RECENT STORIES:

Addressing digital sovereignty in a data-driven world
600 MW Monsoon Wind achieves commercial operation, delivering clean en...
Humanoid robots gain momentum, but hardware costs hold back mass adopt...
MetaOptics Ltd Registers Offer Document on its Listing on SGX Catalist
LiuGong Finance Indonesia Officially Launched and Customer Day Success...
Telin and ITCO Niaga Announce Visionary Collaboration to Strengthen In...
LOGIN REGISTER
DigiconAsia
  • Features
    • Featured

      From generative AI to agentic AI

      From generative AI to agentic AI

      Friday, August 29, 2025, 10:10 AM Asia/Singapore | Features
    • Featured

      Resilience the true benchmark for smart infrastructure

      Resilience the true benchmark for smart infrastructure

      Wednesday, August 27, 2025, 8:26 PM Asia/Singapore | Features, Smart Cities
    • Featured

      Studies show AI and automation the way forward for finance

      Studies show AI and automation the way forward for finance

      Wednesday, August 20, 2025, 10:07 AM Asia/Singapore | Features, News
  • News
    • Featured

      How are people in 15 countries leveraging AI for travel planning?

      How are people in 15 countries leveraging AI for travel planning?

      Monday, September 1, 2025, 2:49 PM Asia/Singapore | Future of Travel, News, Newsletter
    • Featured

      AI models of the human brain work, but scientists are confounded

      AI models of the human brain work, but scientists are confounded

      Monday, September 1, 2025, 2:20 PM Asia/Singapore | News, Newsletter
    • Featured

      One nation’s push against DEI disrupts steady global progress and harmony

      One nation’s push against DEI disrupts steady global progress and harmony

      Monday, September 1, 2025, 12:03 PM Asia/Singapore | News, Newsletter
  • Perspectives
  • Tips & Strategies
  • Whitepapers
  • Awards 2023
  • Directory
  • E-Learning

Select Page

News

Vulnerability in AI-driven IT operations tools exposes infrastructure to manipulated telemetry attacks

By DigiconAsia Editors | Friday, August 15, 2025, 9:33 AM Asia/Singapore

Vulnerability in AI-driven IT operations tools exposes infrastructure to manipulated telemetry attacks

Researchers have recently revealed how attackers can exploit AIOps platforms by injecting false telemetry data to trigger harmful automated IT actions.

Researchers from RSAC Labs and George Mason University have uncovered a vulnerability in AI tools used for IT operations management, showing that these so-called AIOps systems can be manipulated through poisoned telemetry, potentially compromising infrastructure integrity.

The team have detailed their findings in a preprint paper titled “When AIOps Become ‘AI Oops’: Subverting LLM-driven IT Operations via Telemetry Manipulation”.

AIOps platforms leverage conversational interfaces powered by large language models to analyze system logs, performance metrics, traces, and alerts. These agents are designed to automate detection of issues and, in some cases, suggest or execute corrective actions.

However, by injecting false analytics data — or “poisoned telemetry” — attackers can deceive these tools into performing harmful operations, such as downgrading a software package to a vulnerable version. Mounting such an attack does not require extensive effort, although success depends on the system, implementation details, and model interpretation of logs.

  • Attackers begin by using a fuzzer to catalog application endpoints, which generate telemetry for routine activities or errors.
  • By engineering malicious log entries through crafted application programming interface requests, adversaries can embed explicit but deceptive remediation instructions into the system’s telemetry.
  • The AIOps agent, unable to discern trustworthy information, may then execute actions dictated by the attacker. One cited example involved an agent overseeing the SocialNet application, manipulated to install a rogue package after processing adversarial logs. In tests using the SocialNet and HotelReservation applications, the attack had succeeded in 89.2% of attempts. Further evaluation with OpenAI’s GPT-4o and GPT-4.1 models have revealed susceptibility rates of 97% and 82%, respectively, although GPT-4.1 was better at detecting inconsistencies.

