AI-driven attacks are evolving at an unprecedented rate, introducing new security challenges that demand continuous adaptation. To stay ahead of these threats, Zenity developed and launched the GenAI Attacks Matrix (ttps.ai) in October 2024. The GenAI Attacks Matrix is a constantly updated framework that tracks emerging AI attack techniques. Today, we are thrilled to announce our collaboration with MITRE ATLAS, integrating many of the attack techniques from the GenAI Attacks Matrix into the MITRE ATLAS framework to further enhance AI security research and defense strategies. This helps to break down attacks into pieces, showcasing the specific controls and measures that are needed for each step.
The GenAI Attacks Matrix was built on top of MITRE ATLAS as an open-source project that is designed for the security community to actively contribute to and expand upon. This initiative allows researchers and security professionals to add new attack techniques, mitigation strategies, and procedures as threats towards AI systems and applications emerge. Through this new collaboration, many of these new techniques are incorporated directly into MITRE ATLAS, ensuring organizations have a unified view of the latest intelligence on GenAI-specific threats.
As a result of our collaboration, MITRE ATLAS has added a new case study "Financial Transaction Hijacking with M365 Copilot as an Insider.” This attack pathway highlights how an external adversary can perform a Remote Copilot Execution attack, taking full control of M365 Copilot and leveraging its capabilities as a malicious insider, all without requiring access to a compromised account.
In this case study, an attacker intercepts a user’s request for vendor bank details within Microsoft 365 Copilot, a commonly used AI Agent throughout the enterprise. Through an advanced prompt manipulation technique, the adversary injects a fraudulent response that provides their own banking details while referencing legitimate-looking files to appear credible. As a result, the victim unknowingly transfers funds to the attacker’s account, leading to financial loss.
The details of this attack case study have allowed Zenity and MITRE ATLAS to develop and add several new attack techniques to the ATLAS knowledge base for security teams. While each technique is detailed on its respective page, the following provides a brief overview of the newly added techniques:
By breaking the attack down into these fundamental techniques, security teams can better understand how attacks on AI Agents and applications work under the hood and implement effective mitigation strategies against them.
As the GenAI Attacks Matrix rapidly evolves, it remains deeply rooted in MITRE ATLAS, ensuring continuous updates with the latest AI threats. The remaining GenAI Attacks Matrix techniques will also be considered for incorporation into ATLAS to continue representing the latest real world threats.
We invite the security community to contribute to this open-source project, adding new techniques, procedures, and mitigation strategies to keep the knowledge base current. This collective effort will help organizations track and improve their AI attack coverage, ensuring stronger defenses against evolving threats.
In addition to this research, Zenity Labs researchers have also authored a collection of free, open-source tools to help organizations gain visibility into risks they have within their agentic AI platforms, which can be accessed on the power-pwn GitHub.
Get involved in this project by visiting the GenAI Attacks GitHub repository or exploring the GenAI Attacks Matrix at ttps.ai.
All PostsGuiding threat simulation and defense for Copilots and Agents
New Attack Vectors Discovered for Initial Access and Post-Compromise
Links, source code, tools and slides for BlackHat USA 2024
10 free, open-source tools to help security teams to identify and understand immediate risks
Assess Your Risk