Overview
Risk patterns
Patterns found in the case record and its linked vulnerabilities.
- 1Dominant ATLAS tactic. Resource Development appears in 2 case steps.
- 2Multiple attack methods. The case connects to 9 unique AI attack methods.
Procedure timeline
Search the case steps or filter them by attacker goal.
-
Resource Development
Step 1
LLM Prompt Crafting
The researchers crafted a prompt that instructs an AI agent to discover and read user credentials files and store them in an input parameter of an MCP tool.
-
Resource Development The researchers hosted a poisoned MCP server that contains the malicious instructions hidden in the docstring of one of the provided tools.
-
Initial Access
Step 3
AI Agent Tool
The researchers hosted a poisoned MCP tool that contains the malicious instructions hidden in the docstring of the tool.
-
Execution
Step 4
Direct
When a user called the remote MCP tool, the prompt injection hidden in the docstring is executed locally.
-
Execution
Step 5
AI Agent Tool Invocation
The prompt invoked an agent tool capable of reading files from the victim’s filesystem.
-
Credential Access
Step 6
Unsecured Credentials
The prompt instructed the AI agent to read the user’s SSH keys at
~/.ssh/id_rsa. -
Credential Access The prompt instructed the AI agent to read
mcp.json, which often contains credentials for other MCP servers. -
Exfiltration The prompt instructed the AI agent to store the credentials files in an extraneous MCP tool parameter to exfiltrate them via the MCP connection.
-
Impact
Step 9
User Harm
The user’s private data was exposed to remote MCP server.
Mitigations
Defenses connected to the attack methods in this case.
Sources
Original public records and references for this case.
Original source
Original source links
Open the MITRE ATLAS data and public references used for this case study.