Cert-In warns MSMEs about Anthropic's Mythos and other AI models that can drive cybercrime risks

Cert-In warns MSMEs about Anthropic's Mythos and other AI models that can drive cybercrime risks
Representative Image
CERT-In has issued a high-severity advisory to Indian MSMEs on cybersecurity risks posed by advanced AI systems, such as Anthropic’s Mythos and similar frontier models. In a recent advisory titled “Defending Against Frontier AI-Driven Cyber Risks”, the Indian cybersecurity watchdog said emerging AI models are now capable of identifying software vulnerabilities, automating reconnaissance, generating phishing content and executing multi-stage cyberattacks at a speed that previously required teams of skilled experts. CERT-In warned that these capabilities could lower the barrier to entry for cybercriminals and increase the risks for businesses with weak security systems.

What risks Cert-In has flagged about advanced AI models

According to the advisory, frontier AI models are increasingly capable of carrying out complex cyber operations with minimal human intervention. Cert-In said these systems can perform:
  • Analysis of large-scale software to find known and zero-day vulnerabilities
  • Faster exploit development for newly disclosed bugs
  • Automated Discovery of Internet-exposed infrastructure
  • Harvesting credentials from AI-powered phishing campaigns
  • Multi-stage attack planning
  • Fast exploitation workflows
The agency warned that such tools can be used for defensive cybersecurity tasks but may also be misused by threat actors.“It is likely that AI systems with such advanced cyber capabilities will continue to emerge and mature in near future,” the advisory notedCERT-In added that the dual-use nature of these tools could help attackers automate exploitation campaigns and scale attacks.

What risks do MSMEs face

The agency said MSMEs remain particularly vulnerable because of limited cybersecurity budgets and smaller security teams. According to CERT-In, businesses may face:
  • Unauthorised access
  • Data theft
  • Service disruptions
  • Financial fraud
  • Identity compromise
  • Impersonation attacks
  • Persistent malware infections
The advisory also warned about risks to interconnected systems and supply chains.

Cert-In asks organisations to improve cyber hygiene

For businesses, CERT-In recommended stronger monitoring and faster responses to emerging vulnerabilities. The agency advised organisations to:
  • Increase system monitoring frequency
  • Review logs more frequently
  • Reduce internet-facing attack surfaces
  • Disable unnecessary ports and services
  • Enable DDoS protection
  • Monitor unusual access activity
  • Use AI-powered defensive security tools
CERT-In also said companies should treat newly disclosed vulnerabilities with urgency.“Treat every newly disclosed critical vulnerability in widely deployed software as something that could be exploited within hours, not weeks,” the advisory added.

Cert-In recommends Zero Trust security model: What is it

The advisory also pushed organisations to adopt Zero Trust Network Architecture. CERT-In recommended:
  • Multi-factor authentication
  • Least privilege access controls
  • Hardware-based identity verification
  • Network segmentation
  • Restricting production systems from public internet exposure
The agency also warned businesses to review older VPN systems, which are often targeted by attackers.

Importance of patching vulnerabilities faster

CERT-In said businesses should significantly reduce patch deployment timelines. It advised companies to:
  • Apply critical patches within 24 hours where possible
  • Automate patch management
  • Maintain updated software inventories
  • Monitor open-source software vulnerabilities
  • Review third-party vendor security practices
The advisory even urged organisations to monitor cloud environments for misconfigurations. CERT-In also said that smaller businesses should focus on cost-effective security measures. Recommendations for MSMEs include:
  • Keeping systems updated
  • Turning on automatic updates
  • Using managed security services
  • Enabling multi-factor authentication
  • Avoiding unverified AI tools
  • Encrypting business data
  • Filtering phishing emails
  • Testing backup recovery processes
  • Monitoring suspicious network activity
The agency also urged MSMEs to train employees regularly.“Conduct regular cybersecurity training to educate employees on risks of AI-generated content and scams,” Cert-In advisory noted.

Cert-In’s guidance for individuals

CERT-In also warned individual users that personal devices can become targets. It advised people to:
  • Use strong passwords
  • Enable multi-factor authentication
  • Avoid suspicious links
  • Verify urgent financial requests
  • Be cautious of AI-generated scams
  • Avoid unverified downloads
  • Back up personal data regularly
The agency also warned users to remain alert against deepfake scams and impersonation attempts.

Why Mythos is drawing attention

Mythos has recently drawn global attention after reports suggested that the AI model can identify software vulnerabilities and assist with cybersecurity testing.Several regulators and financial institutions worldwide have already begun reviewing risks associated with advanced AI cyber capabilities.CERT-In’s latest advisory signals that Indian businesses, especially MSMEs, may also need to prepare for a faster-moving cyber threat landscape as AI capabilities continue evolving.

author
About the AuthorTOI Tech Desk

The TOI Tech Desk is a dedicated team of journalists committed to delivering the latest and most relevant news from the world of technology to readers of The Times of India. TOI Tech Desk’s news coverage spans a wide spectrum across gadget launches, gadget reviews, trends, in-depth analysis, exclusive reports and breaking stories that impact technology and the digital universe. Be it how-tos or the latest happenings in AI, cybersecurity, personal gadgets, platforms like WhatsApp, Instagram, Facebook and more; TOI Tech Desk brings the news with accuracy and authenticity.

End of Article
Follow Us On Social Media