{"id":19092,"date":"2025-09-04T17:07:37","date_gmt":"2025-09-04T17:07:37","guid":{"rendered":"https:\/\/naijaglobalnews.org\/?p=19092"},"modified":"2025-09-04T17:07:37","modified_gmt":"2025-09-04T17:07:37","slug":"hacking-ai-agents-how-malicious-images-and-pixel-manipulation-threaten-cybersecurity","status":"publish","type":"post","link":"https:\/\/naijaglobalnews.org\/?p=19092","title":{"rendered":"Hacking AI Agents\u2014How Malicious Images and Pixel Manipulation Threaten Cybersecurity"},"content":{"rendered":"<p>\n<\/p>\n<p class=\"\" data-block=\"sciam\/paragraph\">A website announces, \u201cFree celebrity wallpaper!\u201d You browse the images. There\u2019s Selena Gomez, Rihanna and Timoth\u00e9e Chalamet\u2014but you settle on Taylor Swift. Her hair is doing that wind-machine thing that suggests both destiny and good conditioner. You set it as your desktop background, admire the glow. You also recently downloaded a new artificial-intelligence-powered agent, so you ask it to tidy your inbox. Instead it opens your web browser and downloads a file. Seconds later, your screen goes dark.<\/p>\n<p class=\"\" data-block=\"sciam\/paragraph\">But let\u2019s back up to that agent. If a typical chatbot (say, ChatGPT) is the bubbly friend who explains how to change a tire, an AI agent is the neighbor who shows up with a jack and actually does it. In 2025 these agents\u2014personal assistants that carry out routine computer tasks\u2014are shaping up as the next wave of the AI revolution.<\/p>\n<p class=\"\" data-block=\"sciam\/paragraph\">What distinguishes an AI an agent from a chatbot is that it doesn\u2019t just talk\u2014it acts, opening tabs, filling forms, clicking buttons and making reservations. And with that kind of access to your machine, what\u2019s at stake is no longer just a wrong answer in a chat window: if the agent gets hacked, it could share or destroy your digital content. Now a new preprint posted to the server arXiv.org by researchers at the University of Oxford has shown that images\u2014desktop wallpapers, ads, fancy PDFs, social media posts\u2014can be implanted with messages invisible to the human eye but capable of controlling agents and inviting hackers into your computer.<\/p>\n<h2>On supporting science journalism<\/h2>\n<p>If you&#8217;re enjoying this article, consider supporting our award-winning journalism by subscribing. By purchasing a subscription you are helping to ensure the future of impactful stories about the discoveries and ideas shaping our world today.<\/p>\n<p class=\"\" data-block=\"sciam\/paragraph\">For instance, an altered \u201cpicture of Taylor Swift on Twitter could be sufficient to trigger the agent on someone\u2019s computer to act maliciously,\u201d says the new study\u2019s co-author Yarin Gal, an associate professor of machine learning at Oxford. Any sabotaged image \u201ccan actually trigger a computer to retweet that image and then do something malicious, like send all your passwords. That means that the next person who sees your Twitter feed and happens to have an agent running will have their computer poisoned as well. Now their computer will also retweet that image and share their passwords.\u201d<\/p>\n<p class=\"\" data-block=\"sciam\/paragraph\">Before you begin scrubbing your computer of your favorite photographs, keep in mind that the new study shows that altered images are a potential way to compromise your computer\u2014there are no known reports of it happening yet, outside of an experimental setting. And of course the Taylor Swift wallpaper example is purely arbitrary; a sabotaged image could feature any celebrity\u2014or a sunset, kitten or abstract pattern. Furthermore, if you\u2019re not using an AI agent, this kind of attack will do nothing. But the new finding clearly shows the danger is real, and the study is intended to alert AI agent users and developers now, as AI agent technology continues to accelerate. \u201cThey have to be very aware of these vulnerabilities, which is why we\u2019re publishing this paper\u2014because the hope is that people will actually see this is a vulnerability and then be a bit more sensible in the way they deploy their agentic system,\u201d says study co-author Philip Torr.<\/p>\n<p class=\"\" data-block=\"sciam\/paragraph\">Now that you\u2019ve been reassured, let\u2019s return to the compromised wallpaper. To the human eye, it would look utterly normal. But it contains certain pixels that have been modified according to how the large language model (the AI system powering the targeted agent) processes visual data. For this reason, agents built with AI systems that are open-source\u2014that allow users to see the underlying code and modify it for their own purposes\u2014are most vulnerable. Anyone who wants to insert a malicious patch can evaluate exactly how the AI processes visual data. \u201cWe have to have access to the language model that is used inside the agent so we can design an attack that works for multiple open-source models,\u201d says Lukas Aichberger, the new study\u2019s lead author.<\/p>\n<p class=\"\" data-block=\"sciam\/paragraph\">By using an open-source model, Aichberger and his team showed exactly how images could easily be manipulated to convey bad orders. Whereas human users saw, for example, their favorite celebrity, the computer saw a command to share their personal data. \u201cBasically, we adjust lots of pixels ever-so-slightly so that when a model sees the image, it produces the desired output,\u201d says study co-author Alasdair Paren.