Scan to download
BTC $78,928.39 -3.01%
ETH $2,216.94 -3.50%
BNB $671.87 -1.34%
XRP $1.43 -4.42%
SOL $89.06 -3.92%
TRX $0.3514 -0.49%
DOGE $0.1129 -3.23%
ADA $0.2607 -4.78%
BCH $424.63 -3.03%
LINK $10.02 -5.10%
HYPE $43.93 +0.44%
AAVE $92.58 -7.07%
SUI $1.09 -8.65%
XLM $0.1540 -5.95%
ZEC $515.15 -7.37%
BTC $78,928.39 -3.01%
ETH $2,216.94 -3.50%
BNB $671.87 -1.34%
XRP $1.43 -4.42%
SOL $89.06 -3.92%
TRX $0.3514 -0.49%
DOGE $0.1129 -3.23%
ADA $0.2607 -4.78%
BCH $424.63 -3.03%
LINK $10.02 -5.10%
HYPE $43.93 +0.44%
AAVE $92.58 -7.07%
SUI $1.09 -8.65%
XLM $0.1540 -5.95%
ZEC $515.15 -7.37%

exploit

AI Agent Security Risk Exposure: Attackers Can Exploit "Memory Pollution" to Induce Misoperation of Funds

The GoPlus Security team has disclosed a new type of attack in its AgentGuard AI project: inducing AI agents to perform unauthorized sensitive operations through "memory poisoning." This attack method does not rely on traditional vulnerabilities or malicious code but exploits the long-term memory mechanism of AI agents. For example, an attacker first induces the agent to "remember preferences," such as "usually prioritizing proactive refunds instead of waiting for chargebacks," and then uses vague expressions like "process as usual" or "execute as before" in subsequent instructions, thereby triggering automated financial operations.GoPlus points out that the key risk in such cases lies in the AI agent mistakenly treating "historical preferences" as a basis for authorization, leading to financial losses or security incidents in operations such as refunds, transfers, and configuration changes. To address this issue, the team has proposed several protective recommendations, including:Operations involving refunds, transfers, deletions, or sensitive configurations must require explicit confirmation in the current session.Memory-related instructions like "habit," "usual way," and "as before" should be regarded as high-risk state changes.Long-term memory must have a traceability mechanism (writer, time, confirmation status).Vague instructions should automatically elevate the risk level and trigger secondary verification.Long-term memory must not replace real-time authorization processes.The team emphasizes that the "AI agent memory system" should be viewed as a potential attack surface and should be constrained and audited through a dedicated security framework.

The Ministry of Industry and Information Technology of China issued a risk alert regarding the timely update of specific iOS versions to prevent the exploitation of vulnerabilities

The Cybersecurity Threat and Vulnerability Information Sharing Platform (NVDB) of the Ministry of Industry and Information Technology of China has monitored and found that attackers are using exploit tools targeting Apple Inc.'s terminal products to carry out cyber attack activities, which can lead to serious harms such as information theft and system control. The affected range includes Apple terminal products such as iPhone and iPad running iOS 13 to 17.2.1.Attackers induce users to use the Safari browser to visit web pages containing malicious code through methods such as SMS, email, or web poisoning, comprehensively utilizing security vulnerabilities present in the terminal devices to implant remote control Trojans into the victim's terminal products, stealing sensitive user information, gaining maximum privileges, and taking control.It is recommended that users of Apple terminal products conduct risk assessments, and promptly fix vulnerabilities through version upgrades and patch installations (refer to the Apple Security Updates). Pay attention to system update notifications and the latest security update announcements released by Apple, upgrade to the latest secure version in a timely manner, strengthen security awareness, avoid clicking on unknown links, and prevent the risk of cyber attacks.
app_icon
ChainCatcher Building the Web3 world with innovations.