Overview
Risk patterns
Patterns found in the case record and its linked vulnerabilities.
- 1Dominant ATLAS tactic. Resource Development appears in 2 case steps.
- 2Multiple attack methods. The case connects to 12 unique AI attack methods.
Procedure timeline
Search the case steps or filter them by attacker goal.
-
Resource Development
Step 1
Develop Capabilities
The researchers performed a static analysis on the APIs of target LLM frameworks to identify functions that execute code from either user input or the response from an LLM and are thus vulnerable to RCE.
-
Reconnaissance The researchers performed targeting to identify applications that are likely built on with LLM Frameworks and may use the functions vulnerable to RCE. This was done by scanning source code repositories for app deployment URLs.
-
Discovery
Step 3
Call Chains
The researchers ran their static analysis to extract call chains from target application’s source code to identify those that utilize LLM framework functions vulnerable to RCE.
-
Resource Development
Step 4
LLM Prompt Crafting
The researchers developed prompts to trigger tool invocations that lead to RCE.
-
Initial Access The researchers targeted public-facing applications that expose an AI agent to user input as a means to execute their prompts.
-
Execution
Step 6
Direct
The researchers directly prompted the AI agent with their malicious instructions.
-
Defense Evasion
Step 7
LLM Jailbreak
For target applications where the AI agent refused the researcher’s request, they used lightweight jailbreaking strategies to bypass the LLM’s guardrails.
-
Privilege Escalation
Step 8
AI Agent Tool Invocation
The researchers' prompts called the AI agent’s tools, targeting call chains that can lead to code execution.
-
Execution The code included in the researcher’s prompts was executed in a sandboxed Python interpreter.
-
Privilege Escalation
Step 10
Escape to Host
The researchers included code escape techniques designed to bypass any limitations a sandbox may place on code execution.
-
Command and Control
Step 11
Reverse Shell
The Python code opened a reverse shell which was used as a command and control channel.
-
Impact
Step 12
Local AI Agent
The researchers gained full control of the system running the LLM-integrated application.
Mitigations
Defenses connected to the attack methods in this case.
Sources
Original public records and references for this case.
Original source
Original source links
Open the MITRE ATLAS data and public references used for this case study.