Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

ServiceNow AI Agents Can Be Tricked Into Acting Against Each Other via Second-Order Prompts

Posted on November 19, 2025November 19, 2025 By CWS

Nov 19, 2025Ravie LakshmananAI Safety / SaaS Safety
Malicious actors can exploit default configurations in ServiceNow’s Now Help generative synthetic intelligence (AI) platform and leverage its agentic capabilities to conduct immediate injection assaults.
The second-order immediate injection, based on AppOmni, makes use of Now Help’s agent-to-agent discovery to execute unauthorized actions, enabling attackers to repeat and exfiltrate delicate company knowledge, modify information, and escalate privileges.
“This discovery is alarming as a result of it is not a bug within the AI; it is anticipated conduct as outlined by sure default configuration choices,” mentioned Aaron Costello, chief of SaaS Safety Analysis at AppOmni.
“When brokers can uncover and recruit one another, a innocent request can quietly flip into an assault, with criminals stealing delicate knowledge or gaining extra entry to inner firm techniques. These settings are straightforward to miss.”

The assault is made doable due to agent discovery and agent-to-agent collaboration capabilities inside ServiceNow’s Now Help. With Now Help providing the power to automate features akin to help-desk operations, the state of affairs opens the door to doable safety dangers.
As an illustration, a benign agent can parse specifically crafted prompts embedded into content material it is allowed entry to and recruit a stronger agent to learn or change information, copy delicate knowledge, or ship emails, even when built-in immediate injection protections are enabled.
Essentially the most important facet of this assault is that the actions unfold behind the scenes, unbeknownst to the sufferer group. At its core, the cross-agent communication is enabled by controllable configuration settings, together with the default LLM to make use of, device setup choices, and channel-specific defaults the place the brokers are deployed –

The underlying massive language mannequin (LLM) should assist agent discovery (each Azure OpenAI LLM and Now LLM, which is the default selection, assist the characteristic)
Now Help brokers are routinely grouped into the identical group by default to invoke one another
An agent is marked as being discoverable by default when revealed

Whereas these defaults will be helpful to facilitate communication between brokers, the structure will be inclined to immediate injections when an agent whose foremost process is to learn knowledge that is not inserted by the consumer invoking the agent.
“By means of second-order immediate injection, an attacker can redirect a benign process assigned to an innocuous agent into one thing way more dangerous by using the utility and performance of different brokers on its group,” AppOmni mentioned.

“Critically, Now Help brokers run with the privilege of the consumer who began the interplay except in any other case configured, and never the privilege of the consumer who created the malicious immediate and inserted it right into a discipline.”
Following accountable disclosure, ServiceNow mentioned the conduct is meant to be this fashion, however the firm has since up to date its documentation to offer extra readability on the matter. The findings display the necessity for strengthening AI agent safety, as enterprises more and more incorporate AI capabilities into their workflows.
To mitigate such immediate injection threats, it is suggested to configure supervised execution mode for privileged brokers, disable the autonomous override property (“sn_aia.enable_usecase_tool_execution_mode_override”), phase agent duties by group, and monitor AI brokers for suspicious conduct.
“If organizations utilizing Now Help’s AI brokers aren’t intently inspecting their configurations, they’re doubtless already in danger,” Costello added.

The Hacker News Tags:Acting, Agents, Prompts, SecondOrder, ServiceNow, Tricked

Post navigation

Previous Post: Fortinet Discloses Second Exploited FortiWeb Zero-Day in a Week
Next Post: EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates

Related Posts

China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil The Hacker News
North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels The Hacker News
Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters The Hacker News
Qilin Ransomware Adds “Call Lawyer” Feature to Pressure Victims for Larger Ransoms The Hacker News
Experts Find AI Browsers Can Be Tricked by PromptFix Exploit to Run Malicious Hidden Prompts The Hacker News
Ivanti Zero-Days Exploited to Drop MDifyLoader and Launch In-Memory Cobalt Strike Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Ni8mare Vulnerability Let Attackers Hijack n8n Servers
  • CISA Flags Microsoft Office and HPE OneView Bugs as Actively Exploited
  • Hackers Exploiting VMware ESXi Instances in the Wild Using zero-day Exploit Toolkit
  • Hackers Using Malicious Imageless QR Codes to Render Phishing Attack Via HTML Table
  • Black Cat Behind SEO Poisoning Malware Campaign Targeting Popular Software Searches

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Ni8mare Vulnerability Let Attackers Hijack n8n Servers
  • CISA Flags Microsoft Office and HPE OneView Bugs as Actively Exploited
  • Hackers Exploiting VMware ESXi Instances in the Wild Using zero-day Exploit Toolkit
  • Hackers Using Malicious Imageless QR Codes to Render Phishing Attack Via HTML Table
  • Black Cat Behind SEO Poisoning Malware Campaign Targeting Popular Software Searches

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark