Mythos AI and what it means for insurers
When the Guardian asked “What is Mythos AI and why could it be a threat to global cybersecurity?”, the most important detail wasn’t the model’s name or its maker; it was Anthropic’s decision not to release Mythos publicly because it believes the model can be prompted to discover and potentially help exploit unknown software flaws ('zero-days') across widely used systems.
In other words: Mythos points toward a future where high-end vulnerability research is no longer a scarce human craft, but a scalable, repeatable capability. That is the kind of shift that can turn cyber from 'many independent losses' into an accumulation peril.
What Mythos is and why the capability is different?
Mythos is a frontier AI model revealed on 7 April 2026 by Anthropic. Anthropic says it will keep the model gated because of the cyber misuse risk. Anthropic’s own description is blunt: in recent testing Mythos Preview helped identify thousands of high-severity zero-days, including in "every major operating system and every major web browser."
To manage the risk, Anthropic created Project Glasswing (announced in early April 2026) to provide controlled access to a set of major infrastructure and security partners, effectively trying to pull forward patching and hardening before Mythos class capabilities proliferate. TechCrunch reported that the model is being deployed by a small group of partners specifically for defensive vulnerability discovery and remediation rather than general use.
Why experts think it could raise global cyber risk
The UK’s AI Security Institute (AISI) independently evaluated Claude Mythos Preview and concluded that it represents a meaningful step up, especially on multi-step attack simulations where real-world intrusions live or die. AISI reports Mythos succeeds 73% of the time on expert-level capture the flag tasks and is the first model to fully complete 'The Last Ones'; a 32 step simulated corporate network attack (finishing end-to-end in 3 of 10 attempts, averaging 22/32 steps overall). This is significant because it suggests AI is beginning to chain reconnaissance, privilege escalation, lateral movement, and takeover steps. Anthropic has confirmed that it is investigating reports that a 'handful' of users have already gained unauthorised access via a private online forum.
What are the implications for insurers?
1) Correlated losses through common-mode software failure
Cyber insurance struggles when many insureds are hit at. Mythos-class vulnerability discovery could compress the time between a bug being discovered and the bug being exploited, shrinking the practical window for patching and detection. If a single zero-day issue is exploited, this could lead to a large portfolio-wide exposure.
This is a known insurability constraint: the Geneva Association’s work on cyber risk accumulation highlights how extreme cyber incidents can strike large segments of the economy simultaneously, challenging traditional actuarial approaches and limiting capacity. Mythos makes that scenario less theoretical.
2) Higher claims pressure in a market already seeing severity rise
Even before Mythos, insurance claims trends were moving the wrong way. UK industry data compiled by the Association of British Insurers (ABI) shows insurers paid £197m in cyber claims for 2024, up 230% from 2023, with malware and ransomware representing 51% of claims (up from 32% the year before). If AI increases attacker speed and sophistication, the frequency and severity mix that drove those numbers may deteriorate further - especially for business interruption and incident response costs, which inflate rapidly once an attacker moves laterally.
3) Policy wording, systemic-event controls, and reinsurance friction
As the risk of systemic exposure rises, insurers typically respond with tighter language and more explicit guardrails: higher retentions, stricter security conditions, sub limits for widespread events, and harder reinsurance terms.
Contents
- Insurance Insights: The Word, April 2026
- The Mazur appeal judgment: Implications for professional indemnity insurers
- Reinsurance: Lessons for the Market from a £3.76 million dispute
- Data centres and the insurance gap: What it means for insurers
- Big tech’s next fight is insurance: Landmark loss for Meta and YouTube
- Digital dementia and the insurance implications of social media addiction
Tim Johnson
Partner
tim.johnson@brownejacobson.com
+44 (0)115 976 6557
You may be interested in
Big tech’s next fight is insurance: Landmark loss for Meta and YouTube
Data centres and the insurance gap: What it means for insurers
Mythos AI and what it means for insurers
When is a ransomware limit not a limit: Lessons from CiCi Enterprises v HSB
FCA's anticipated priorities for InsurTechs
Cyber attacks: Could brokers be in the firing line?
“New low” for ransomware cybercriminals an opportunity for cyber insurers?
Physical property damage from cyber incidents: Implications for insurers
AI adoption without safeguards: A growing risk for insurers
Marine insurers face coverage uncertainty as GPS spoofing incidents rise
Aon calls for national AI regulation framework
“Silent AI”: The risk of unintended consequences
Exploring the impact of recent attacks on UK retailers and the future of cyber insurance
The M&S cyber attack: Lessons for UK retailers
Is your cyber resilience shored up?
EU Digital Operational Resilience Act: Countdown to comply with the January 2025 deadline
Artificial intelligence in insurance: Targeted marketing as a quasi-underwriting function
The Post Office Horizon IT Scandal: How should organisations react when IT systems go wrong?
The EU AI Act: What does it mean for insurers?
The space data revolution
LockBit unlocked: International taskforce takes down major cyber criminal organisation
Progress on the Automated Vehicles Bill
CyberCube’s Global Threat Outlook: The evolving threat of cyber operations
A new digital safe space – How does the EU Digital Services Act affect insurers?
“TOBA traps” - general exposure risk under existing TOBAs
UK Government publishes the Online Safety Bill: an overview
The rising number of cyber-attacks
The continued threat of piracy in Southeast Asian waters
Government publishes its proposals for expanding the Scope of the Network and Information Systems Regulations 2018
‘Big Game Hunting’ – the new face of cyber extortion?
Economic crime and cybercrime
It is clear that the digital landscape, often termed cyberspace, is a man-made environment, in which human behaviour dominates and where technology both influences and aids our role in it — through the internet, telecoms and networked computer systems, which are often interdependent. The extent to which any organisation is potentially vulnerable to cyber-attack depends on how well these elements are aligned.
Let’s be direct – doubly so
The Ukraine War: Aviation and cyber issues
The physical consequences of cyber attacks
ICO consultation on research provisions guidance
The data protection legislation (namely, the UK GDPR and Data Protection Act 2018) contain various provisions that deal with the processing of personal data for research purposes.
More good news for data controllers: High Court finds local authority not vicariously liable for the actions of social worker who went off on a "frolic of her own"
Stemming the tide of data breach claims: good news for data controllers
The cases summarised give considerable comfort to data controllers seeking to defend themselves against claims that relate to breaches arising as a result of a failure rather than a direct act and/or are based on assertions of damage or distress that are exaggerated, unsubstantiated or bear little relation to the breach itself.
Confidential information and subject access disclosure
In February 2021, the High Court handed down judgment London Borough of Lambeth v AM (No. 2) [2021] EWHC 186 (QB), in which Browne Jacobson LLP acted for the Claimant Council. The judgment is critical reading for public bodies who are required to take action to restrict the use of confidential information in circumstances where that information has been inadvertently disclosed to a third-party.
Top tips for implementing ‘Data Protection by Design & Default’
The GDPR requires all businesses to implement ‘Data Protection by Design & Default’ but what does that mean in practice and how can businesses practically comply?
Protecting your business from cyber threats
Did you know that cyber attackers can use publicly available information about your business and employees to make their attacks more successful? Information is often gleaned from websites and public social media accounts.