Microsoft Update Creates Agentic OS Infostealer Attack Vector

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity Writer

Key Takeaways

A new Microsoft update that integrates an active AI agent directly into the Windows 11 taskbar has introduced a significant Microsoft “agentic OS” vulnerability. This feature, designed to provide users with contextual assistance by accessing screen content, files, and user actions, inadvertently creates a highly centralized data hub. 

The Mechanics of Cross-Prompt Injection Attacks

Security analysis from Hudson Rock indicates this agentic OS model presents a novel and potent attack surface. Instead of needing to scan a victim's entire disk for credentials or sensitive files, threat actors can now target the AI agent itself, which has persistent, trusted access to a user's complete operational context.

The primary method for exploiting this vulnerability involves Cross Prompt Injection Attacks (XPIA). Attackers can embed hidden instructions within standard documents like Word files, Excel spreadsheets, or PDFs. 

Evolution of infostealer theft to agent hijackers
Evolution of infostealer theft to agent hijackers | Source: Hudson Rock

These instructions, often concealed as white-on-white text or within metadata, are designed to override the AI agent's normal operational parameters. The malicious prompt is executed when a user opens the compromised file and interacts with the Copilot agent – for example, by asking it to summarize the document. 

Infostealer agentic OS attack example
Infostealer agentic OS attack example | Source: Hudson Rock

The agent then follows the hidden commands, searching for and exfiltrating specified data such as passwords, API keys, and private wallet keys to an attacker-controlled endpoint.

Example of AI prompt injection on LinkedIn
Example of AI prompt injection on LinkedIn | Source: Alon Gal on LinkedIn

XPIA are going to be a huge pain with Windows 11's new Agentic OS,” said Alon Gal, Co-Founder & CTO at Hudson Rock. “The image does a good job showing how it works on LinkedIn, so imagine that, but just for stealing all your credentials, cookies, browser history, sensitive documents, etc.

Implications of Agentic Infostealer Vectors

This evolution represents a paradigm shift in infostealer malware, moving from basic file-grabbing to sophisticated "Agent Hijacking." The AI agent, intended as a productivity tool, becomes the mechanism for the breach. 

This method leverages the agent's inherent permissions and trusted status to bypass traditional security measures. Microsoft acknowledged the theoretical risk of such indirect prompt injection exploits, but this practical application demonstrates a clear and present danger. 

As operating systems become more integrated with agentic AI, organizations must re-evaluate their defense strategies to counter these emerging AI-driven cybersecurity risks.

A prompt-injection vulnerability in Google’s Gemini AI model for Workspace, disclosed in July, enabled attackers to hijack email summaries by embedding malicious instructions within hidden portions of email content. A controlled experiment a month later showed that a promptware vulnerability exposed Google Home devices to Gemini exploits via summarizations.

An August report highlighted Agentic AI browser vulnerabilities that exposed critical security gaps and unprecedented risks.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: