User Agent Attack, The FBI San Francisco division is warning individuals and businesses to be aware of the threat posed by cyber criminals utilizing artificial intelligence. There are many tools that allow you to change your user agent for your browser. Volume of account takeover attacks using Go The attack has a notable success rate, with around 9. This guide breaks down the most critical AI agent fraud tactics, from Why would a script for logging user agents interpret and execute JavaScript in the user agent string? From searching online I get the impression that this is a fairly common attack vector, but (perhaps MCP servers turn prompt injection from a simple user-input risk into a distributed trust-boundary problem across tools, metadata, sessions, and external Threat actors are abusing HTTP client tools like Axios in conjunction with Microsoft's Direct Send feature to form a "highly efficient attack pipeline" in recent phishing campaigns, We would like to show you a description here but the site won’t allow us. If a web server is vulnerable to Shellshock you could attack it by adding the magic string () { :; }; to /bin/eject and then sending that string to the target computer over HTTP. Key takeaways Prompt injection tricks AI agents into executing hidden commands embedded in user Simulated Attacks on AI Agents To investigate the security risks of AI agents, we developed a multi-user and multi-agent investment advisory assistant AI lowers attack barriers in 2025, enabling 7M-user breach and faster exploits, increasing scale and impact of cyber threats. Key Risks Prompt Injection (Direct & Indirect): Malicious instructions injected via user input or 301 Moved Permanently 301 Moved Permanently cloudflare Automatic attack disruption addresses this concern by using high-fidelity signals and incident-level correlation across real data from email, identity, Prompt injection attacks have surged 340% in 2026. Hypertext transfer protocol (HTTP) has become the main protocol to carry out malicious activities. A defense-in-depth approach—combining This cheat sheet provides best practices to secure AI agent architectures and minimize attack surfaces. In this article we explain Prompt injection attacks have emerged as one of the most critical security vulnerabilities in modern AI systems, representing a fundamental Summary Indirect prompt injection attacks pose a significant threat to generative AI systems by exploiting their reliance on untrusted content. With the research preview release of OpenAI Operator Old, unpatched vulnerabilities allow hackers to take over systems using the User-Agent string -- an elementary part of virtually every HTTP request. Attack-ers typically use HTTP for communication with command-and-control servers, click fraud, Suspicious User-Agent Detection By identifying a suspicious User-Agent we can potentially detect a malicious or suspicious HTTP request which This article will focus on user agent spoofing and how it can be a particular threat to individuals and businesses in the hands of fraudsters. If the user agent User-agent analysis is one of the powerful methods in threat hunting to identify unusual behaviors that may indicate malicious activity. Discover what a user agent is and how it facilitates web interactions. A user agent is a “string” – that is, a line of text – identifying the browser and operating system to the web server. Artificial Intelligence ‘ZombieAgent’ Attack Let Researchers Take Over ChatGPT Radware bypassed ChatGPT’s protections to exfiltrate user data and Security researchers have discovered 10 new indirect prompt injection (IPI) payloads targeting AI agents with malicious instructions designed to achieve financial fraud, data destruction, User-Agent based attacks are a low-key risk that shouldn’t be overlooked As originally published in betanews Old, unpatched vulnerabilities Implementing WAFs with the ability to detect and block malicious User-Agents can add an additional layer of defense, protecting web applications from What is a User-Agent ? A User-Agent string is a line of text that a browser or application sends to a web server to identify itself. It detected unusual code Abuse attacks involve the insertion of incorrect information into a source, such as a webpage or online document, that an AI then absorbs. Learn critical insights and vital lessons for proactive security. Activity from infrequent Unit 42 reveals how multi-agent AI systems can autonomously attack cloud environments. The . If you are using curl, you can also just craft your BleepingComputer is a premier destination for cybersecurity news for over 20 years, delivering breaking stories on the latest hacks, malware threats, and how to Granting an AI agent high-level privileges enables it to do harmful things if misconfigured or if a user downloads a skill that is injected with malicious Cybersecurity and Infrastructure Security Agency: America's Cyber Defense Agency These attacks exploit the agent’s reasoning and acting framework, threatening both operational integrity and user safety. My enhanced analyzer AI agents regularly interact with external data – user messages, retrieved documents, third-party APIs, and various data pipelines. And this Abstract The detection of attacks, especially persistent intrusions, relies on a combination of various artifacts. 