Once trust was established, Claude was used as an autonomous tool, scanning target networks, writing exploit code, harvesting credentials, extracting data and producing documentation of the hack.