Overview
Risk patterns
Patterns found in the case record and its linked vulnerabilities.
- 1Dominant ATLAS tactic. Execution appears in 3 case steps.
- 2Multiple attack methods. The case connects to 7 unique AI attack methods.
Procedure timeline
Search the case steps or filter them by attacker goal.
-
AI Model Access The researchers use access to the publicly available GenAI model API that powers the target RAG-based email system.
-
Execution
Step 2
Direct
The researchers test prompts on public model APIs to identify working prompt injections.
-
Execution
Step 3
AI Agent Tool Invocation
The researchers send an email containing an adversarial self-replicating prompt, or "AI worm," to an address used in the target email system. The GenAI email assistant automatically ingests the email as part of its normal operations to generate a suggested reply. The email is stored in the database used for retrieval augmented generation, compromising the RAG system.
-
Execution
Step 4
Triggered
When the email containing the worm is retrieved by the email assistant in another reply generation task, the prompt injection changes the behavior of the GenAI email assistant.
-
Persistence The self-replicating portion of the prompt causes the generated output to contain the malicious prompt, allowing the worm to propagate.
-
Exfiltration
Step 6
LLM Data Leakage
The malicious instructions in the prompt cause the generated output to leak sensitive data such as emails, addresses, and phone numbers.
-
Impact
Step 7
User Harm
Users of the GenAI email assistant may have PII leaked to attackers.
Mitigations
Defenses connected to the attack methods in this case.
Sources
Original public records and references for this case.
Original source
Original source links
Open the MITRE ATLAS data and public references used for this case study.