Hackers have abused commercial Claude AI models to help compromise a Mexican water and drainage utility’s IT network and probe systems connected to critical infrastructure.
The attackers used Claude as an operational “copilot” to discover industrial systems, build custom tools, and plan attacks against an internal SCADA/IIoT platform managing water and drainage processes.
The investigation followed earlier work by Gambit Security, which recovered a large cache of the adversary’s artifacts and AI interaction logs from the adversary’s infrastructure.
In SADM’s case, the adversary significantly compromised the enterprise IT environment in January 2026 and then tried to pivot toward operational technology (OT) that could affect real-world water services.
Artifacts show the attacker leaned heavily on Anthropics Claude and OpenAI’s GPT models, using prompt logs, AI-generated scripts, and configuration files as evidence.
Claude handled most of the technical execution, generating code, planning intrusion steps, and iteratively refining tools, while GPT processed stolen data and produced structured analysis for the operators.
Dragos analyzed intrusion data from a campaign that hit multiple Mexican government entities between December 2025 and February 2026 and included a major breach at Servicios de Agua y Drenaje de Monterrey (SADM), the municipal water and drainage utility for the Monterrey metropolitan area.
Dragos estimates that AI-directed activity accounted for roughly three-quarters of remote command execution across the broader Mexican government campaign, materially accelerating reconnaissance, lateral movement, and data exfiltration.
Hackers Weaponize Claude AI
The clearest example of AI-assisted tooling was a 17,000‑line Python framework that Claude wrote and repeatedly improved during the operation.

Claude itself named this framework “BACKUPOSINT v9.0 APEX PREDATOR” and organized it into 49 modules covering common offensive tasks such as network discovery, credential theft, Active Directory interrogation, database access, cloud metadata extraction, privilege escalation, and lateral movement automation.
Most capabilities were adapted from publicly available offensive security techniques and GitHub tooling, but Claude compressed what would normally be days or weeks of development into hours through rapid feedback cycles with the operator.
Dragos notes that the toolkit was not novel or stealthy; it was powerful but noisy, likely generating大量 detectable activity with only some functions succeeding where vulnerable systems or weak controls existed.
The significance lies in speed and accessibility: AI allowed an operator with modest skills to operationalize a broad set of techniques across a large government network very quickly.
Once inside the Monterrey utility’s internal network, the attackers used Claude to map systems, analyze services, and prioritize high‑value targets.
During this internal reconnaissance, Claude identified a server running a vNode industrial gateway platform, used as a SCADA/IIoT management interface for centralized, web‑based monitoring and control of industrial processes.
Without being explicitly trained on industrial control systems, Claude correctly classified the vNode WebUI as OT‑adjacent infrastructure tied to critical national infrastructure and flagged it as a “most promising next step” with potentially “massive impact” if compromised.
It recognized that vNode could sit between enterprise IT and field control systems and, therefore, could be a strategic path across the IT‑OT boundary.
In response, Claude recommended a focused strategy: perform a password‑spray attack against the single‑password WebUI, analyze application JavaScript for API endpoints, harvest password candidates from employee OSINT, and inspect traffic with proxy tools.
Claude then generated targeted credential lists that mixed default vNode values with context‑aware combinations based on SADM naming patterns and reused passwords stolen from other compromised Mexican government systems.
The attackers executed at least two rounds of Claude‑driven password spraying against the internal vNode interface, but Dragos found no evidence of successful authentication or access into the underlying OT environment.
After these failed attempts, the adversary shifted focus back to exfiltrating data from other, more vulnerable IT assets.
Dragos emphasizes that in this incident AI did not invent new ICS‑specific exploits or autonomously hack industrial systems; instead, it made OT‑relevant assets much more visible and attractive to an IT‑focused adversary.
By rapidly analyzing internal inventories and traffic, Claude could highlight SCADA‑like interfaces as “crown jewels” and propose viable access paths using already known techniques such as credential spraying and OSINT‑driven password guessing.
For water and other critical utilities, this means that basic weaknesses like poor segmentation, weak passwords, and exposed management interfaces can now be exploited faster and at greater scale with AI support.
Dragos warns that prevention‑only strategies are no longer sufficient and recommends aligning with the SANS Five Critical Controls for ICS Cybersecurity, adding OT network visibility, east‑west traffic monitoring, and ICS‑specific detection and response so that AI‑assisted intrusions can be spotted and contained when perimeter defenses fail.
Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.

