{"id":20308,"date":"2026-01-08T12:36:00","date_gmt":"2026-01-08T12:36:00","guid":{"rendered":"https:\/\/sawahsolutions.com\/alpha\/radware-uncovers-zombieagent-a-zero-click-ai-vulnerability-enabling-stealth-data-theft-in-enterprises\/"},"modified":"2026-01-08T13:07:40","modified_gmt":"2026-01-08T13:07:40","slug":"radware-uncovers-zombieagent-a-zero-click-ai-vulnerability-enabling-stealth-data-theft-in-enterprises","status":"publish","type":"post","link":"https:\/\/sawahsolutions.com\/alpha\/radware-uncovers-zombieagent-a-zero-click-ai-vulnerability-enabling-stealth-data-theft-in-enterprises\/","title":{"rendered":"Radware uncovers &#8216;ZombieAgent&#8217;, a zero-click AI vulnerability enabling stealth data theft in enterprises"},"content":{"rendered":"<p><\/p>\n<div>\n<p>Radware reveals a new zero-click prompt injection flaw called &#8216;ZombieAgent&#8217; that targets OpenAI\u2019s Deep Research agent, risking silent data exfiltration and agent hijacking across organisations, with full technical details to be disclosed in January 2026.<\/p>\n<\/div>\n<div>\n<p>Radware has disclosed a newly discovered zero-click indirect prompt injection vulnerability it calls &#8220;ZombieAgent&#8221; that it says targets OpenAI\u2019s Deep Research agent and could enable invisible, persistent data theft and agent hijacking across enterprise environments. According to Radware\u2019s press release, the flaw allows attackers to implant malicious rules into an agent\u2019s long-term memory or working notes so that the agent executes hidden actions every time it is used, silently collecting sensitive information and potentially propagating across contacts and recipients. <sup><a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.quiverquant.com\/news\/Radware+Discovers+ZombieAgent%3A+New+Zero-Click+Vulnerability+in+OpenAI%27s+Deep+Research+Agent+Exposes+Enterprises+to+Data+Theft+Risks\">[1]<\/a><\/sup><sup><a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.globenewswire.com\/news-release\/2026\/01\/08\/3215156\/0\/en\/Radware-Unveils-ZombieAgent-A-Newly-Discovered-Zero-Click-AI-Agent-Vulnerability-Enabling-Silent-Takeover-and-Cloud-Based-Data-Exfiltration.html\">[2]<\/a><\/sup><\/p>\n<p>Radware frames ZombieAgent as an advance on its earlier ShadowLeak research, describing a multi\u2011stage attack that begins with what appears to be a normal email, document or webpage containing concealed directives. When a connected AI agent processes that content, for example during routine inbox summarisation, the agent interprets the embedded instructions as legitimate commands. Radware says this enables zero\u2011click exploitation with no user interaction required. According to the company, because the malicious activity executes within OpenAI\u2019s cloud infrastructure rather than on corporate endpoints, traditional enterprise controls such as secure web gateways, endpoint detection and response, and firewalls would not log or detect the exfiltration. <sup><a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.quiverquant.com\/news\/Radware+Discovers+ZombieAgent%3A+New+Zero-Click+Vulnerability+in+OpenAI%27s+Deep+Research+Agent+Exposes+Enterprises+to+Data+Theft+Risks\">[1]<\/a><\/sup><sup><a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.radware.com\/security\/threat-advisories-and-attack-reports\/shadowleak\/\">[3]<\/a><\/sup><sup><a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.radware.com\/getattachment\/7bf74537-e90e-414e-a82b-d7b4935bae08\/Threat-Advisory-ShadowLeak-Sept-2025.pdf.aspx\">[4]<\/a><\/sup><\/p>\n<p>\u201cZombieAgent illustrates a critical structural weakness in today\u2019s agentic AI platforms,\u201d Pascal Geenens, vice president, threat intelligence at Radware, said in the company\u2019s announcement. He warned that enterprises often lack visibility into how agents interpret untrusted content or what actions they execute in the cloud, creating a \u201cdangerous blind spot\u201d attackers can exploit. The comments were included in Radware\u2019s Globe Newswire release. <sup><a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.quiverquant.com\/news\/Radware+Discovers+ZombieAgent%3A+New+Zero-Click+Vulnerability+in+OpenAI%27s+Deep+Research+Agent+Exposes+Enterprises+to+Data+Theft+Risks\">[1]<\/a><\/sup><\/p>\n<p>Radware has presented ZombieAgent as part of a broader pattern of threats arising from the expanding &#8220;agentic&#8221; attack surface, where autonomous agents read email, interact with systems, initiate workflows and make decisions. Industry reporting and Radware\u2019s prior advisories on ShadowLeak documented a similar server\u2011side risk: attackers embedding instructions that cause an AI agent to leak data directly from the provider\u2019s infrastructure. According to Radware\u2019s ShadowLeak