Unknown Group Accesses Claude Mythos Without Authorization

Anthropic confirmed an investigation into unauthorized access to the preview of Claude Mythos through a third-party vendor environment. Reported evidence, including a live demo and screenshots, was shared with Bloomberg by an anonymous group that says it obtained access by combining data from a breach at the AI training startup Mercor with insider access via a contractor and automated GitHub sleuthing. The group claims benign intent, but the incident exposes a serious supply-chain and vendor-security risk around powerful, unreleased foundation models and highlights how leaked credentials and breached datasets can be chained to discover and exploit model endpoints.
What happened
Anthropic confirmed it is investigating a report of unauthorized access to the preview of Claude Mythos, saying the access occurred through one of its third-party vendor environments. Bloomberg reviewed a live demo and screenshots supplied by an anonymous group that claims it has been using Claude Mythos since April 7. The group says it combined leaked data from Mercor with an employee-level connection at an Anthropic contractor and automated reconnaissance to find the model endpoint.
Technical details
The reported attack chain is low-sophistication but high-impact: the adversary used accessible tooling and breached datasets rather than an advanced zero-day. Reported components include:
- •automated bots scanning GitHub for config or credential leaks
- •leveraging a breach at Mercor, an AI training startup, to harvest relevant metadata
- •using insider-level access at a third-party contractor to correlate hints and guess an endpoint
- •accessing the Claude Mythos preview via a vendor-hosted environment
These steps show the classic composition risk: leaked artifacts plus vendor access can reveal hidden endpoints even when a model itself is not publicly published.
Context and significance
This is not just a single-company embarrassment. The incident crystallizes systemic problems around model previews, vendor trust boundaries, and operational hygiene for cutting-edge models. Anthropic positioned Claude Mythos as a high-impact model; unauthorized access to a preview raises questions about environment isolation, credential rotation, artifact scanning, and the security posture of contractors and suppliers. It also illustrates how adversaries can chain seemingly minor leaks into full access to sensitive infrastructure.
What to watch
Assessments from Anthropic on root cause and remediation will matter most: whether this was credential scraping, misconfigured access controls, or a leak in vendor environment provisioning. Practitioners should expect renewed emphasis on vendor risk assessments, secrets scanning, segmented staging environments, and stricter controls for preview access to high-capability models.
Scoring Rationale
This is a notable security incident because it involves an advanced foundation model and demonstrates how vendor and supply-chain weaknesses can expose high-impact models. The breach appears operational rather than architectural, so it is serious but not yet a platform-level compromise.
Practice interview problems based on real data
1,500+ SQL & Python problems across 15 industry datasets — the exact type of data you work with.
Try 250 free problemsStep-by-step roadmaps from zero to job-ready — curated courses, salary data, and the exact learning order that gets you hired.


