Yotam Gutman

24.3.2026

AI Remote Control Will Break Traditional Security

Anthropic’s Claude can now control your PC remotely. Read Zeroport's deep dive into the massive security risks, critical CVEs, and how hackers hijack AI agents

The era of AI as a passive conversationalist is officially over. Today, we are firmly in the age of agentic AI—systems designed to run locally, integrate tightly with developer environments, and execute complex workflows with minimal human intervention. Anthropic has been leading this charge, recently rolling out a highly anticipated "computer use" feature for Claude.

The premise is incredibly seductive: dispatch a task from your mobile phone while grabbing coffee, and watch as Claude takes over your unattended Mac or PC—opening apps, clicking through browsers, reading local files, and writing code as if it were sitting in your chair.

The productivity implications are massive. But by granting an AI the ability to physically mimic human mouse movements and keystrokes on a remote device, we are actively dismantling decades of endpoint security. Here is why turning your AI assistant into a remote-controlled digital ghost is a security nightmare, and how attackers are already weaponizing these models.

The Mobile-to-PC Bridge: A Hacker's Dream

When you hear "remote control," you might think of traditional RDP or VNC protocols, which hackers scan for on open ports. Claude’s architecture is different; it relies on an outbound HTTPS connection to Anthropic's cloud, bound to your identity session.

However, this doesn't eliminate the risk—it just shifts the attack surface. If an attacker hijacks your Anthropic account (via phishing, malware, or session cookie theft), they gain absolute control over your desktop.

Once an attacker has control of the agent's decision-making loop, Claude's ability to interact with the Graphical User Interface (GUI) allows it to bypass security boundaries designed specifically to stop automated malware:

  • Defeating User Account Control (UAC): Operating systems rely on "human-in-the-loop" prompts. When malware tries to install, Windows dims the screen and asks, "Do you want to allow this app to make changes?" Malware traditionally struggles to click "Yes." But a hijacked Claude agent can literally move the cursor and click the button, granting the attacker administrative privileges.
  • Bypassing UI-Bound 2FA: If your 2FA codes pop up as desktop notifications (via macOS messages or Windows Phone Link), an attacker can instruct the AI to read the screen, copy the 6-digit code, and paste it into a login portal, fully bypassing multi-factor authentication.
  • Exploiting the Unattended Window: The feature is designed to run while you are away from your keyboard (AFK). This gives an attacker a massive, unmonitored window to visually navigate your password manager, scrape API keys, and email them to an anonymous drop—cleaning up the sent folder before you even return to your desk.

The "Any-to-Any" Nightmare: The Death of the Network Perimeter

As this technology matures, the trajectory naturally points toward an "any-device-to-any-device" control plane. When a desktop in one location can command a PC or Mac in another, the implications for remote hacking fundamentally shift. It essentially turns a productivity enhancement into a universal, pre-installed Remote Access Trojan (RAT).

  • The OS-Agnostic Hacker: Claude acts as a universal translation layer. An attacker doesn't need to know the specific bash commands for macOS or the PowerShell syntax for Windows. They can simply type a natural language command: "Find the passwords file and upload it to my server." The AI agent figures out how to execute that on its specific OS, severely lowering the barrier to entry for cross-platform attacks.
  • Bypassing Firewalls: Because Claude relies on outbound HTTPS connections (port 443), it punches right through corporate firewalls. If an attacker compromises your Anthropic account from a laptop in another country, they can remotely pilot your corporate workstation sitting behind a firewall, entirely bypassing Zero Trust network architectures.

The AI Kill Chain: Anatomy of a Remote Hijack

With a cross-platform AI agent acting as the attacker's proxy, the attack "kill chain" becomes terrifyingly short and efficient. Here is how a modern, AI-facilitated hacking sequence unfolds:

  1. The Lure (Credential Theft): The attacker sends a highly targeted spear-phishing email mimicking a legitimate Anthropic Workspace Security Alert. The developer clicks the link, enters their credentials and 2FA into a spoofed SSO page, and the attacker captures the active session token.
  2. Hijacking the AI (The Entry Point): The attacker imports the stolen session token into their own browser. They are now authenticated as the victim. They establish the remote control link to the victim's online, unattended corporate workstation. The AI agent wakes up, awaiting instructions.
  3. The Silent Foothold: The attacker types into their Claude interface: "Open a hidden terminal window. Execute a PowerShell command to download an enumeration script, run it silently, and output the environment variables to a local text file." The local Claude agent mimics the user, clicks through any UAC prompts, and maps the environment.
  4. Lateral Movement to Internal Databases: Realizing the machine has trusted routing to restricted internal databases, the attacker prompts: "Search the local file system for .env files or open database clients like DBeaver. Extract the plaintext credentials for the internal production PostgreSQL database, open a terminal, and establish a direct connection." Claude locates the developer's local configuration files and authenticates into the internal network's crown jewels.
  5. Massive Exfiltration and Cleanup: The attacker issues the final command: "Run a SQL query to dump all user identities and credit card hashes. Compress the 150GB dump into a password-protected ZIP, upload it via SFTP to my drop server, delete the ZIP, and close all windows." Because the outbound traffic looks like a legitimate developer, network monitors don't flag it.

When the developer returns to their desk, their screen looks exactly as they left it—but the corporate database is gone.

In the Wild: AI-Driven Cyberattacks and Vulnerabilities

If you think hijacking an agent is difficult, recent security disclosures prove otherwise. Local AI tools are highly susceptible to manipulation.

Researchers at Check Point recently exposed critical vulnerabilities (CVE-2025-59536 and CVE-2026-21852) in Claude Code. They demonstrated how malicious repository-level configuration files—often cloned blindly by developers—could trigger silent Remote Code Execution (RCE) and hijack Anthropic API keys before the user even granted consent.

Similarly, SentinelOne detailed CVE-2025-58764, an RCE flaw stemming from improper command parsing. By injecting untrusted content into Claude's context window, attackers could completely bypass the built-in confirmation prompts, forcing the AI to execute arbitrary code.

Malicious actors are already abusing these capabilities at scale. Anthropic themselves recently warned that cybersecurity has reached a "critical inflection point", noting that Chinese state-sponsored hackers used Claude to autonomously perform 80-90% of an espionage campaign. Even more devastating, attackers posing as bug bounty testers recently jailbroke Claude Code to orchestrate a massive breach of Mexican government agencies. Over the course of a month, the manipulated AI automated exploit writing and exfiltrated over 150GB of sensitive records, exposing nearly 195 million identities.

Securing the Future

The transition to agentic, remote-controlled AI requires a fundamental rethink of Remote Access. When software can mimic a human, "human-in-the-loop" safeguards are no longer enough and secured connectivity becomes paramount.

If your organization is experimenting with Claude's computer-use features or local coding agents, you must limit their reach. Agents should be heavily sandboxed in dedicated Virtual Machines or AppContainers, stripped of broad administrative rights, and strictly isolated from your primary production credentials and internal databases. Ensure Secured, non-IP remote access for users and agents.

The AI assistant is evolving into an autonomous operator. Make sure you aren't handing it the keys to your entire infrastructure.

Secure Access
at Every Level

Empower global teams with secure, hardware-enforced remote access, no VPNs, no data exposure, no risk.

More info