
This requires a new set of security controls specifically designed for AI systems: to detect prompt injection, verify context, filter output, and monitor AI interaction behaviour. Enterprises must implement protective barriers that verify the legitimacy of requests, confirm that AI actions are consistent with authorised use cases, and detect manipulation of the AI system to perform unauthorised actions.
The attack surface has expanded to the semantic level. We have spent decades protecting endpoints, applications, networks, credentials, and cloud environments – now it’s time to protect this.
iIT Distribution is a distributor of CrowdStrike solutions in Ukraine, Eastern Europe, Central Asia, and the Baltics. CrowdStrike is an industry leader in cybersecurity, actively implementing advanced artificial intelligence technologies in its solutions.