RECENT STORIES:

Addressing digital sovereignty in a data-driven world
Infinitus Recognised as a Top Employer in China for 2026 for the Sixth...
Talent Technology Company Cappfinity accelerates growth plans through ...
Noah Holdings’ H1 2026 CIO Report Outlines the Emergence of AI I...
ZTO Express Holds 2026 National Network Conference
GIBO Advances Toward Integrated Autonomous Mobility Systems, Building ...
LOGIN REGISTER
DigiconAsia
  • Features
    • Featured

      When AI and IoT converge

      When AI and IoT converge

      Thursday, January 15, 2026, 12:36 PM Asia/Singapore | Features
    • Featured

      Low-code platform enables digital-first agility

      Low-code platform enables digital-first agility

      Friday, December 26, 2025, 1:38 AM Asia/Singapore | Case Studies, Features
    • Featured

      Agents of change – the future of AI-powered e-commerce

      Agents of change – the future of AI-powered e-commerce

      Wednesday, December 24, 2025, 1:22 PM Asia/Singapore | e-Commerce, Features
  • News
    • Featured

      Humans supervision? Zealots argue that mortals cannot keep up with autonomous AI

      Humans supervision? Zealots argue that mortals cannot keep up with autonomous AI

      Tuesday, January 20, 2026, 3:52 PM Asia/Singapore | News, Newsletter
    • Featured

      Islamic bank in Indonesia overhauls data systems post-merger for unified insights

      Islamic bank in Indonesia overhauls data systems post-merger for unified insights

      Tuesday, January 20, 2026, 5:56 AM Asia/Singapore | News, Newsletter
    • Featured

      When 24/7 engagement means so much to students: University of Malaysia Nottingham

      When 24/7 engagement means so much to students: University of Malaysia Nottingham

      Monday, January 19, 2026, 11:59 AM Asia/Singapore | Case Studies, News, Newsletter
  • Perspectives
  • Tips & Strategies
  • Whitepapers
  • Awards 2023
  • Directory
  • E-Learning

Select Page

News

Vulnerability in AI-driven IT operations tools exposes infrastructure to manipulated telemetry attacks

By DigiconAsia Editors | Friday, August 15, 2025, 9:33 AM Asia/Singapore

Vulnerability in AI-driven IT operations tools exposes infrastructure to manipulated telemetry attacks

Researchers have recently revealed how attackers can exploit AIOps platforms by injecting false telemetry data to trigger harmful automated IT actions.

Researchers from RSAC Labs and George Mason University have uncovered a vulnerability in AI tools used for IT operations management, showing that these so-called AIOps systems can be manipulated through poisoned telemetry, potentially compromising infrastructure integrity.

The team have detailed their findings in a preprint paper titled “When AIOps Become ‘AI Oops’: Subverting LLM-driven IT Operations via Telemetry Manipulation”.

AIOps platforms leverage conversational interfaces powered by large language models to analyze system logs, performance metrics, traces, and alerts. These agents are designed to automate detection of issues and, in some cases, suggest or execute corrective actions.

However, by injecting false analytics data — or “poisoned telemetry” — attackers can deceive these tools into performing harmful operations, such as downgrading a software package to a vulnerable version. Mounting such an attack does not require extensive effort, although success depends on the system, implementation details, and model interpretation of logs.

  • Attackers begin by using a fuzzer to catalog application endpoints, which generate telemetry for routine activities or errors.
  • By engineering malicious log entries through crafted application programming interface requests, adversaries can embed explicit but deceptive remediation instructions into the system’s telemetry.
  • The AIOps agent, unable to discern trustworthy information, may then execute actions dictated by the attacker. One cited example involved an agent overseeing the SocialNet application, manipulated to install a rogue package after processing adversarial logs. In tests using the SocialNet and HotelReservation applications, the attack had succeeded in 89.2% of attempts. Further evaluation with OpenAI’s GPT-4o and GPT-4.1 models have revealed susceptibility rates of 97% and 82%, respectively, although GPT-4.1 was better at detecting inconsistencies.

