Tuesday, 14 April 2026

SecTor 2025 | One Agent to Rule Them All: How One Malicious Agent Hijacks A2A System

As multi-agent architectures become increasingly essential to enterprise workflows, Google's A2A and Anthropic's MCP have been proposed as standard protocols for agent communication and integration. These protocols have become foundational for scaling AI agents Technology, enabling the seamless integration of third-party agents, often available as open-source code, into existing systems. However, these protocols must also ensure system safety, and potential security risks must be carefully considered. In this presentation, we will highlight a key vulnerability in these protocols: integrating outsourced agent card's text into the delegator agent's instructions introduces a backdoor for cyber security attacks. Our presentation will first explain the protocol design and its weaknesses. Then, we will show how malicious agents with hidden prompt injection can bypass current defenses and checks. We will also present a way to combine user's trust in LLMs and LLM hallucinations to drive the user to install malicious agent. Finally, we demonstrate how such malicious agents enable full system compromise, including DoS, sensitive data theft, Phishing and lateral spread. All those attacks are done without detections at all and look to the user as normal behavior of the system. By: Adar Peleg | Cyber Researcher, Technion Stav Cohen | PhD Student, Technion Shaked Adi | Student & Researcher, ATLAS - The Technion's AI Security Lab Dvir Alsheich | Student & Researcher, ATLAS - The Technion's AI Security Lab Rom Himelstein | Graduate Student & Supervisor, ATLAS - The Technion's AI Security Lab Amit LeVi | Principle AI Security Researcher & Advisor, ATLAS - Technion Lab: AI Trust, Learning, Architecture, Security Avi Mendelson | Head of the ATLAS Lab, Technion – Technical University Presentation Materials Available at: https://ift.tt/SN8hlKe

source https://www.youtube.com/watch?v=X_Qb_EVDQx4

No comments:

Post a Comment