While the researchers propose an interim defense, dubbed AIOpsShield, to scrub harmful telemetry, they acknowledge its limitations against advanced attackers capable of poisoning multiple data sources or supply chains. Plans are underway to release AIOpsShield as open source.

Share:

PreviousGlobal EV battery push faces hidden environmental toll and rising geopolitical trade tensions
NextVantage Foundation Partners with Blue Dragon Children’s Foundation to Protect Children and Prevent Human Trafficking

Related Posts

As Phase 3 kicks in, Singapore F&B sector can tap these four trends

As Phase 3 kicks in, Singapore F&B sector can tap these four trends

January 4, 2021

Embrace Sustainable IT now—before there is nothing left to sustain

Embrace Sustainable IT now—before there is nothing left to sustain

June 16, 2022

Award-winning businesses share their data integration, API management and AI journeys

Award-winning businesses share their data integration, API management and AI journeys

June 5, 2025

India’s retail sector rides high on digitalization and Open Network Digital Commerce

India’s retail sector rides high on digitalization and Open Network Digital Commerce

April 6, 2022

Leave a reply Cancel reply

You must be logged in to post a comment.

Awards Nomination Banner

gamification list

PARTICIPATE NOW

top placement

Whitepapers

  • Achieve Modernization Without the Complexity

    Achieve Modernization Without the Complexity

    Transforming IT infrastructure is crucial …Download Whitepaper
  • 5 Steps to Boost IT Infrastructure Reliability

    5 Steps to Boost IT Infrastructure Reliability

    In today's fast-evolving tech landscape, …Download Whitepaper
  • Simplify Payroll Setup for Your Small Business

    Simplify Payroll Setup for Your Small Business

    In our free guide, "How …Download Whitepaper
  • Overcoming the Challenges of Cost & Complexity in the Cloud-first Era.

    Overcoming the Challenges of Cost & Complexity in the Cloud-first Era.

    Download Whitepaper

Middle Placement

Case Studies

  • Gill Capital redefines retail product discovery with Google-quality search

    Gill Capital redefines retail product discovery with Google-quality search

    Harnessing generative AI, agentic AI …Read More
  • Indonesia’s largest private hospital network modernizes operations with cloud migration  

    Indonesia’s largest private hospital network modernizes operations with cloud migration  

    PT Siloam International Hospitals improves …Read More
  • Maybank accelerates digital transformation with AI-driven innovation

    Maybank accelerates digital transformation with AI-driven innovation

    Maybank has entered into a strategic …Read More
  • India robotics firm transforms automation with virtual twins and low-code platform adoption

    India robotics firm transforms automation with virtual twins and low-code platform adoption

    Adopting a unified digital platform …Read More

Bottom Sidebar

Other News

  • 600 MW Monsoon Wind achieves commercial operation, delivering clean energy across borders

    September 1, 2025
    600 MW, utility-scale, onshore wind …Read More »
  • Humanoid robots gain momentum, but hardware costs hold back mass adoption, says DIGITIMES

    September 1, 2025
    TAIPEI, Sept. 1, 2025 /PRNewswire/ …Read More »
  • MetaOptics Ltd Registers Offer Document on its Listing on SGX Catalist

    September 1, 2025
    SINGAPORE, Sept. 1, 2025 /PRNewswire/ …Read More »
  • LiuGong Finance Indonesia Officially Launched and Customer Day Successfully Held

    September 1, 2025
    LIUZHOU, China, Sept. 1, 2025 …Read More »
  • Telin and ITCO Niaga Announce Visionary Collaboration to Strengthen Indonesia Cable Express II (ICE II)

    September 1, 2025
    BALI, Indonesia, Sept. 1, 2025 …Read More »
  • Our Brands
  • CybersecAsia
  • MartechAsia
  • Home
  • About Us
  • Contact Us
  • Sitemap
  • Privacy & Cookies
  • Terms of Use
  • Advertising & Reprint Policy
  • Media Kit
  • Subscribe
  • Manage Subscriptions
  • Newsletter

Copyright © 2025 DigiconAsia All Rights Reserved.