Defending Against Cyber Threats Amid Israel-Iran Geopolitical Tensions. Get Insights
Get access to immediate incident response assistance.
Get access to immediate incident response assistance.
Defending Against Cyber Threats Amid Israel-Iran Geopolitical Tensions. Get Insights
Multi-agent systems (MAS) are reshaping industries from IT services to innovative city governance by enabling autonomous AI agents to collaborate, compete, and solve complex problems. This powerful transformation comes with a cost. As multi-agent systems grow, their risks also increase, opening the door to adversarial manipulation, emergent vulnerabilities, and distributed attack surfaces.
AI agents in a multi-agent system share data, exchange instructions, and communicate with each other. This leads to one problem: their interaction (communication) with untrusted external entities. Agents often assume these external entities are trustworthy, whether they are systems, humans, or other AI agents. This trust and assumption opens the door for new attack surfaces.
A multi-agent system operates as a coordinated swarm of AI agents, where many AI agents work, collaborate, communicate, and share data to solve complex problems and accomplish large-scale tasks more efficiently.
In a multi-agent system, AI agents constantly communicate with each other and share data and instructions. One critical challenge is their interaction with untrusted external entities. Agents assume that these external entities, whether systems, humans, or other AI agents, are trustworthy.
Scenario Summary
The multi-agent prompt injection attack demonstrates that an attack on one AI assistant’s RAG memory can compromise downstream decisions. This is particularly dangerous in a multi-agent system in which agents share data, amplifying the attack.
Figure 1. RAG Poisoning and Financial Exploitation. Source: https://atlas.mitre.org/studies/AML.CS0026
1. Initial Recon and Exploit via Agent A (Email Assistant)
2. Downstream Infection via Agent B (Finance Copilot)
Multi-agent systems assist humans in doing many complex tasks efficiently in much less time and unlock unprecedented potential. But at the same time, they require advanced security for their efficient work because they face many security challenges, as discussed in the article. These security problems can be solved by implementing robust memory protections, strengthening and improving agent-to-agent interactions, and addressing vulnerabilities of agents in interactions with their environment. Cybersecurity must ensure trustworthy collaboration — not just defense against attacks. So, we must secure our multi-agent systems against security attacks to ensure their smooth operation.
Muhammad Ahmad is a Threat Researcher at GTO, specializing in threat hunting and detection across Windows and Linux environments. He leverages OSINT and the MITRE ATT&CK framework to identify emerging threats and track adversarial patterns, helping organizations strengthen their security posture. Follow Muhammad on LinkedIn.
Trustwave is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.
Copyright © 2025 Trustwave Holdings, Inc. All rights reserved.