Tuesday 24 March, 2026
[email protected]
Resilience Media
  • About
  • News
  • Resilience Conference
    • Resilience Conference Warsaw 2026
    • Resilience Conference Copenhagen 2026
    • Resilience Conference London 2026
  • Guest Posts
    • Author a Post
  • Subscribe
No Result
View All Result
  • About
  • News
  • Resilience Conference
    • Resilience Conference Warsaw 2026
    • Resilience Conference Copenhagen 2026
    • Resilience Conference London 2026
  • Guest Posts
    • Author a Post
  • Subscribe
No Result
View All Result
Resilience Media
No Result
View All Result

The Chinese GTG-1002 espionage campaign is an AI security wake-up call

Cybersecurity teams are up against an AI onslaught, and the only way to defend will be to fight fire with fire

Ben Van RoobyBen Van Roo
December 12, 2025
in Guest Posts
Photo by Anthony Cantin on Unsplash

Photo by Anthony Cantin on Unsplash

Share on Linkedin

In September, a Chinese state-sponsored group ran a cyber-espionage campaign where off-the-shelf artificial intelligence tooling was believed to have performed nearly all the tactical work.

You Might Also Like

The UK is on the precipice of geopolitical and military irrelevance

Is defence tech a ‘proper’ VC-backable vertical?

The dangerous economics of drone warfare

According to a report from Anthropic, malicious hackers used Anthropic’s Claude Code AI and other commodity tech to conduct reconnaissance, discover vulnerabilities, write exploits, harvest credentials, move laterally through networks, and exfiltrate data. Human operators intervened at perhaps five or six decision points across the entire operation, it noted. What would have taken elite hackers months was compressed into hours.

This should be a five-alarm fire for every security leader in government and enterprise.

Anthropic described the campaign – dubbed GTG-1002 when it first wrote about it publicly in November – as the first documented case of a cyberattack largely executed without human intervention at scale. The targets included major technology corporations, financial institutions, chemical manufacturers, and government agencies, and some intrusions succeeded.

As destructive as GTG-1002 may have been, what’s as significant here is what this reveals about the future.

The attackers processed thousands of requests per second. Anthropic described this as a tempo physically impossible for human operators. The AI worked autonomously for hours while its human handlers spent perhaps twenty minutes reviewing progress and authorizing escalation. One operator with AI orchestration achieved the output of an entire advanced persistent threat team.

We have spent decades thinking about cyberattacks as campaigns. They have beginnings and ends. Attackers probe, infiltrate, exfiltrate, and disappear. Defenders investigate, patch, and recover. The cadence is episodic, like warfare has always been.

AI agents change the grammar of conflict. They compress time. They scale without adding personnel. They operate at speeds that render human cognition a bottleneck.

Consider what the GTG-1002 attackers actually used.

According to Anthropic, the campaign relied on commodity penetration tools: network scanners, password crackers, exploitation frameworks – all widely available. The sophistication came from orchestration. The AI coordinated these ordinary instruments into an extraordinary capability. As Anthropic noted, cyber capability now derives from orchestrating cheap, available resources rather than from technical innovation.

This accessibility is the alarming part. Traditional nation-state operations require teams of skilled operators, custom malware development, zero-day research, and patient attention over months or years. GTG-1002 demonstrated a different cost structure. A small, AI-literate team with basic hacking knowledge could have executed something similar. The barrier to conducting elite-level operations has collapsed.

The implications extend beyond cybersecurity. The GTG-1002 campaign offers a preview of how AI agents will reshape any domain where speed and scale matter. In areas like intelligence gathering, logistics, and research, the pattern is the same: tasks that once required large teams working over long periods can now be compressed, automated, and run continuously.

The cybersecurity industry has recognized this shift. Companies like Darktrace, CrowdStrike, and SentinelOne already deploy AI-driven threat detection, automated incident response, and continuous monitoring systems.

These defensive capabilities have matured significantly over recent years. Yet GTG-1002 demonstrates that offensive AI has evolved just as rapidly. The concerning development is not that AI entered cybersecurity—that happened years ago—but that state actors now orchestrate AI agents at a scale and sophistication that even advanced defensive systems struggle to match.

Anthropic’s analysis highlighted a critical asymmetry: while defensive AI must protect everywhere, offensive AI needs to succeed only once. The attackers in GTG-1002 exploited this fundamental disadvantage, using AI to probe thousands of potential entry points simultaneously until finding weakness.

This reshapes how we should think about the role of humans in contested systems. In the tactical execution phase, humans are simply too slow. Their reaction times, their need for sleep, their cognitive limits all become liabilities when adversaries operate at processor speed. The successful posture pushes humans up the stack, to the strategic layer where they set policy and define boundaries. The tactical layer belongs to the machines.

This reshapes how we should think about the role of humans in contested systems. In the tactical execution phase, humans are simply too slow. Their reaction times, their need for sleep, their cognitive limits all become liabilities when adversaries operate at processor speed. The successful posture pushes humans up the stack, to the strategic layer where they set policy and define boundaries. The tactical layer belongs to the machines.

The Pentagon and defense contractors have talked for years about integrating AI into military systems. Most of that conversation has centered on discrete applications: better targeting, faster analysis, improved logistics.

GTG-1002 suggests a more fundamental shift. The question facing defense planners is how to build organizations where human judgment governs strategic decisions while AI systems handle the overwhelming volume and velocity of tactical operations—matching the speed and scale demonstrated by our adversaries.

We tend to imagine AI as a tool we pick up and put down, a capability we invoke for specific tasks. Write this email. Summarize this document. Analyze this data. The September attack reveals something different about where AI is heading. The tool is becoming the worker. And unlike human workers, it can run around the clock.

The attackers who executed GTG-1002 understood this. They built a system where human judgment was required only at a handful of strategic moments. Everything else ran on its own.

The age of the AI agent has arrived. The organizations that recognize this, that architect their defenses and their operations around continuous AI processes rather than episodic human efforts, will maintain an advantage. The rest will find themselves outpaced by adversaries who grasped the shift before they did.

Ben Van Roo is the co-founder and CEO of Legion Intelligence, the agentic AI platform solving the DOD’s AI infrastructure problem. Ben has spent his career building tech companies serving the Public and the Private sectors. He spent time as the VP of Supply Chain and Data Science at Chegg, helping grow the company and taking it public, and as Researcher at RAND where he worked with the Department of Defense on supply chain inefficiencies and infrastructure challenges. Ben has a PhD in Operations Research from the University of Wisconsin-Madison.

Previous Post

Digest 51: Lithuania declares Security Emergency as ICEYE, Nu Quantum lead defence tech funding surge

Next Post

Guest Post: Where are Europe’s female defence tech leaders?

Ben Van Roo

Ben Van Roo

Related News

The UK is on the precipice of geopolitical and military irrelevance

The UK is on the precipice of geopolitical and military irrelevance

byGuest Author
March 24, 2026

Imagine the headline next week: “Trump seizes Cyprus, Chagos and Gibraltar from the UK.”  Such is the ambiguity of Britain’s...

a bridge over a body of water with a statue in the background

Is defence tech a ‘proper’ VC-backable vertical?

byAnton Verkhovodov
March 16, 2026

Several months ago, on a famous VC podcast, I heard an idea that I consider heresy: defence tech is not...

birds flying over the field

The dangerous economics of drone warfare

byJan-Hendrik Boelens
March 11, 2026

Modern air defence is entering a dangerous economic inversion: in many cases, it now costs far more to destroy a...

asphalt road between trees

Munich Security Conference got the urgency right. The hard part comes next

byRobin Dechant
March 6, 2026

A few weeks on from the Munich Security Conference, something many of the Resilience Media community no doubt attended, I...

If Russia Wins: Lessons for the UK and Europe

If Russia Wins: Lessons for the UK and Europe

byHugo Jammes
February 17, 2026

In the build-up to the Munich Security Conference (MSC), I finally read a book many had recommended. Carlo Masala’s ‘If...

a factory filled with lots of orange machines

The second valley of death

byRobin Dechant
February 2, 2026

Every founder knows about the first valley of death – that phase where you're doing everything possible to find your...

cloudy skies

Europe’s cloud future is about collaboration

byAntti Pennanen
January 30, 2026

For years, data sovereignty had been treated as a theoretical concern – debated in policy circles yet usually deferred behind...

World Economic Forum

Capital under siege: Sanctions, supply chains and politics now drive VC decisions

byHugo Jammes
January 22, 2026

For the last three decades, European venture capital has benefited from a grand assumption that rarely makes it into pitch...

Load More
Next Post
Guest Post: Where are Europe’s female defence tech leaders?

Guest Post: Where are Europe’s female defence tech leaders?

After leading Sweden into NATO, Tobias Billström eyes defence-tech opportunities at Nordic Air Defence

After leading Sweden into NATO, Tobias Billström eyes defence-tech opportunities at Nordic Air Defence

Most viewed

InVeris announces fats Drone, an integrated, multi-party drone flight simulator

Uforce raises $50M at a $1B+ valuation to build defence tech for Ukraine

Auterion, the drone software startup, eyes raising $200M at a $1.2B+ valuation

Twentyfour Industries emerges from stealth with $11.8M for mass-produced drones

Senai exits stealth to help governments harness online video intelligence

Palantir and Ukraine’s Brave1 have built a new AI “Dataroom”

Resilience Media is an independent publication covering the future of defence, security, and resilience. Our reporting focuses on emerging technologies, strategic threats, and the growing role of startups and investors in the defence of democracy.

  • About
  • News
  • Resilence Conference
    • Resilience Conference Copenhagen 2026
    • Resilience Conference Warsaw 2026
    • Resilience Conference 2026
  • Guest Posts
  • Subscribe
  • Privacy Policy
  • Terms & Conditions

© 2026 Resilience Media

No Result
View All Result
  • About
  • News
  • Resilence Conference
    • Resilience Conference Copenhagen 2026
    • Resilience Conference Warsaw 2026
    • Resilience Conference 2026
  • Guest Posts
  • Subscribe
  • Privacy Policy
  • Terms & Conditions

© 2026 Resilience Media

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.