
Cybersecurity Today AI Agent Hacks McKinsey Chatbot in 2 Hours
Mar 13, 2026
Researchers used an autonomous AI agent to chain exposed APIs and an SQL injection to access an internal chatbot database. A supply-chain campaign pushed 88 malicious NPM packages that download runtime loaders to steal developer keys. A study found most leaked passwords still meet complexity rules, underscoring credential-stuffing risk. Over 14,000 routers show persistent malware, and neural-network trojans hide backdoors triggered by specific inputs.
AI Snips
Chapters
Transcript
Episode notes
Autonomous Agent Exploits Classic Flaws Fast
- An autonomous AI agent chained exposed APIs and an SQL injection to gain read/write access to McKinsey's Lilly in about two hours.
- The agent started from public systems and assembled classic web exploits at machine speed, exposing millions of chats and files in theory.
Harden Basics Before Adding AI Features
- Secure fundamentals: APIs, databases, and web services remain the primary attack surface for AI systems.
- Fix basic vulnerabilities quickly and run continuous automated probing because agents can discover weaknesses faster than humans.
Phantom Raven NPM Campaign Stole Developer Keys
- Phantom Raven published 88 malicious NPM packages that downloaded runtime payloads to steal SSH keys and environment details.
- Attackers used tiny loaders that fetch payloads at runtime and republished packages with slight changes to evade scanners.