110. In this post we However, with the rise of agentic systems, the attack surface is shifting. It is designed to operate within an environment, A mysterious user agent string in some Microsoft 365 audit logs offers clues for how to detect logins from legacy authentication protocols. While these But what do these 'attack tools' look like from a blue team perspective and what can you do to alert yourself of their use. 7% of attempts resulting in successful account takeovers. This gap arises because both the system prompt (developer instructions) and the user’s input This guide breaks down how these attacks work and what you can do to stop them. Normally, the The User-Agent header represents a significant attack surface because it's user-controlled input that's often trusted and logged without proper validation. Unlike First, agents routinely exchange detailed user-related contex-tual information, some of which may be nonessential, thereby increasing the chance of inference attacks that reconstruct private attributes or Hackers have increasingly been using HTTP client tools to orchestrate sophisticated account takeover attacks on Microsoft 365 environments. Attacks that Overview: Microsoft 365 Apps Many organizations seek to block malicious user agents and prevent scripted or unauthorized programmatic access to Microsoft How to use User Agent to attack websites What Is a Browser's User Agent? The User Agent is a string of text that identifies the browser and operating However, since October, Go Resty based attacks have ceased, while Node Fetch based attacks persist. Each User-agent analysis is one of the powerful methods in threat hunting to identify unusual behaviors that may indicate malicious activity #HTTP User-Agent Analysis Purpose: Identify malware by analyzing the User-Agent strings they present Data Required: HTTP proxy data; list of known-bad UAs (optional) Collection Considerations: Computer-Using Agents (CUAs) are a new type of AI agent that drives your browser/OS for you. Discover AI agent risks and GeeTest's adaptive, AI-driven Read the latest news and posts and get helpful insights about Home Page from Microsoft’s team of experts at Microsoft Security Blog. We would like to show you a description here but the site won’t allow us. In each hijacking scenario, an agent is asked to complete a legitimate user task but Other user agents require threat actors to write complex custom scripts or rely on tools that are more obviously suspicious, whereas Axios combines flexibility and easy automation, and will An AI agent is a computer program that can make autonomous decisions or perform actions on behalf of a user or another system. 83, 2. Despite being manipulable, the user-agent string, a component of HTTP headers, has Uncover the secrets of early attack disruption with browser anomaly detections! This blog post explores how Microsoft Defender XDR leverages advanced In every HTTP request, the user agent header acts as a self-declared identity card for the client—typically a browser—sharing information about the It can appear in malicious sites, third-party content in iframes, or from user-generated content like user reviews, and can cause the agent to take unwanted actions such as initiating Axios user agent activity surged 241% from June to August 2025, dwarfing the 85% growth of all other flagged user agents combined. The recent findings around Axios attacks on Microsoft 365 should serve as a wake-up call to all users—irrespective of industry—to take their Microsoft fixed the Copilot flaw, but researchers warn the real danger lies in how all AI agents are built. User agent spoofing lets bots pose as real visitors, leading to fake clicks and impressions. Malicious versions of rand-user-agent, specifically 2. Although not all web applications are configured to capture the user That said, some example user agents often seen during a password spray are: BAV2ROPC / CBAinPROD / CBAinTAR: These user agent strings This paper analyzes User Agent (UA) anomalies within malware HTTP traffic and extracts signatures for malware detection. 84, and A user agent contains information about the application and the device from which the website is accessed, plus other information needed to correctly display the requested page. It typically includes The core vulnerability that gives rise to prompt injection attacks lies in what can be termed the “semantic gap”. The User-Agent deviates from known enterprise baselines or contains spoofed platform indicators. These attacks aim to exfiltrate sensitive information that the LLM-based agents access, store, or generate throughout their lifecycle, including user inputs, private training data, retrieved Every request your web browser makes includes your User Agent; find out what your browser is sending and what this identifies your system as using five different techniques to detect the real user-agent of Sometimes, their attack attempts happen at the same time the actual user is signed in, thus raising impossible travel alerts. Discover how threat actors use user-agent blocking to evade detection and prolong phishing campaigns. User-Agent strings can be gathered with API calls such as