Direct naar hoofdinhoud
SAITS — AI Security Brief · April 2026

When AI Becomes
the Weapon

Anthropic's red team just published what their latest model can do to critical infrastructure. Dutch hospitals already know what happens when the control layer is missing. Here is the connection — and what changes it.

By Gerard Krom — Founder, SAITS.Online
14 min read
181
Working exploits
Claude Mythos Preview produced 181 working Firefox exploits from the same set where Opus 4.6 produced 2. Zero manual intervention after the initial prompt.
27 yrs
Oldest zero-day found
A 27-year-old signed integer overflow in OpenBSD's TCP SACK implementation — found and exploited autonomously by Mythos Preview.
€220k
Maastricht UMC+ ransom
Paid in Bitcoin in 2019 after the Clop ransomware paralysed the hospital's entire IT estate. Patient files, research data, and clinical systems offline for weeks.
0 sec
Human time required
Mythos Preview needs zero human steps after the initial prompt. The exploit research, hypothesis, test, debug, and delivery loop is fully autonomous.
The Mythos Revelation

181 working exploits. Zero human steps. One prompt.

Anthropic's red team published something unusual in April 2026: an honest assessment of what their latest model, Claude Mythos Preview, can do to real software systems. The finding was stark.

Given an isolated container, Claude Code, and a simple prompt — "find a vulnerability in this program" — Mythos Preview reads the source, forms hypotheses, writes test harnesses, debugs failures, and delivers working exploits. Fully autonomously. No security expertise required from the operator.

The previous state of the art, Opus 4.6, produced 2 working Firefox exploits across hundreds of attempts. Mythos Preview produced 181 from the same set. That is not an improvement. That is a category boundary crossed.

Anthropic's own red team called this one of the most dangerous AI capabilities they have seen. They are not releasing it broadly. They are instead deploying it defensively via Project Glasswing — to critical infrastructure partners who need to find their own bugs before attackers do.

The implication for everyone else is direct: the cost of producing a working exploit against your infrastructure just dropped from weeks of specialist work to an overnight prompt. The expertise barrier that once protected legacy systems — including clinical IT like Chipsoft's HiX — is gone.

The only answer is not better patching alone. It is a control layer that assumes the exploit will land and asks what happens next.

Autonomous zero-day discovery

Mythos Preview reads source code, forms hypotheses, tests them, debugs failures, and delivers working exploits — without a human in the loop. This is not a tool. It is an autonomous researcher.

4-chain browser exploit

JIT heap spray + sandbox escape + two chained privilege escalations — written as a single autonomous exploit chain against a major browser. Previously a task requiring weeks of expert work.

Linux LPE via race conditions

Autonomous local privilege escalation on Linux using race conditions. No expert guidance. No manual debugging. A clean exploit delivered from a single prompt.

FreeBSD RCE via 20-gadget ROP chain

Remote code execution on FreeBSD's NFS implementation via a 20-gadget return-oriented programming chain. The kind of exploit that used to require months of specialist research.

Non-expert accessibility

Engineers without any security training asked for an RCE in the evening. A working exploit was ready the next morning. The expertise barrier for sophisticated attacks has collapsed.

181 vs 2

The previous SOTA (Opus 4.6) produced 2 working Firefox exploits across hundreds of attempts. Mythos Preview produced 181 from the same set. That is not iteration. That is a phase transition.

Dutch Healthcare Under Attack

Chipsoft HiX. €220,000. Clinical operations halted for weeks.

In December 2019, Maastricht University Medical Center became one of the most documented ransomware victims in European healthcare. The attack did not need AI. Today, it would take one prompt.

Entry
Phishing email opens the door.

The Clop ransomware group gained initial access through a spear-phishing email at Maastricht UMC+ in October 2019. No AI was needed — a single click was enough to get inside a flat, trusted network.

Spread
Lateral movement across the HiX estate.

Clop spent weeks moving laterally across the hospital network before detonating. Chipsoft's HiX EHR system — used by hundreds of Dutch hospitals — was among the systems hit. Patient records, clinical workflows, research systems: all frozen.

Impact
Clinical operations halted for weeks.

Surgeries were rescheduled. Students lost research data. Backup procedures replaced digital workflows. The hospital could not access patient records for critical care decisions during the outage period.

Resolution
€220,000 paid. Decryption key received.

Maastricht UMC+ paid the ransom in Bitcoin. The Dutch government and cybersecurity community discussed the precedent. The lesson was not about the payment — it was about what was missing before the attack.

Why Chipsoft matters

Chipsoft's HiX is the dominant electronic health record platform in the Netherlands. The majority of Dutch hospitals — academic medical centres, general hospitals, and specialist clinics — run their clinical operations on it.

That concentration means a successful attack on HiX infrastructure is not an IT incident. It is a clinical incident. Patient records become inaccessible. Medication administration depends on paper fallback. Surgical planning stops.

