您的浏览器禁用了JavaScript(一种计算机语言,用以实现您与网页的交互),请解除该禁用,或者联系我们。 [贝恩]:Claude Mythos和人工智能网络安全唤醒电话 - 发现报告

Claude Mythos和人工智能网络安全唤醒电话

信息技术 2026-04-21 贝恩 金栩生
报告封面

A business risk of the highest order, not a technologyproblem to be delegated downward. By Frank Ford, Andrew Cousins, Syed Ali, and Alexandra Juegelt Claude Mythos and the AI Cybersecurity W ake-Up Call At a Glance `The launch of Claude Mythos is a signal, not the threat itself. Multiple frontier AI models alreadyenable sophisticated cyberattacks, and the era of AI-powered attacks at scale has arrived. `AI does not create new vulnerabilities, it exposes existing ones, making the chronicunderinvestment that boards have tolerated for years an immediate and material business risk. `Many organizations will need to significantly increase cybersecurity spending, by up to twotimes their current levels or even more; planned increases of about 10% annually fall far short ofwhat the threat now demands. `The immediate priority is strengthening cybersecurity fundamentals: Strong foundationsprovide significant protection against AI-enabled attacks, and most organizations urgentlyneed to build those foundations. Claude Mythos Preview is Anthropic’s most powerful AI model to date, and its cybersecurity implicationsare serious. But Mythos is not the real problem. Other frontier AI models—including OpenAI’s GPT-5.4-Cyber and Google’s Big Sleep—have some comparable capabilities already, and more will follow.The era of AI-enabled attacks is here, and organizations cannot afford to be reactive. Most companies have significantly underinvested in cybersecurity, a direct result of boards and executiveteams repeatedly deprioritizing it. This has created deep underlying weaknesses that AI-enabled attackswill rapidly expose. Unfortunately, for some businesses the consequences of chronic underfunding andinsufficient leadership engagement will be severe. The risk is particularly acute in businesses with significant operational technology environments,in industries such as energy, utilities, manufacturing, water, and transportation. Many of these systemsare decades old, cannot be patched effectively, and are highly vulnerable to AI-enabled attack. Closing theinvestment gap will require far more than incremental budget increases. Based on our experience helpinglarge organizations address their cybersecurity requirements, many will need to increase spending by upto two times their current levels or more. Yet most currently plan increases of about 10% annually, Bain &Company’s 2025 Cybersecurity Survey finds. The time to act is now. A top priority for many companies is building the essential depth of defenseneeded to resist AI-enabled attacks effectively. That typically requires establishing a dedicated AI threatwar room and strengthening cyber fundamentals across the organization. Alongside addressing the AIthreat, organizations must also prepare for other developing risks. Quantum computing will underminemany of today’s encryption approaches, introducing an entirely new category of cybersecurity risk.Bain’s view is that organizations need to be quantum-ready by 2030—and most have not yet started. Claude Mythos and the AI Cybersecurity W ake-Up Call What is Claude Mythos, and why should organizations act now? Mythos was not built as a cyberattack tool. It was designed to push the boundaries of softwareengineering, creating an AI capable of working with vast, complex codebases in ways previous modelscould not. In essence, Anthropic set out to build the ultimate developer. It is precisely those capabilities, however, that make Mythos and AI models with similar capabilitiesa significant security concern. Anthropic describes Mythos as “a new class of intelligence builtfor ambitious projects focusing on cybersecurity, autonomous coding, and long-running agents,”and the same innovations that make it a powerful engineering tool also make it a formidable instrumentfor finding and exploiting vulnerabilities. Mythos has a fundamentally different architecture from its predecessors, which enables four capabilitiesparticularly relevant to cybersecurity. It can understand the intent of code and find hidden flaws viaa simple instruction; it can chain multiple small vulnerabilities into a single devastating attack; it canreconstruct source code from deployed software to find exploitable weaknesses; and once insidea network, it can automatically map systems, move laterally, and build custom tools to extract data,all within hours. Some of the key technical innovations that distinguish Mythos from previous AI models include: •Infinite context window.Mythos can ingest and reason across an entire codebase or systemsimultaneously, linking all elements without limitation, enabling a depth of analysispreviously impossible. •Recursive self-correction.It observes results, adjusts its approach, and retries—fully automatically—until it finds an approach that works.•Native system tool integration.Mythos can launch debuggers and interact directly with systemsit is analyzing, transforming it from a reasoning engine into an active agent.•Agentic sca