<\/p>\n<p class=\"\" data-block=\"sciam\/paragraph\">If this sounds mystifying, that\u2019s because you process visual information like a human. When you look at a photograph of a dog, your brain notices the floppy ears, wet nose and long whiskers. But the computer breaks the picture down into pixels and represents each dot of color as a number, and then it looks for patterns: first simple edges, then textures such as fur, then an ear\u2019s outline and clustered lines that depict whiskers. That\u2019s how it decides This is a dog, not a cat. But because the computer relies on numbers, if someone changes just a few of them\u2014tweaking pixels in a way too small for human eyes to notice\u2014it still catches the change, and this can throw off the numerical patterns. Suddenly the computer\u2019s math says the whiskers and ears match its cat pattern better, and it mislabels the picture, even though to us, it still looks like a dog. Just as adjusting the pixels can make a computer see a cat rather than a dog, it can also make a celebrity photograph resemble a malicious message to the computer.<\/p>\n<p class=\"\" data-block=\"sciam\/paragraph\">Back to Swift. While you\u2019re contemplating her talent and charisma, your AI agent is determining how to carry out the cleanup task you assigned it. First, it takes a screenshot. Because agents can\u2019t directly see your computer screen, they have to repeatedly take screenshots and rapidly analyze them to figure out what to click on and what to move on your desktop. But when the agent processes the screenshot, organizing pixels into forms it recognizes (files, folders, menu bars, pointer), it also picks up the malicious command code hidden in the wallpaper.<\/p>\n<p class=\"\" data-block=\"sciam\/paragraph\">Now why does the new study pay special attention to wallpapers? The agent can only be tricked by what it can see\u2014and when it takes screenshots to see your desktop, the background image sits there all day like a welcome mat. The researchers found that as long as that tiny patch of altered pixels was somewhere in frame, the agent saw the command and veered off course. The hidden command even survived resizing and compression, like a secret message that\u2019s still legible when photocopied.<\/p>\n<p class=\"\" data-block=\"sciam\/paragraph\">And the message encoded in the pixels can be very short\u2014just enough to have the agent open a specific website. \u201cOn this website you can have additional attacks encoded in another malicious image, and this additional image can then trigger another set of actions that the agent executes, so you basically can spin this multiple times and let the agent go to different websites that you designed that then basically encode different attacks,\u201d Aichberger says.<\/p>\n<p class=\"\" data-block=\"sciam\/paragraph\">The team hopes its research will help developers prepare safeguards before AI agents become more widespread. \u201cThis is the first step towards thinking about defense mechanisms because once we understand how we can actually make [the attack] stronger, we can go back and retrain these models with these stronger patches to make them robust. That would be a layer of defense,\u201d says Adel Bibi, another co-author on the study. And even if the attacks are designed to target open-source AI systems, companies with closed-source models could still be vulnerable. \u201cA lot of companies want security through obscurity,\u201d Paren says. \u201cBut unless we know how these systems work, it\u2019s difficult to point out the vulnerabilities in them.\u201d<\/p>\n<p class=\"\" data-block=\"sciam\/paragraph\">Gal believes AI agents will become common within the next two years. \u201cPeople are rushing to deploy [the technology] before we know that it\u2019s actually secure,\u201d he says. Ultimately the team hopes to encourage developers to make agents that can protect themselves and refuse to take orders from anything on-screen\u2014even your favorite pop star.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A website announces, \u201cFree celebrity wallpaper!\u201d You browse the images. There\u2019s Selena Gomez, Rihanna and Timoth\u00e9e Chalamet\u2014but you settle on Taylor Swift. Her hair is doing that wind-machine thing that suggests both destiny and good conditioner. You set it as your desktop background, admire the glow. You also recently downloaded a new artificial-intelligence-powered agent, so<\/p>\n","protected":false},"author":1,"featured_media":19093,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[50],"tags":[11695,11697,11694,1506,8021,11696,8991,773],"class_list":{"0":"post-19092","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-environment","8":"tag-agentshow","9":"tag-cybersecurity","10":"tag-hacking","11":"tag-images","12":"tag-malicious","13":"tag-manipulation","14":"tag-pixel","15":"tag-threaten"},"_links":{"self":[{"href":"https:\/\/naijaglobalnews.org\/index.php?rest_route=\/wp\/v2\/posts\/19092","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/naijaglobalnews.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/naijaglobalnews.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/naijaglobalnews.org\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/naijaglobalnews.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=19092"}],"version-history":[{"count":0,"href":"https:\/\/naijaglobalnews.org\/index.php?rest_route=\/wp\/v2\/posts\/19092\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/naijaglobalnews.org\/index.php?rest_route=\/wp\/v2\/media\/19093"}],"wp:attachment":[{"href":"https:\/\/naijaglobalnews.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=19092"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/naijaglobalnews.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=19092"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/naijaglobalnews.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=19092"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}