The Agent Threat Landscape
Common Attack Vectors
AI agents introduce new attack surfaces that malicious actors exploit:
| Attack Vector | Description | Risk Level | Mitigation |
|---|---|---|---|
| Prompt Injection | Malicious instructions in user input override system prompts | Critical | Input sanitization, validation |
| Tool Hijacking | Manipulating agents to abuse connected APIs | Critical | Scoped permissions, approval workflows |
| Data Exfiltration | Coaxing agents to reveal sensitive information | High | Output filtering, access controls |
| Agent Impersonation | Spoofing legitimate agent identities | High | Strong authentication, mTLS |
| Credential Stuffing | Automated credential testing at scale | High | Rate limiting, anomaly detection |
| Content Scraping | Ignoring robots.txt, violating terms | Medium | Access controls, legal measures |
| Denial of Service | Overwhelming systems with agent requests | Medium | Rate limits, throttling |
| Supply Chain Poisoning | Compromising data sources agents rely on | High | Data validation, source verification |
Real-World Security Incidents
Documented AI Agent Incidents (2023-2025):
| Incident | Year | Impact | Lessons |
|---|---|---|---|
| ChatGPT Data Leak | 2023 | Users saw other users' chat histories | Session isolation critical |
| Samsung Code Leak | 2023 | Confidential code uploaded to ChatGPT | Data loss prevention needed |
| Canadian Privacy Breach | 2023 | ChatGPT accused of unauthorized data collection | Privacy compliance essential |
| Bing Chat Jailbreak | 2023 | AI manipulated into revealing system prompt | Prompt injection defense required |
| DistilBERT Extraction | Research | Demonstrated training data extraction | Model hardening necessary |
Key Pattern: Each incident revealed that traditional security measures were insufficient for agent-specific threats. New defense strategies are required.
Malicious Agent Behaviors
Red Flag Behaviors to Monitor:
- Perfect Timing Patterns - Requests at precise intervals (non-human)
- Sequential Resource Access - No exploratory browsing
- Missing Header Anomalies - Incomplete or malformed headers
- JavaScript Absence - No client-side execution indicators
- Cookie Inconsistency - Improper cookie handling
- Pattern Avoidance - Behaviors designed to evade detection
- Header Rotation - Cycling through user agents
- Proxy Chains - Requests from multiple IPs with same behavior
- Boundary Testing - Probing rate limits systematically
- Data Harvesting - Systematic extraction attempts
