Appdome has announced the availability of new dynamic defense plugins to detect and defend against Agentic AI Malware and unauthorized AI Assistants controlling Android & iOS devices and applications. The new Detect Agentic AI Malware plugins allow mobile brands and enterprises to know when Agentic AI applications interact with their mobile apps and use the data to prevent sensitive data leaks and block unvetted on-device AI Agents from accessing transaction, account, or enterprise data and services.
Agentic AI Assistants – such as Apple Siri, Google Gemini, Microsoft Copilot, OpenAI ChatGPT, and others—are increasingly available to mobile users in consumer and enterprise environments. However, the same capabilities that make AI Assistants useful to consumers and employees can also be used by Agentic AI Malware and Trojans. Good and bad AI Assistants can gain broad runtime access to screen content, UI overlays, activity streams, user interactions, and contextual data. Malicious AI Assistants can exploit this access to perform data harvesting, session hijacking, and account takeovers—often under the guise of legitimate AI functionality. On Android, this risk is amplified by more permissive APIs. On iOS, threats extend to mirroring-based leaks (e.g., via AirPlay) and enterprise-targeted surveillance.
Agentic AI assistants have wide appeal in internal enterprise and public-facing consumer use cases. However, in consumer use cases—like banking, eWallet, and healthcare applications—some brands might take the view that, for now, the risks outweigh the benefits. Currently, whatever a good AI assistant can do, a bad AI Assistant can do. Both can access, extract or input credentials, intercept transactions, and send messages to other users. In enterprise environments, malicious AI Assistants could perform actions as the employee, accessing proprietary systems, leak sensitive documents, or create entry points for lateral compromise. Wrapped or re-skinned AI apps—especially unofficial or third-party clones of tools like ChatGPT—further increase the attack footprint, often requesting dangerous (overreaching) permissions and quietly transmitting captured data to external servers. Without real-time detection and control, mobile brands remain exposed to surveillance, compliance failures, and data loss at scale.
Security researchers have observed that malicious AI Assistants can extract session data, cryptographic tokens, or decrypted content by analyzing on-screen information in real time. These apps often masquerade as legitimate voice assistants, and once granted access, can silently monitor users’ activity. Furthermore, when coupled with generative AI models, attackers can script automated reconnaissance, tampering, or replay of sensitive operations inside apps.
Appdome’s new Detect Agentic AI Malware plugin uses behavioral biometrics to detect the techniques that malicious or unauthorized AI Assistants use to interact with an Android or iOS application in real time. This includes official, third-party, or wrapped AI apps that impersonate trusted tools or gain elevated permissions. Mobile brands and enterprises can use Appdome to monitor AI Assistant use or detect and defend against Agent AI Assistants using multiple evaluation, enforcement and mitigation options. Mobile brands and enterprises can also specify any number of Trusted AI Assistants, to guarantee that users have access to approved and legitimate Agentic AI Assistants.
To learn more about Appdome malware protection, including Detect Agentic AI Malware, please visit https://www.appdome.com/mobile-malware-prevention/.
A Number Of Companies Have Been Pwned Via A Supply Chain Attack
Posted in Commentary with tags Hacked on June 18, 2025 by itnerdUBS Group, Pictet and Implenia said they were among the companies affected by a cyberattack on procurement firm Chain IQ. Here’s the details:
Swiss banks UBS and Pictet said on Wednesday they had suffered a data leak due to a cyber attack on a provider in Switzerland that did not compromise client information, although a report said thousands of UBS workers’ data was affected.
Swiss newspaper Le Temps said that files containing details of tens of thousands of UBS employees were stolen from the Baar-based business service company Chain IQ, whose website lists KPMG and Mizuho among its clients.
A cyber attack at an external supplier has led to information about UBS and several other companies being stolen. No client data has been affected,” UBS said.
“As soon as UBS became aware of the incident, it took swift and decisive action to avoid any impact on its operations.”
The leaked cache also included the number of a direct internal line to UBS CEO Sergio Ermotti, Le Temps reported.
Chain IQ said it and 19 other companies were targeted in the attack, resulting in leaked data being published online on the darknet – a part of the internet not accessible through standard search engines.
Ensar Seker, CISO at SOCRadar had this to say:
“The Chain IQ breach underscores the persistent and growing risk of third-party exposure in today’s interconnected enterprise ecosystem. When suppliers hold sensitive operational or financial data, even in the absence of client PII, they become a highly attractive target for threat actors seeking leverage, intelligence, or access pathways into high-value organizations.
“What’s notable here is that the breach impacted major financial and consulting institutions, which typically maintain rigorous internal security controls. This demonstrates that the weakest link often lies outside the perimeter.
From a threat intelligence perspective, leaks involving executive or employee-level data, especially those of high-profile individuals like UBS’s CEO, increase the likelihood of targeted phishing, social engineering, or even impersonation attempts. Even when no client data is compromised, operational metadata like invoice histories, consultant relationships, or IT supplier engagements can provide adversaries with useful insights for crafting sophisticated campaigns. This is a classic case where traditional third-party risk management needs to mature into continuous fourth-party visibility and active vendor monitoring. Organizations must go beyond one-time assessments and require vendors to maintain threat detection telemetry, incident reporting SLAs, and breach simulation exercises. Additionally, platforms that provide real-time breach alerts on vendors such as DRP and supply chain intelligence solutions are no longer optional but essential to reduce response lag.
“Chain IQ’s breach serves as yet another reminder that “trust, but verify” is not just a saying, it should be embedded into every enterprise’s third-party governance model.”
James McQuiggan, Security Awareness Advocate at KnowBe4 follows with this:
“Trust alone isn’t enough when it comes to third-party risk and cybersecurity. Organizations need to manage third-party risk actively. Don’t rely on a one-time assessment or questionnaire. It’s crucial to consider regularly reviewing vendors’ protection of their data and systems. Keep checking in, especially with vendors that handle sensitive information. When a vendor is compromised, a quick response can be significant.
“Organizations should have a well-documented and repeatable plan for handling a third-party incident or breach. Consider how to isolate the issue, who to contact, and how to communicate with employees and partners. Rate your vendors based on risk levels: one that has strong security programs versus one that does not. Higher risk vendors require additional oversight and tighter security controls.”
You’re only as secure as your suppliers are. Organizations need to start buying into that by acting accordingly when it comes to their security. If a significant amount of organizations did that, supply chain attacks would be greatly reduced.
Leave a comment »