Skip to content

Double agents How adversaries can abuse “agent mode” in comm...#1432

Merged
carlospolop merged 62 commits intomasterfrom
update_Double_agents__How_adversaries_can_abuse__agent_mo_20250924_183200
Oct 1, 2025
Merged

Double agents How adversaries can abuse “agent mode” in comm...#1432
carlospolop merged 62 commits intomasterfrom
update_Double_agents__How_adversaries_can_abuse__agent_mo_20250924_183200

Conversation

@carlospolop
Copy link
Copy Markdown
Collaborator

🤖 Automated Content Update

This PR was automatically generated by the HackTricks News Bot based on a technical blog post.

📝 Source Information

  • Blog URL: https://redcanary.com/blog/threat-detection/ai-agent-mode/
  • Blog Title: Double agents: How adversaries can abuse “agent mode” in commercial AI products
  • Suggested Section: generic-methodologies-and-resources/phishing-methodology/ai-agent-mode-phishing-abusing-hosted-agent-browsers.md

🎯 Content Summary

This post documents a technique-level abuse of commercial AI “agent mode” assistants—demonstrated with ChatGPT agent mode—to phish credentials from within the agent’s cloud-hosted browser. No CVEs are involved; the risk stems from agentic browsing and a user handoff (“Take over Browser”) that shifts credential entry to the human.


How agent mode works (relevant internals):
• The assistant launches an isolated, virtualized browser inside the chat UI and follows natural-lan...

🔧 Technical Details

AI‑in‑the‑Middle via hosted agent browser: Use a shared prompt to rebrand an attacker domain as the “official portal,” instruct the agent to navigate there, and rely on the agent’s credential guardrails to trigger a Take over Browser handoff. The victim then enters credentials into the phishing site inside the agent’s cloud browser. Host the site on custom infrastructure with valid TLS to avoid basic heuristics. Detect by correlating identity anomalies with hosted‑browser fingerprints (Cloudflare egress + stable UA).

🤖 Agent Actions

I analyzed the Red Canary post and the HackTricks repository and found no existing coverage of abusing AI “agent mode” hosted browsers for phishing. This is a technique-level item (no CVE) that fits under Phishing Methodology. I created a dedicated page and linked it from the Phishing Methodology index.

What I did:

  • Created a new page:

    • Path: src/generic-methodologies-and-resources/phishing-methodology/ai-agent-mode-phishing-abusing-hosted-agent-browsers.md
    • Content:
      • Describes how agent mode hosted browsers work and how the Take over Browser handoff enables policy-compliant credential phishing (AI-in-the-Middle).
      • Provides a repro-ready shared prompt PoC.
      • Details execution flow, infrastructure traits (cloud egress, stable UA fingerprint; example UA), and why detection is difficult (off-endpoint/off-network).
      • Adds concrete Detection & Hunting guidance with example KQL and Splunk searches, and mitigation strategies (restrict agent mode; identity-centric controls; governance/visibility; detections).
      • Operator tips and related techniques sections.
      • References section with the Red Canary blog link and OpenAI product page.
      • Proper HackTricks banners included.
  • Linked it from Phishing Methodology README:

    • File modified: src/generic-methodologies-and-resources/phishing-methodology/README.md
    • Inserted a “See also – agentic browsing abuse for credential phishing” reference under “AI-Enhanced Phishing Operations” with a proper internal ref to the new page.

Notes:

  • I reviewed ≥5 files to confirm structure/style and ensure no duplication:
    • phishing-methodology/README.md, clipboard-hijacking.md, detecting-phising.md, homograph-attacks.md, phishing-documents.md, AI/AI-Prompts.md.
  • The new content focuses on technique abstraction: agentic browsing, shared prompts, hosted browser handoff, detection from identity telemetry and hosted-browser fingerprints.
  • References are added at the end of the new page as required.

This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.

🗑️ File Cleanup

  • searchindex.js removed: This auto-generated file has been removed to prevent conflicts.

carlospolop and others added 30 commits August 29, 2025 11:56
…oading_20250824_182553

DLL ForwardSideLoading
… for Andr...

- Remove searchindex.js (auto-generated file)
- Remove searchindex.js (auto-generated file)
…ache Pois...

- Remove searchindex.js (auto-generated file)
- Remove searchindex.js (auto-generated file)
…al captur...

- Remove searchindex.js (auto-generated file)
…ilege Esc...

- Remove searchindex.js (auto-generated file)
…droid Sec...

- Remove searchindex.js (auto-generated file)
…unted__a_decade_old_RCE_in_the_AIO_20250828_123942

This House is Haunted a decade old RCE in the AION client
Replaced incorrect reference to 'HTLM' with the correct term 'NTLM'.
…vanced_SSL_Pinning_Detection_for_A_20250901_123952

SSLPinDetect Advanced SSL Pinning Detection for Android Secu...
…dows-hardening_windows-local-privilege-escalation_juicypotato_20250829_012533

Research Update Enhanced src/windows-hardening/windows-local...
…ope_Client_for_Windows___Local_Pri_20250830_184240

Advisory – Netskope Client for Windows – Local Privilege Esc...
…er_Fox__Cat___Mouse_in_Kernel_Shad_20250828_185321

Chasing the Silver Fox Cat & Mouse in Kernel Shadows
…_Actuator_HeapDump_to_SSH__credent_20250830_182823

HTB Eureka From Actuator HeapDump to SSH, credential capture...
…_password_spray_to_gMSA_dump__then_20250828_183418

HTB Sendai From password spray to gMSA dump, then ADCS ESC4 ...
…CTF_born_exploits_and_techniques_20250830_123618

The Art of PHP CTF‑born exploits and techniques
…_1_-_A_multistage_dropper_20250829_183210

GodFather - Part 1 - A multistage dropper
…ive-direc...

- Remove searchindex.js (auto-generated file)
…ht_in-app_JNI___so__behavior_logge_20250829_123609

SoTap Lightweight in-app JNI (.so) behavior logger for Andro...
carlospolop and others added 18 commits September 7, 2025 16:49
…Security__Understanding_the_Regist_20250905_011652

Demystifying 5G Security Understanding the Registration Prot...
…dows-hardening_active-directory-methodology_ad-certificates_domain-persistence_20250904_012126

Research Update Enhanced src/windows-hardening/active-direct...
…_Laravel_env_override__CVE_2024_52_20250907_012404

HTB Environment Laravel env override (CVE‑2024‑52301) → LFM ...
…le_Android_Bug_Bounty_Lab__Emulato_20250905_123731

Build a Repeatable Android Bug Bounty Lab Emulator vs Magisk...
…integrity_checks_to_locally_backdo_20250904_182820

Subverting code integrity checks to locally backdoor Signal,...
…Can__Sitecore_Experience_Platform__20250829_183502

Cache Me If You Can Sitecore Experience Platform Cache Poiso...
…ege_Escalation_in_Service_Finder_B_20250904_125030

Unpatched Privilege Escalation in Service Finder Bookings Pl...
…Improvements_and_Vulnerability_Dis_20250904_124648

ksmbd - Fuzzing Improvements and Vulnerability Discovery (2/...
…e” in com...

- Remove searchindex.js (auto-generated file)
@carlospolop
Copy link
Copy Markdown
Collaborator Author

🔗 Additional Context

Original Blog Post: https://redcanary.com/blog/threat-detection/ai-agent-mode/

Content Categories: Based on the analysis, this content was categorized under "generic-methodologies-and-resources/phishing-methodology/ai-agent-mode-phishing-abusing-hosted-agent-browsers.md".

Repository Maintenance:

  • MD Files Formatting: 877 files processed

Review Notes:

  • This content was automatically processed and may require human review for accuracy
  • Check that the placement within the repository structure is appropriate
  • Verify that all technical details are correct and up-to-date
  • All .md files have been checked for proper formatting (headers, includes, etc.)

Bot Version: HackTricks News Bot v1.0

@github-actions github-actions Bot force-pushed the master branch 4 times, most recently from 55d15da to 919cd5c Compare September 29, 2025 21:20
@carlospolop
Copy link
Copy Markdown
Collaborator Author

merge

@github-actions github-actions Bot force-pushed the master branch 2 times, most recently from 88a07c5 to 73b307c Compare September 29, 2025 22:21
@carlospolop carlospolop merged commit b443137 into master Oct 1, 2025
@carlospolop carlospolop deleted the update_Double_agents__How_adversaries_can_abuse__agent_mo_20250924_183200 branch October 1, 2025 01:37
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants