RECENT STORIES:

Addressing digital sovereignty in a data-driven world
YY Group Secures Five New Luxury Hotel Clients in Thailand
Trench Group acquires Australian technology firm H Nu
VPN101.com.hk Officially Launches: Hong Kong’s Go-To Hub for VPN...
NYSE Content Advisory: Pre-Market Update + President of South Korea ri...
SC Ventures and Fujitsu join forces to incubate Project Quanta
LOGIN REGISTER
DigiconAsia
  • Features
    • Featured

      Clearing away the shadows of AI

      Clearing away the shadows of AI

      Tuesday, September 23, 2025, 3:29 PM Asia/Singapore | Features
    • Featured

      Unlocking AI’s full potential in clinical trials

      Unlocking AI’s full potential in clinical trials

      Wednesday, September 17, 2025, 5:24 PM Asia/Singapore | Features
    • Featured

      Overcoming manufacturing challenges with the smart factory of the future

      Overcoming manufacturing challenges with the smart factory of the future

      Wednesday, September 3, 2025, 2:31 PM Asia/Singapore | Features
  • News
    • Featured

      EU finalizes financial data rules excluding major US tech firms for digital sovereignty

      EU finalizes financial data rules excluding major US tech firms for digital sovereignty

      Tuesday, September 23, 2025, 4:57 PM Asia/Singapore | News, Newsletter
    • Featured

      South Sulawesi partners Vietnamese firm on mega solar projects to boost renewable energy capacity

      South Sulawesi partners Vietnamese firm on mega solar projects to boost renewable energy capacity

      Tuesday, September 23, 2025, 2:44 PM Asia/Singapore | News, Newsletter, Smart Cities
    • Featured

      AI tools in healthcare show bias against women and minorities: academics

      AI tools in healthcare show bias against women and minorities: academics

      Tuesday, September 23, 2025, 1:54 PM Asia/Singapore | News, Newsletter
  • Perspectives
  • Tips & Strategies
  • Whitepapers
  • Awards 2023
  • Directory
  • E-Learning

Select Page

News

Vulnerability in AI-driven IT operations tools exposes infrastructure to manipulated telemetry attacks

By DigiconAsia Editors | Friday, August 15, 2025, 9:33 AM Asia/Singapore

Vulnerability in AI-driven IT operations tools exposes infrastructure to manipulated telemetry attacks

Researchers have recently revealed how attackers can exploit AIOps platforms by injecting false telemetry data to trigger harmful automated IT actions.

Researchers from RSAC Labs and George Mason University have uncovered a vulnerability in AI tools used for IT operations management, showing that these so-called AIOps systems can be manipulated through poisoned telemetry, potentially compromising infrastructure integrity.

The team have detailed their findings in a preprint paper titled “When AIOps Become ‘AI Oops’: Subverting LLM-driven IT Operations via Telemetry Manipulation”.

AIOps platforms leverage conversational interfaces powered by large language models to analyze system logs, performance metrics, traces, and alerts. These agents are designed to automate detection of issues and, in some cases, suggest or execute corrective actions.

However, by injecting false analytics data — or “poisoned telemetry” — attackers can deceive these tools into performing harmful operations, such as downgrading a software package to a vulnerable version. Mounting such an attack does not require extensive effort, although success depends on the system, implementation details, and model interpretation of logs.

  • Attackers begin by using a fuzzer to catalog application endpoints, which generate telemetry for routine activities or errors.
  • By engineering malicious log entries through crafted application programming interface requests, adversaries can embed explicit but deceptive remediation instructions into the system’s telemetry.
  • The AIOps agent, unable to discern trustworthy information, may then execute actions dictated by the attacker. One cited example involved an agent overseeing the SocialNet application, manipulated to install a rogue package after processing adversarial logs. In tests using the SocialNet and HotelReservation applications, the attack had succeeded in 89.2% of attempts. Further evaluation with OpenAI’s GPT-4o and GPT-4.1 models have revealed susceptibility rates of 97% and 82%, respectively, although GPT-4.1 was better at detecting inconsistencies.

While the researchers propose an interim defense, dubbed AIOpsShield, to scrub harmful telemetry, they acknowledge its limitations against advanced attackers capable of poisoning multiple data sources or supply chains. Plans are underway to release AIOpsShield as open source.

Share:

PreviousGlobal EV battery push faces hidden environmental toll and rising geopolitical trade tensions
NextVantage Foundation Partners with Blue Dragon Children’s Foundation to Protect Children and Prevent Human Trafficking

Related Posts

See how the pandemic sped up digital engagement and communication strategies

See how the pandemic sped up digital engagement and communication strategies

September 8, 2020

Is technology taking a heavier toll on global mental health?

Is technology taking a heavier toll on global mental health?

May 27, 2021

Zalora spearheads adoption of generative AI with six initiatives

Zalora spearheads adoption of generative AI with six initiatives

August 17, 2023

Preempting the perils of quantum computing

Preempting the perils of quantum computing

March 20, 2020

Leave a reply Cancel reply

You must be logged in to post a comment.

Awards Nomination Banner

gamification list

PARTICIPATE NOW

top placement

Whitepapers

  • Achieve Modernization Without the Complexity

    Achieve Modernization Without the Complexity

    Transforming IT infrastructure is crucial …Download Whitepaper
  • 5 Steps to Boost IT Infrastructure Reliability

    5 Steps to Boost IT Infrastructure Reliability

    In today's fast-evolving tech landscape, …Download Whitepaper
  • Simplify Payroll Setup for Your Small Business

    Simplify Payroll Setup for Your Small Business

    In our free guide, "How …Download Whitepaper
  • Overcoming the Challenges of Cost & Complexity in the Cloud-first Era.

    Overcoming the Challenges of Cost & Complexity in the Cloud-first Era.

    Download Whitepaper

Middle Placement

Case Studies

  • LVMH redefines payments in the global luxury sector with Adyen

    LVMH redefines payments in the global luxury sector with Adyen

    Frictionless payment solutions for seamless …Read More
  • Forget QR codes, Alipay is betting on you to tap its Tap!

    Forget QR codes, Alipay is betting on you to tap its Tap!

    When 80% of existing users/merchants …Read More
  • AXS modernizes legacy systems to prepare for regional expansion

    AXS modernizes legacy systems to prepare for regional expansion

    The 20-year-old payment service network …Read More
  • Gill Capital redefines retail product discovery with Google-quality search

    Gill Capital redefines retail product discovery with Google-quality search

    Harnessing generative AI, agentic AI …Read More

Bottom Sidebar

Other News

  • YY Group Secures Five New Luxury Hotel Clients in Thailand

    September 25, 2025
    SINGAPORE, Sept. 25, 2025 /PRNewswire/ …Read More »
  • Trench Group acquires Australian technology firm H Nu

    September 25, 2025
    Next-Generation Optical Instrument Transformers to …Read More »
  • VPN101.com.hk Officially Launches: Hong Kong’s Go-To Hub for VPN Reviews, Speed Tests, and Exclusive Deals

    September 25, 2025
    HONG KONG, Sept. 25, 2025 …Read More »
  • NYSE Content Advisory: Pre-Market Update + President of South Korea rings Opening Bell

    September 25, 2025
    NEW YORK, Sept. 25, 2025 …Read More »
  • SC Ventures and Fujitsu join forces to incubate Project Quanta

    September 25, 2025
    Joint venture will focus on …Read More »
  • Our Brands
  • CybersecAsia
  • MartechAsia
  • Home
  • About Us
  • Contact Us
  • Sitemap
  • Privacy & Cookies
  • Terms of Use
  • Advertising & Reprint Policy
  • Media Kit
  • Subscribe
  • Manage Subscriptions
  • Newsletter

Copyright © 2025 DigiconAsia All Rights Reserved.