Skip to content

Comments

AI in the Middle Turning Web-Based AI Services into C2 Proxi...#1905

Open
carlospolop wants to merge 1 commit intomasterfrom
update_AI_in_the_Middle__Turning_Web-Based_AI_Services_in_20260217_185658
Open

AI in the Middle Turning Web-Based AI Services into C2 Proxi...#1905
carlospolop wants to merge 1 commit intomasterfrom
update_AI_in_the_Middle__Turning_Web-Based_AI_Services_in_20260217_185658

Conversation

@carlospolop
Copy link
Collaborator

🤖 Automated Content Update

This PR was automatically generated by the HackTricks News Bot based on a technical blog post.

📝 Source Information

🎯 Content Summary

Title/Topic: “AI in the Middle” (Check Point Research) describes a service-abuse technique where web-based AI assistants that support web browsing / URL fetching can be coerced into acting as a covert command-and-control (C2) proxy. This is not a memory-corruption vulnerability and no CVE is involved; the risk comes from combining (1) anonymous access to the AI web app and (2) the assistant’s ability to fetch attacker-controlled URLs<...

🔧 Technical Details

Trick 1 — Web-based AI assistant as a C2 proxy via URL fetching: If an AI webchat can fetch external URLs (browsing/URL retrieval) and include retrieved content in its response, malware can build a bidirectional C2 channel by repeatedly prompting “summarize this URL.” Exfiltrate victim data by appending it to the fetched URL as structured query parameters, and receive commands by embedding machine-readable fields in the fetched HTML so the model reproduces them in its summary/answer, which the implant then parses and executes.

Trick 2 — Bypassing simplistic prompt/content safeguards with high-entropy encoding: When AI services try to block/sanitize obviously malicious or sensitive-looking query parameters, encode or encrypt the exfil data into a high-entropy blob so it appears opaque/benign to shallow filters while remaining recoverable server-side.

Trick 3 — Use embedded browsers (WebView) to automate AI web UIs and avoid API keys / raw-HTTP detection:<...

🤖 Agent Actions

Updated phishing-methodology/ai-agent-mode-phishing-abusing-hosted-agent-browsers.md with a new section detailing abuse of web-based AI assistants as covert C2 proxies via browsing/URL-fetch features (exfil via query params, HTML-embedded commands, high-entropy encoding bypass, domain/TLS requirements) and automation tactics using hidden WebView2 sessions with provider-specific flows (Grok q param, Copilot JS injection). References now include the Check Point “AI in the Middle” research.


This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.

@carlospolop
Copy link
Collaborator Author

🔗 Additional Context

Original Blog Post: https://research.checkpoint.com/2026/ai-in-the-middle-turning-web-based-ai-services-into-c2-proxies-the-future-of-ai-driven-attacks/

Content Categories: Based on the analysis, this content was categorized under "Generic Hacking -> Exfiltration (or a new page under Phishing Methodology/AI Security: "AI agent/service abuse" / "AI web assistants as C2 proxies")".

Repository Maintenance:

  • MD Files Formatting: 948 files processed

Review Notes:

  • This content was automatically processed and may require human review for accuracy
  • Check that the placement within the repository structure is appropriate
  • Verify that all technical details are correct and up-to-date
  • All .md files have been checked for proper formatting (headers, includes, etc.)

Bot Version: HackTricks News Bot v1.0

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant