Double agents How adversaries can abuse “agent mode” in comm...#1432
Merged
carlospolop merged 62 commits intomasterfrom Oct 1, 2025
Merged
Conversation
…oading_20250824_182553 DLL ForwardSideLoading
… for Andr... - Remove searchindex.js (auto-generated file)
- Remove searchindex.js (auto-generated file)
…ache Pois... - Remove searchindex.js (auto-generated file)
- Remove searchindex.js (auto-generated file)
…al captur... - Remove searchindex.js (auto-generated file)
…ilege Esc... - Remove searchindex.js (auto-generated file)
…droid Sec... - Remove searchindex.js (auto-generated file)
…unted__a_decade_old_RCE_in_the_AIO_20250828_123942 This House is Haunted a decade old RCE in the AION client
…ience_Platform__20250829_183502
Replaced incorrect reference to 'HTLM' with the correct term 'NTLM'.
…vanced_SSL_Pinning_Detection_for_A_20250901_123952 SSLPinDetect Advanced SSL Pinning Detection for Android Secu...
…dows-hardening_windows-local-privilege-escalation_juicypotato_20250829_012533 Research Update Enhanced src/windows-hardening/windows-local...
…ope_Client_for_Windows___Local_Pri_20250830_184240 Advisory – Netskope Client for Windows – Local Privilege Esc...
…er_Fox__Cat___Mouse_in_Kernel_Shad_20250828_185321 Chasing the Silver Fox Cat & Mouse in Kernel Shadows
…_Actuator_HeapDump_to_SSH__credent_20250830_182823 HTB Eureka From Actuator HeapDump to SSH, credential capture...
…_password_spray_to_gMSA_dump__then_20250828_183418 HTB Sendai From password spray to gMSA dump, then ADCS ESC4 ...
…CTF_born_exploits_and_techniques_20250830_123618 The Art of PHP CTF‑born exploits and techniques
…_1_-_A_multistage_dropper_20250829_183210 GodFather - Part 1 - A multistage dropper
…ive-direc... - Remove searchindex.js (auto-generated file)
…ht_in-app_JNI___so__behavior_logge_20250829_123609 SoTap Lightweight in-app JNI (.so) behavior logger for Andro...
…Security__Understanding_the_Regist_20250905_011652 Demystifying 5G Security Understanding the Registration Prot...
…dows-hardening_active-directory-methodology_ad-certificates_domain-persistence_20250904_012126 Research Update Enhanced src/windows-hardening/active-direct...
…_Laravel_env_override__CVE_2024_52_20250907_012404 HTB Environment Laravel env override (CVE‑2024‑52301) → LFM ...
…le_Android_Bug_Bounty_Lab__Emulato_20250905_123731 Build a Repeatable Android Bug Bounty Lab Emulator vs Magisk...
…integrity_checks_to_locally_backdo_20250904_182820 Subverting code integrity checks to locally backdoor Signal,...
…Can__Sitecore_Experience_Platform__20250829_183502 Cache Me If You Can Sitecore Experience Platform Cache Poiso...
…ege_Escalation_in_Service_Finder_B_20250904_125030 Unpatched Privilege Escalation in Service Finder Bookings Pl...
…Improvements_and_Vulnerability_Dis_20250904_124648 ksmbd - Fuzzing Improvements and Vulnerability Discovery (2/...
…e” in com... - Remove searchindex.js (auto-generated file)
Collaborator
Author
🔗 Additional ContextOriginal Blog Post: https://redcanary.com/blog/threat-detection/ai-agent-mode/ Content Categories: Based on the analysis, this content was categorized under "generic-methodologies-and-resources/phishing-methodology/ai-agent-mode-phishing-abusing-hosted-agent-browsers.md". Repository Maintenance:
Review Notes:
Bot Version: HackTricks News Bot v1.0 |
55d15da to
919cd5c
Compare
Collaborator
Author
|
merge |
88a07c5 to
73b307c
Compare
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
This post documents a technique-level abuse of commercial AI “agent mode” assistants—demonstrated with ChatGPT agent mode—to phish credentials from within the agent’s cloud-hosted browser. No CVEs are involved; the risk stems from agentic browsing and a user handoff (“Take over Browser”) that shifts credential entry to the human.
How agent mode works (relevant internals):
• The assistant launches an isolated, virtualized browser inside the chat UI and follows natural-lan...
🔧 Technical Details
AI‑in‑the‑Middle via hosted agent browser: Use a shared prompt to rebrand an attacker domain as the “official portal,” instruct the agent to navigate there, and rely on the agent’s credential guardrails to trigger a Take over Browser handoff. The victim then enters credentials into the phishing site inside the agent’s cloud browser. Host the site on custom infrastructure with valid TLS to avoid basic heuristics. Detect by correlating identity anomalies with hosted‑browser fingerprints (Cloudflare egress + stable UA).
🤖 Agent Actions
I analyzed the Red Canary post and the HackTricks repository and found no existing coverage of abusing AI “agent mode” hosted browsers for phishing. This is a technique-level item (no CVE) that fits under Phishing Methodology. I created a dedicated page and linked it from the Phishing Methodology index.
What I did:
Created a new page:
Linked it from Phishing Methodology README:
Notes:
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.
🗑️ File Cleanup