Overview
Risk patterns
Patterns found in the case record and its linked vulnerabilities.
- 1Dominant ATLAS tactic. Resource Development appears in 3 case steps.
- 2Multiple attack methods. The case connects to 9 unique AI attack methods.
Procedure timeline
Search the case steps or filter them by attacker goal.
-
Resource Development
Step 1
LLM Prompt Crafting
The researchers crafted a malicious prompt containing an instruction to execute the malicious shell command to exfiltrate the victim’s AI agent credentials.
-
Resource Development
Step 2
Stage Capabilities
The researchers created a malicious web site containing the malicious prompt.
-
Defense Evasion
Step 3
LLM Prompt Obfuscation
The malicious prompt was hidden in the title tag of the webpage.
-
Resource Development
Step 4
Stage Capabilities
The researchers launched a web server to receive data exfiltrated from the victim.
-
Initial Access
Step 5
Drive-by Compromise
When a user asked Cursor to use an MCP tool to scrape the malicious website, the contents of the malicious prompt was retrieved and ingested into Cursor’s context window.
-
Execution
Step 6
Indirect
When the MCP server scraped the malicious web site, it returned the injected prompt to the MCP client and poisoned the context of the Cursor LLM. Cursor executed the malicious prompt embedded in the website scraped by the MCP tool.
-
Privilege Escalation
Step 7
AI Agent Tool Invocation
The prompt injection invoked Cursor’s ability to call command line tools via the
run_terminal_cmdtool. Cursor prompted the user before executing a shell command, potentially mitigating this attack. -
Defense Evasion
Step 8
LLM Prompt Obfuscation
When the MCP server scraped the malicious web site, it returned the injected prompt to the MCP client and poisoned the context of the Cursor LLM. The shell command in the malicious prompt was obscured via base64 encoding, making it less clear to the user that something malicious may be executed.
-
Credential Access The shell command located the
.openapi.apiKeyand.cursor/mcp.jsoncredentials files that were part of the Cursor’s configuration. -
Exfiltration The credentials files were exfiltrated to the researcher’s server via a
curlcommand invoked by Cursor'srun_terminal_cmdtool. -
Impact
Step 11
Financial Harm
A bad actor could use the stolen credentials cause financial damage and could also steal other sensitive information from the victim user.
Mitigations
Defenses connected to the attack methods in this case.
Sources
Original public records and references for this case.
Original source
Original source links
Open the MITRE ATLAS data and public references used for this case study.