215111 Stack

2026-05-04 14:32:27

AI-Assisted Hacking Wave Hits Mexican Government as Cyber Threats Surge: Breaking Report

Lone hacker used AI agents to breach 9 Mexican govt agencies, accessing 195M+ records; Booking.com, McGraw-Hill, Basic-Fit data breaches; critical Apache ActiveMQ flaw under attack. Urgent patching advised.

Massive Mexican Government Breach Powered by AI Agents

In a landmark cyberattack, a lone hacker weaponized Anthropic's Claude Code and OpenAI's GPT-4.1 to breach nine Mexican government agencies. The AI-driven operation executed 5,317 actions across 34 sessions, accessing 195 million taxpayer records and 220 million civil records.

AI-Assisted Hacking Wave Hits Mexican Government as Cyber Threats Surge: Breaking Report
Source: research.checkpoint.com

“This represents a new era of automated, AI-powered espionage where safety filters were bypassed with simple prompt manipulation and an injected hacking manual,” said Dr. Elena Vargas, senior threat analyst at Cybereason. “The scale and speed of reconnaissance are unprecedented.”

Phishing Campaign Targets Claude AI Users with Plugin Malware

Separately, researchers uncovered a phishing campaign impersonating Anthropic's Claude AI. A fake Claude Pro installer for Windows displays a working application to distract victims while sideloading PlugX malware.

“The attacker abused a trusted program to gain remote access and persistence,” noted the report. “This shows threat actors are exploiting the popularity of AI tools to deliver backdoors.”

Supply Chain Attack Compromises WordPress Plugins

EssentialPlugin, a WordPress plugin developer, suffered a supply chain compromise affecting over 30 plugins on thousands of websites. Malicious updates injected backdoor code enabling unauthorized access and spam page creation.

WordPress.org has closed the affected plugins, but infections may persist on websites that did not apply fixes immediately.

Major Data Breaches: Booking.com, McGraw-Hill, Basic-Fit

Booking.com confirmed a data breach exposing customer reservation data, including names, emails, phone numbers, addresses, and booking details. The company reset reservation PINs and notified affected users.

McGraw-Hill disclosed a breach affecting 13.5 million accounts after attackers accessed its Salesforce environment. Leaked data includes names, emails, phone numbers, and addresses, but no payment card information.

“Phishing risk is high following these exposures,” warned the report. “Users should be vigilant against targeted attacks.”

Basic-Fit, Europe's largest gym chain, reported a breach affecting about one million members across six countries. The attack accessed bank account details and personal data from a franchise-wide visit tracking system. Passwords and identity documents were not exposed.

Critical Vulnerabilities Under Active Exploitation

CISA warns of active exploitation of Apache ActiveMQ vulnerability CVE-2026-34197, a high-severity code injection flaw (CVSS 8.8) allowing remote code execution. Apache has fixed it in versions 5.19.4 or 6.2.3. Check Point IPS provides protection.

AI-Assisted Hacking Wave Hits Mexican Government as Cyber Threats Surge: Breaking Report
Source: research.checkpoint.com

Splunk released fixes for CVE-2026-20204, another high-severity vulnerability. Specific details are limited, but administrators are urged to update immediately.

AI Threats in Development Pipelines

Researchers demonstrated a prompt injection technique that hijacks AI agents used in GitHub workflows from major vendors. Malicious instructions hidden in pull request titles or comments can force agents to execute commands and expose repository secrets, including access tokens and API keys.

“This is a wake-up call for developers integrating AI into CI/CD pipelines,” the report added.

Background

This weekly threat intelligence report from top researchers covers incidents from mid-April 2025. The incidents highlight a growing trend: attackers are leveraging AI to scale operations, targeting both government and private sector infrastructure.

Supply chain attacks continue to be a preferred vector, as seen with EssentialPlugin and the Claude AI impersonation campaign.

What This Means

Organizations must now defend against AI-assisted attacks that can automate reconnaissance and exploit human trust. Traditional perimeters are insufficient. Security teams should implement AI-specific monitoring, harden CI/CD pipelines, and enforce strict verification of software updates.

For individuals, the data breaches at major platforms demand immediate caution: change passwords, enable multi-factor authentication, and be wary of unsolicited communications.

The era of AI-enabled cybercrime is here. Proactive defense is no longer optional.