Skip to the main content.

4 min read

AI Found a 27-Year-Old Bug in the World's Most Secure OS. What's in Yours?

AI Found a 27-Year-Old Bug in the World's Most Secure OS. What's in Yours?

Key Takeaways from This Blog:

  • AI-driven cyber threats have reached a tipping point where they can autonomously discover and exploit vulnerabilities at scale, making traditional, human-paced defenses insufficient.
  • Community banks and credit unions are especially exposed because many lag in AI adoption and governance, despite recognizing cybersecurity as a top risk.
  • Effective response requires immediate action, modernizing defenses with AI tools, reassessing vulnerabilities, and elevating AI risk to a board-level strategic priority.

 

On April 8, Treasury Secretary Scott Bessent and Fed Chair Jerome Powell pulled bank CEOs into an unannounced meeting at Treasury headquarters in Washington. The executives already in town for a Financial Services Forum board dinner were told to come back. The subject wasn't rates. It wasn't credit quality. It was an AI model.

That detail matters for every community bank and credit union in the country. The executives in that room, Moynihan, Fraser, Solomon, Pick, and Scharf, run institutions classified as globally systemically important. But the threat that prompted a Treasury Secretary and Fed Chair to call an emergency meeting doesn't stop at the doors of the largest banks. It finds the weakest door in the system. If your institution is still treating AI-powered cybersecurity as a large-bank concern, you've misread the signal.

AI is now both the weapon aimed at your institution and the only defense capable of stopping it. Choosing to deploy one without the other isn't a resource decision. It's a vulnerability.

What Mythos Actually Did

Anthropic's Claude Mythos Preview, the model at the center of the April 8 meeting, didn't find a few vulnerabilities. It found thousands of zero-day flaws across every major operating system and every major web browser, operating almost entirely without human guidance. The most striking example: a 27-year-old bug in OpenBSD, an operating system built around security as its primary design principle. A flaw that survived nearly three decades of human review, millions of automated security scans, and the scrutiny of some of the best security researchers in the world. Mythos found it autonomously.

This isn't a proof of concept. Anthropic's Red Team reported that Mythos achieved a 72.4% exploit success rate against Firefox's JavaScript engine, compared to 14.4% for the prior frontier model. That's not an incremental upgrade. That's the difference between a threat your current defenses were built for and one they weren't.

Anthropic restricted access to roughly 40 organizations under Project Glasswing, a $100 million defensive initiative, precisely because they understood the asymmetry: the offensive capability arrived before the defensive infrastructure could absorb it.

Powell's "Yet" Problem

Jerome Powell has been making one of banking's most reassuring observations for years. In a March 2026 Harvard interview, he put it plainly: "We've had all kinds of financial crises, but we've never really had a successful cyberattack on a large financial utility or financial institution, and that would be quite a different thing."

He's been right. The danger is that "right so far" has become indistinguishable from "protected."

Those aren't the same thing. The word doing all the work in Powell's statement isn't "successful." It's "yet." And the clearest signal that the "yet" window is closing came from Powell himself, when he called the meeting.

The Threat Environment Was Already Accelerating

Mythos didn't create the problem. It collapsed the remaining buffer.

The CrowdStrike 2026 Global Threat Report documented an 89% year-over-year increase in attacks by AI-enabled adversaries. The average time between initial access and lateral movement inside a target network fell to 29 minutes in 2025, a 65% acceleration from the prior year. The fastest observed breakout: 27 seconds. In one documented intrusion, data exfiltration began within four minutes of initial access.

The threat actors weren't waiting for Mythos. They were already moving at a speed that makes human-paced detection and response inadequate. What Mythos signals is what happens when that acceleration is paired with automated vulnerability discovery at scale.

Community Banks and Credit Unions Are Reading the Wrong Data

Bank Director's 2026 Risk Survey found that 92% of bank board members and executives rank cybersecurity as a top risk this year. That awareness is real. But awareness of the problem and deployment of the defense are not the same thing.

The CSI 2026 Banking Priorities Survey found that 57% of financial institution leaders cite cybersecurity as AI's most valuable application. Yet among institutions under $250 million in assets, only 31% ranked technology modernization as a top priority, compared to 59% of institutions between $5 and $10 billion. The smallest institutions carry the most legacy exposure and the least urgency about closing it.

Bank Director's survey added one more number worth sitting with: one third of bank leaders say they don't understand agentic AI at all. You can't govern what you can't describe. You can't deploy a defense you don't understand. And you can't afford to learn on the job when the breakout window is measured in seconds.

Three Moves, Not Ten

The path forward doesn't require a nine-figure technology budget. But it does require honesty about which of the three necessary moves most institutions will rationalize away.

The first two are relatively straightforward. Assess legacy exposure through the lens of AI-driven vulnerability discovery, not the traditional pen test cycle built for human-speed threats. A model like Mythos doesn't approach your codebase the way a human researcher does. It chains vulnerabilities autonomously, at scale, overnight. Your assessment methodology needs to account for that. Second, prioritize AI-assisted patching and behavioral anomaly detection. Project Glasswing exists because Anthropic understood that defenders need a head start. The same tools creating the offensive capability are available for defense. The question is whether your institution is using them.

The third move is the one that won't happen at most banks and credit unions, and it's the one that matters most. This conversation has to move out of the technology committee and into the boardroom. Not as a briefing item. Not as a line in the risk report. As a first-order strategic question about institutional survival. One third of bank leaders told Bank Director's 2026 Risk Survey they don't understand agentic AI at all. That number doesn't represent a training gap. It represents a governance gap. A board that can't engage meaningfully with AI risk isn't positioned to authorize the investment, set the risk appetite, or hold management accountable when something goes wrong.

The institutions that skip the boardroom conversation will also underinvest in the assessment and deploy the tools last. That's not a prediction. It's a pattern.

The Window Is Open. It Won't Stay That Way.

When Powell and Bessent called those CEOs back to Treasury, they did something regulators almost never do: they signaled urgency before the crisis, not after it. Powell has spent years observing that we've never had a successful cyberattack on a major financial institution. What changed on April 8 isn't the threat. It's that the person who kept saying "not yet" stopped believing it.

Community banks and credit unions that read that meeting as a large-bank event have misread it. The system is only as secure as its least-prepared participant. The institutions that move now are the ones building the levee. The ones that wait are hoping the hurricane doesn't come their way.

The window is open. It found a 27-year-old bug in the most secure operating system on the planet while you were reading this.