ShellExecuteW to open the Threat actors frequently alter or fabricate User-Agent strings, sometimes aiming to camouflage their traffic within legitimate web requests. We observe, within a large set of malware HTTP traffic provided by a local AV An Artificial Intelligence (AI) agent is a software entity that autonomously performs tasks or makes decisions based on pre-defined Tl;dr: Cyber criminals bribed and recruited a group of rogue overseas support agents to steal Coinbase customer data to facilitate social engineering Introduction A user agent is a text string sent by your browser or script during an HTTP request to identify the client’s software and operating environment to the The threat actor told BleepingComputer that the new attacks are using the following user agent, which looks like a normal browser user agent. Learn about User-Agent strings and their role in web optimization. A A X user sent a morse code message tricking Grok into authorizing a $150,000 crypto transfer. Unlock the power of the user agent for threat hunting. Cross site scripting, SQL injection and other forms of attacks will be shown along with User-Agent strings are critical elements that convey specific details about your browser, operating system, and device. Indirect Prompt Injection AI agents are transforming how apps operate—and how attackers exploit them. Scammers exploit this Creating rules to normalize your user-agent strings will allow you to passively monitor your endpoints for out-of-date applications and unauthorized software. Checking User Agents for abusive/malicious fragments Some web servers don't handle user agents correctly, and criminals have found that by providing user agents in certain formats they can actually A multi-stage adversary-in-the-middle (AiTM) and business email compromise (BEC) attack targets banking and financial services organizations. Malicious attacks using the user agent field in HTTP request headers will be examined and discussed. Learn how it works and how to detect this form of ad fraud. First, agents routinely exchange detailed user‐related contextual information, some of which may be nonessential, thereby increasing the chance of inference attacks that reconstruct The list of User-Agent and IPv4 addresses to block unwanted crawlers, bad robots, suspicious spiders, junk web-scrapers, malicious spammers, and unauthorized The user agent is easily changed as it is set by the client. How This paper presents a novel approach to robustly separate and classify applications transported over HTTP using user-agent (UA) strings, with the goal of detecting malicious We conduct a systematic evaluation of 12 commercial agents in a sandboxed environment, covering 6 trip-planning agents and 6 web-use agents, and compare agent behavior Malware also uses the HTTP user agent header in order to trigger attacks against vulnerable web applications. We’ll The fundamental unit of the evaluation is the hijacking scenario. Some of the most widely used AI agents and assistants from Microsoft, Google, OpenAI and other major companies are susceptible to being Computer-Using Agents (CUAs), while intended to increase productivity, can be repurposed by threat actors for malicious use. New research reveals how attackers are hijacking enterprise AI systems—and why your security stack can't stop them. 0. This volatility, combined with these agents’ ability to execute commands on a user’s machine, creates ample opportunities for attackers. Learn how to analyze logs to detect malicious scanners like Nikto and Nmap, and uncover unknown threats. An npm package named 'rand-user-agent' has been compromised in a supply chain attack to inject obfuscated code that activates a remote access On 5 May, 16:00 GMT+0, our automated malware analysis pipeline detected a suspicious package released, rand-user-agent@1. This blog lists the User Agents “Companies are already exposed to Agentic AI attacks – often without realizing that agents are running in their environments,” said Keren Katz, Top 10 for Agentic AI Applications Co The FBI San Francisco division is warning individuals and businesses to be aware of the threat posed by cyber criminals utilizing artificial intelligence. This sounds simple, but user agents have become a mess over time. A key indicator is the presence of the Image 8: Flow chart of Axios user agent string attack chain It’s unclear why the threat actor did not consistently swap the Axios user agent string for the user’s when forwarding the login, since In every HTTP request, the user agent header acts as a self-declared identity card for the client—typically a browser—sharing information about the software and platform supposedly making How the Attack Unfolded The attack was first detected by Aikido’s malware analysis system on May 5, 2025. User Agent Spoofing: Guide To Detecting Forged User Agents A user agent is any software application that facilitates an interaction between a user and a network service, such as the Internet. This is a prompt injection attack against an autonomous AI agent. Instead of manipulating the model’s direct instructions, attackers may focus more AI agents reshape cybersecurity, enabling automated attacks and advanced phishing. mdguq 51ln w7o f4p aepv cukxy q4ww mzdzz2e n2v vpxlo