In 2019, an attacker with weeks of time and basic lateral movement capability achieved this. In 2026, Mythos Preview can find the initial exploit autonomously overnight. The entry cost just collapsed.

The question is not whether AI-powered ransomware will target Dutch healthcare infrastructure. It is whether that infrastructure will have a control layer in place when it does.

What Was Missing

Four control gaps that turned a phishing email into a €220k ransom

No execution boundary

Once inside, ransomware moves freely because there is no policy layer deciding what each process is permitted to reach. HiX data, backup stores, and domain controllers sat in the same trusted zone.

No behavioural anomaly detection

Clop spent weeks in the network before detonating. An AI-governed infrastructure layer watching process behaviour, lateral connections, and access patterns would have raised the alert during reconnaissance.

No fail-closed design

The hospital had no fail-closed mode. When the ransomware detonated, everything came down together. A properly isolated, fail-closed architecture degrades gracefully — critical functions survive even when the periphery is lost.

No immutable audit trail

Attackers who compromise logs can cover their tracks. Without an immutable, out-of-band audit trail, the hospital could not reconstruct the full attack path quickly enough to isolate and recover with confidence.

SAITS Anti-Ransomware Infrastructure

Control before execution. Every time. No exceptions.

SAITS is a control-first AI and cloud platform. The same architecture that governs AI agent execution also makes ransomware lateral movement structurally impossible in a properly deployed environment.

🛡
Fail-closed execution routing

Every process, AI agent, and service runs inside an explicit permission envelope. Actions outside that envelope do not degrade gracefully — they stop. Ransomware that cannot move laterally cannot spread.

👁
Behavioural anomaly detection

The SAITS control plane monitors execution behaviour continuously — process trees, lateral connections, data access patterns, and AI agent tool calls. Deviation from baseline triggers isolation, not just alerting.

📋
Immutable audit layer

Every action — human, automated, or AI-generated — is written to a tamper-evident, out-of-band audit log. Attackers who compromise the application layer cannot erase what the control plane already recorded.

🔒
Isolated blast radius

Services are containerised with enforced network segmentation. If one surface is compromised, the blast radius is bounded by the control layer — not by hoping the attacker stops. Critical clinical data sits in a separate trust domain.

⚙️
AI-gated tool execution

No AI agent on the SAITS platform can call a tool, write to storage, or invoke an external service without passing through the governed execution layer. Mythos-style autonomous execution is impossible without control-layer authorisation.

Patch velocity enforcement

Mythos Preview turns N-day vulnerabilities into minutes of work. The SAITS platform enforces patch cycles as a first-class infrastructure concern — not a maintenance task. Unpatched surfaces become immediate policy violations.

The Core Principle

The exploit landing is not the disaster. The disaster is what happens after.

Mythos Preview can find the initial exploit. That is now a given. The question every CTO, CISO, and hospital board needs to answer is: what does your infrastructure do once the exploit lands?

In a flat, trusted network, the answer is: it spreads. It reaches your HiX servers. It encrypts your clinical data. It halts your operations. And then someone calls the Bitcoin wallet address.

In a SAITS-governed infrastructure, the answer is: the execution is bounded. The lateral movement attempt hits a policy boundary. The anomaly is detected and isolated. The blast radius is contained. The audit trail is intact.

Not because the exploit did not land. But because the control layer was already there, waiting for exactly that moment.

What To Do

Six things that change your posture today

01

Assume your perimeter is already inside. Design every network segment as if the attacker is already there.

02

Add a fail-closed execution layer to every AI workflow. If the control plane cannot verify the action, the action does not happen.

03

Shorten your patch cycle to days, not quarters. Mythos Preview converts N-days into minutes of attacker work.

04

Separate your clinical or operational data into a distinct trust domain with explicit crossing rules.

05

Instrument behaviour, not just uptime. Ransomware reconnaissance is weeks of normal-looking traffic before detonation.

06

Test your recovery. Maastricht UMC+ had backups — some were encrypted too. Validated, isolated, immutable backups are non-negotiable.

Sources & References
Anthropic red team — Claude Mythos Preview cybersecurity brief

Primary source for the 181 exploit count, zero-day examples, and the non-expert accessibility finding.

Maastricht UMC+ ransomware incident — SURF report

Analysis of the 2019 Clop ransomware attack on Maastricht University Medical Center including the €220,000 ransom payment.

Chipsoft HiX — Dutch hospital EHR platform

Chipsoft's HiX system is the primary EHR used by the majority of Dutch hospitals. Compromise of this infrastructure class has direct clinical impact.

NCSC NL — Ransomware in de zorg

Dutch National Cyber Security Centre guidance on ransomware threats specifically targeting healthcare infrastructure.

OWASP LLM Top 10

Reference taxonomy for AI-specific attack vectors including excessive agency, insecure tool use, and supply chain risk.

Your infrastructure needs a control layer. Not a better firewall.

SAITS builds fail-closed, governed execution environments for organisations that cannot afford to find out what happens after the exploit lands.

Talk to SAITS about your control layer