AI & TechArtificial IntelligenceCybersecurityNewswireTechnology

The Looming Threat of Malicious AI Agents

▼ Summary

– Identity management is broken for AI agents, creating security risks as enterprises deploy them without proper visibility into agent credentials and access.
AI agents expand organizations’ threat surface by gaining privileged access to corporate systems and sensitive information like human workers.
– Enterprises are unprepared for securing AI agents, lacking infrastructure and planning while facing increased attacks using automated credential theft methods.
Palo Alto Networks is addressing this by integrating identity management tools and developing AI security agents to automate threat detection and response.
– Security automation products like Cortex AgentiX use AI agents to analyze massive data sets, though human oversight remains crucial for approving actions initially.

Businesses are rapidly adopting artificial intelligence agents, yet many remain dangerously unprepared for the security risks these autonomous programs introduce. According to Nikesh Arora, CEO of Palo Alto Networks, executives are growing concerned about the potential chaos AI agents could create within corporate systems. The core issue revolves around identity management. Organizations lack the visibility to track what credentials these non-human workers possess or what actions they perform, creating a digital Wild West inside enterprise platforms.

AI agents are software programs that extend beyond basic language models by connecting to external resources. This allows them to execute a wide range of tasks automatically. A simple example is a chatbot with access to company databases through retrieval-augmented generation. More complex agents might simultaneously coordinate multiple software applications using protocols like the Model Context Protocol. As commercial software increasingly incorporates these automated functions, they take over duties traditionally handled by people.

The fundamental security challenge lies in the access these agents require. They interact with sensitive corporate systems much like human employees, but the technology for managing their identities and permissions hasn’t kept pace with their rapid deployment. Arora notes that while companies recognize the need for security, they haven’t fully grasped the scale of investment and planning required to properly secure these automated workers. Many organizations operate under the false assumption that their current security measures provide adequate protection.

The identity management framework most companies rely on is fundamentally broken when applied to AI agents. Current systems primarily focus on tracking privileged human users through privileged access management tools. However, these systems fail to monitor the majority of regular users, and now AI agents, creating massive security blind spots. As Arora explains, it’s currently too expensive for most organizations to track every employee’s activities, let alone the growing army of AI agents.

This vulnerability becomes particularly dangerous as AI agents expand what security experts call the “threat surface”, the total number of potential entry points for attacks. Every agent represents both a regular user and potentially a privileged user at different times. Without proper tracking, any agent could eventually access an organization’s most valuable digital assets. The problem intensifies as malicious actors increasingly deploy their own AI agents to infiltrate systems and steal data.

Nation-state cyberattacks and automated smishing campaigns, phishing via text message, further complicate the security landscape. Palo Alto’s research has identified nearly 200,000 internet domains actively propagating these text-based attacks, which aim to trick smartphone users into surrendering sensitive credentials that can be used to impersonate privileged users within organizations.

Addressing these challenges requires a two-pronged approach according to Arora. First, companies need unified identity management platforms that can track both human and non-human identities across all systems. Palo Alto Networks is integrating technology from its CyberArk acquisition to create cohesive identity management solutions that span privileged users, regular employees, and AI agents across cloud environments and production workloads.

The second solution involves fighting fire with fire, using AI agents to secure against malicious AI agents. Palo Alto’s Cortex AgentiX platform employs automation trained on billions of real-world cyber threat scenarios to hunt for emerging attack techniques. These security agents can analyze endpoints and gather forensic data after incidents, allowing human security analysts to focus on complex decision-making rather than sifting through terabytes of data manually.

Currently, most security implementations keep humans in the approval loop, where analysts review AI agent actions before they’re executed. However, Arora anticipates that as confidence in these systems grows, organizations will gradually grant more autonomy to security agents that consistently demonstrate reliable performance. This evolution represents the future of enterprise security, where AI agents both create new vulnerabilities and provide the tools to defend against them.

(Source: ZDNET)

Topics

ai agents 98% identity management 95% cybersecurity threats 93% privileged access 90% enterprise security 88% threat surface 85% security automation 83% agent security 82% credential management 80% soc operations 78%