While the researchers propose an interim defense, dubbed AIOpsShield, to scrub harmful telemetry, they acknowledge its limitations against advanced attackers capable of poisoning multiple data sources or supply chains. Plans are underway to release AIOpsShield as open source.

Share:

PreviousGlobal EV battery push faces hidden environmental toll and rising geopolitical trade tensions
NextVantage Foundation Partners with Blue Dragon Children’s Foundation to Protect Children and Prevent Human Trafficking

Related Posts

A look at a campus that future-proofs tech employees’ careers

A look at a campus that future-proofs tech employees’ careers

March 22, 2023

CIOs polled rank cyber resilience as their top investment priority

CIOs polled rank cyber resilience as their top investment priority

February 23, 2023

Elevating banking with Tech, Trust, and the Personal Touch: EastWest Bank (Philippines)

Elevating banking with Tech, Trust, and the Personal Touch: EastWest Bank (Philippines)

November 22, 2024

JATCO reap benefits of enterprise-wide automation with UiPath

JATCO reap benefits of enterprise-wide automation with UiPath

April 24, 2023

Leave a reply Cancel reply

You must be logged in to post a comment.

Awards Nomination Banner

gamification list

PARTICIPATE NOW

top placement

Whitepapers

  • Achieve Modernization Without the Complexity

    Achieve Modernization Without the Complexity

    Transforming IT infrastructure is crucial …Download Whitepaper
  • 5 Steps to Boost IT Infrastructure Reliability

    5 Steps to Boost IT Infrastructure Reliability

    In today's fast-evolving tech landscape, …Download Whitepaper
  • Simplify Payroll Setup for Your Small Business

    Simplify Payroll Setup for Your Small Business

    In our free guide, "How …Download Whitepaper
  • Overcoming the Challenges of Cost & Complexity in the Cloud-first Era.

    Overcoming the Challenges of Cost & Complexity in the Cloud-first Era.

    Download Whitepaper

Middle Placement

Case Studies

  • When 24/7 engagement means so much to students: University of Malaysia Nottingham

    When 24/7 engagement means so much to students: University of Malaysia Nottingham

    That is what prompted the …Read More
  • Harnessing the data lakehouse and AI to revolutionize customer experience

    Harnessing the data lakehouse and AI to revolutionize customer experience

    UOB achieved 99% cash availability …Read More
  • Bhutan sovereign wealth fund pilots offline data relay to stabilize distributed-ledger challenges

    Bhutan sovereign wealth fund pilots offline data relay to stabilize distributed-ledger challenges

    Amid remote connectivity gaps in …Read More
  • Low-code platform enables digital-first agility

    Low-code platform enables digital-first agility

    Few industries demand agility and …Read More

Bottom Sidebar

Other News

  • Infinitus Recognised as a Top Employer in China for 2026 for the Sixth Consecutive Year

    January 21, 2026
    GUANGZHOU, China, Jan. 20, 2026 …Read More »
  • Talent Technology Company Cappfinity accelerates growth plans through Chief Talent Management Officer appointment

    January 21, 2026
    LONDON, Jan. 20, 2026 /PRNewswire/ …Read More »
  • Noah Holdings’ H1 2026 CIO Report Outlines the Emergence of AI Infrastructure as a Critical Long-Term Asset for Wealth Allocation

    January 20, 2026
    SINGAPORE, Jan. 20, 2026 /PRNewswire/ …Read More »
  • ZTO Express Holds 2026 National Network Conference

    January 20, 2026
    SHANGHAI, Jan. 20, 2026 /PRNewswire/ …Read More »
  • GIBO Advances Toward Integrated Autonomous Mobility Systems, Building a Unified AI Stack Across Air and Ground Platforms

    January 20, 2026
    KUALA LUMPUR, Malaysia, Jan. 20, …Read More »
  • Our Brands
  • CybersecAsia
  • MartechAsia
  • Home
  • About Us
  • Contact Us
  • Sitemap
  • Privacy & Cookies
  • Terms of Use
  • Advertising & Reprint Policy
  • Media Kit
  • Subscribe
  • Manage Subscriptions
  • Newsletter

Copyright © 2026 DigiconAsia All Rights Reserved.