Mythos, APRA, and ASIC: Are Australian Enterprises Ready for the AI Threat?

Abstract AI neural network representing frontier model capabilities

On April 7, Anthropic dropped Claude Mythos Preview on the world. By April 30, APRA had written a letter to every bank, insurer, and super fund in Australia telling them to get their house in order. By May 7, ASIC followed up with their own, making it clear that cyber resilience is now a licensing obligation, not a nice-to-have.

Three events. Three weeks. One message: the game has changed, and most organisations aren’t ready.

What Mythos Actually Is

Let’s not sugarcoat this. Mythos isn’t just another incremental update to Claude. Anthropic themselves call it their “most capable frontier model to date.” The system card describes a “striking leap” in benchmark scores. The NYT reported it triggered “emergency responses from central banks and intelligence agencies.”

When intelligence agencies start paying attention to an AI model, you know it’s not just another chatbot upgrade.

What makes Mythos different from its predecessors? Capability. Raw, frightening capability. The kind that can find vulnerabilities faster, craft more convincing phishing attacks, and automate attack chains that used to require skilled human operators.

What APRA Actually Said

APRA’s letter on April 30 wasn’t gentle. They’d done a deep-dive on Australia’s largest banks, insurers, and super funds. What they found was sobering.

Boards are interested in AI’s benefits but lack the technical literacy to challenge AI risks. Governance hasn’t kept pace with adoption. Identity management systems aren’t designed for AI agents. Security testing doesn’t cover AI-specific attack paths. And perhaps most worryingly, many entities are treating AI as “just another technology.”

It’s not. AI changes the rules. APRA spelled out the attack vectors: prompt injection, data leakage, insecure integrations, exploit injection, and manipulation of autonomous AI agents. These aren’t theoretical threats. They’re happening now.

APRA explicitly called out Mythos by name. They’re “engaged across the sector on the potential for increased cyber threats from high capability AI frontier models such as Anthropic Mythos.” When a prudential regulator names a specific AI model in a letter to the entire financial sector, that’s not a suggestion. That’s a warning.

What ASIC Said a Week Later

If APRA’s letter was the warning, ASIC’s was the hammer. Commissioner Simone Constant didn’t mince words: “The clock is at a minute to midnight.”

ASIC made twelve specific demands. Reassess cyber plans. Confirm governance frameworks. Identify and protect critical assets. Strengthen fundamentals. Minimise attack surfaces. Review user access. Patch systems promptly. Implement defence-in-depth. Prepare for incident response. Manage third-party risks. Use AI defensively.

And here’s the part that should make every board sit up: cyber resilience is a core licensing obligation. Not optional. Not “when you get around to it.” Now.

ASIC even pointed to their recent win against FIIG Securities, where they secured a $2.5 million penalty for inadequate cyber controls. That’s the enforcement precedent. That’s what “stronger supervisory action” looks like in practice.

The Gap Between Awareness and Action

Here’s what worries me. Both APRA and ASIC are saying the same thing: you need to act now. But the gap between awareness and action at most organisations is enormous.

Boards are getting briefed on AI. They’re nodding along. They’re approving budgets. But are they asking the right questions? Do they understand what prompt injection actually means for their customer data? Do they know whether their AI agents have appropriate access controls? Can they answer whether their security testing covers AI-specific attack vectors?

APRA’s observation that boards are “still developing the technical literacy required to provide effective challenge on AI related risks” is polite language for: most boards don’t understand what they’re approving.

What You Should Be Doing Right Now

If you’re in a regulated entity, here’s what I’d be doing this week:

First, read both letters. Not a summary. Not the executive brief. The actual letters. APRA’s is detailed and specific. ASIC’s twelve-step list is a checklist you can hand to your CISO today.

Second, ask your security team one question: “Can you show me our AI-specific attack surface?” If they can’t answer that, you have a problem.

Third, check your identity management. APRA specifically called out that IAM capabilities “have not yet adjusted to nonhuman actors such as AI agents.” If your systems can’t distinguish between a human user and an AI agent, you’re exposed.

Fourth, look at your patching timelines. APRA noted that “implementation timelines for information security remediation activities are not consistently aligned to the accelerated threat environment.” If you’re still patching on a monthly cycle, you’re behind.

Fifth, ask about your third-party AI dependencies. Who are your AI providers? What access do they have? What happens if they get compromised? APRA and ASIC both flagged supplier concentration and opacity as major risks.

The Bigger Picture

What we’re seeing is the regulatory framework catching up with reality. For years, AI governance was theoretical. Boards talked about it. Consultants wrote reports about it. Nothing much changed.

Mythos changed that. Not because it’s malicious, but because it’s capable. When a single AI model can find vulnerabilities faster than your security team can patch them, the status quo stops working.

APRA and ASIC are telling the financial sector: the threat landscape has fundamentally shifted. Your governance, your security, your resilience – all of it needs to evolve. And you need to do it now, not next quarter.

The question isn’t whether you’ll be affected by AI-driven threats. It’s whether you’ll be ready when they arrive.

When both your prudential regulator and your conduct regulator are sending urgent letters about the same threat in the same month, the time for discussion is over. The time for action is now.

Related Reading

Subscribe

Related articles

A Worm Just Hacked 160+ npm Packages — And OpenAI Got Hit Too

A self-propagating supply chain worm called Mini Shai-Hulud compromised 160+ npm packages including TanStack and Mistral AI, and OpenAI confirmed two employee devices were breached. Here's what happened and what you need to do.

Your Smart Home Is Watching You. Here’s How to Fight Back.

Smart speakers, cameras, thermostats, doorbells - they're all collecting data about you. Here's what they know and how to take back some control.

AI Agents Are Everywhere. Your Security Team Probably Isn’t Ready.

Every company is rushing to deploy AI agents. Few are thinking about what happens when those agents get compromised. Here's what keeps me up at night.

This Week in Cyber: AI Gets Scary, Super Funds Get Hit, and Privacy Keeps Eroding

Another week in cyber security. AI threats are getting more real, Australian super funds are under attack, and your smart devices keep watching. Here's what mattered.

Someone’s Using AI to Make Fake Nudes of Teenagers. Here’s What Parents Need to Know.

A new sextortion tactic uses AI to generate realistic fake nude images of teenagers from their social media photos. This is real, it's happening now, and parents need to talk about it.