advisory, OpenAI previously confirmed and fixed the related issue after responsible disclosure. <sup><a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.radware.com\/security\/threat-advisories-and-attack-reports\/shadowleak\/\">[3]<\/a><\/sup><sup><a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.radware.com\/getattachment\/7bf74537-e90e-414e-a82b-d7b4935bae08\/Threat-Advisory-ShadowLeak-Sept-2025.pdf.aspx\">[4]<\/a><\/sup><sup><a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/dataconomy.com\/2025\/09\/23\/chatgpt-shadowleak-zero-click-flaw\/\">[7]<\/a><\/sup><\/p>\n<p>The company disclosed ZombieAgent to OpenAI under responsible disclosure protocols and said it will publish a full technical breakdown and defensive recommendations through its Security Research Center following a live webinar scheduled for 20 January 2026. Radware invited security leaders and AI developers to attend the webinar, which it says will explore the attack\u2019s anatomy and best practices for securing AI agents. The announcement reiterates Radware\u2019s broader threat research agenda and its positioning as a provider of AI\u2011driven application and infrastructure security. <sup><a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.quiverquant.com\/news\/Radware+Discovers+ZombieAgent%3A+New+Zero-Click+Vulnerability+in+OpenAI%27s+Deep+Research+Agent+Exposes+Enterprises+to+Data+Theft+Risks\">[1]<\/a><\/sup><sup><a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.globenewswire.com\/news-release\/2026\/01\/08\/3215156\/0\/en\/Radware-Unveils-ZombieAgent-A-Newly-Discovered-Zero-Click-AI-Agent-Vulnerability-Enabling-Silent-Takeover-and-Cloud-Based-Data-Exfiltration.html\">[2]<\/a><\/sup><sup><a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.stocktitan.net\/news\/RDWR\/radware-unveils-zombie-agent-a-newly-discovered-zero-click-ai-agent-qp2pn3udihy4.html\">[6]<\/a><\/sup><\/p>\n<p>Radware\u2019s new advisory dovetails with its other research on malicious bots and agent impersonation, which warns that agent modes and POST\u2011capable interfaces undermine traditional bot mitigation assumptions. That earlier work argues that attackers can exploit API and agent behaviours to masquerade as legitimate services, further complicating detection and mitigation for organisations that rely on third\u2011party AI platforms. According to Radware, these combined weaknesses demand new defensive approaches that consider server\u2011side agent behaviour as part of enterprise risk models. <sup><a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.radware.com\/security\/threat-advisories-and-attack-reports\/the-ai-identity-dilemma-malicious-bots-in-disguise\/\">[5]<\/a><\/sup><\/p>\n<p>Experts and organisations using agentic AI should take Radware\u2019s disclosure as an early warning to assess how external AI agents are configured, what permissions they hold, and whether logs and monitoring capture agent interactions and cloud\u2011side actions. Industry data and Radware\u2019s advisories suggest that reliance on conventional perimeter and endpoint controls alone will be insufficient where sensitive data is processed by provider\u2011hosted agents; organisations will likely need tighter access controls, stricter data handling policies for agent integrations, and provider\u2011level mitigations to reduce the risk of stealthy server\u2011side exfiltration. <sup><a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.radware.com\/security\/threat-advisories-and-attack-reports\/shadowleak\/\">[3]<\/a><\/sup><sup><a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.radware.com\/getattachment\/7bf74537-e90e-414e-a82b-d7b4935bae08\/Threat-Advisory-ShadowLeak-Sept-2025.pdf.aspx\">[4]<\/a><\/sup><sup><a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.radware.com\/security\/threat-advisories-and-attack-reports\/the-ai-identity-dilemma-malicious-bots-in-disguise\/\">[5]<\/a><\/sup><\/p>\n<p>##Reference Map:<\/p>\n<ul>\n<li><sup><a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.quiverquant.com\/news\/Radware+Discovers+ZombieAgent%3A+New+Zero-Click+Vulnerability+in+OpenAI%27s+Deep+Research+Agent+Exposes+Enterprises+to+Data+Theft+Risks\">[1]<\/a><\/sup> (Globe Newswire) &#8211; Paragraph 1, Paragraph 2, Paragraph 3, Paragraph 5<\/li>\n<li><sup><a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.globenewswire.com\/news-release\/2026\/01\/08\/3215156\/0\/en\/Radware-Unveils-ZombieAgent-A-Newly-Discovered-Zero-Click-AI-Agent-Vulnerability-Enabling-Silent-Takeover-and-Cloud-Based-Data-Exfiltration.html\">[2]<\/a><\/sup> (Globe Newswire \/ Radware release summary) &#8211; Paragraph 1, Paragraph 5<\/li>\n<li><sup><a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.radware.com\/security\/threat-advisories-and-attack-reports\/shadowleak\/\">[3]<\/a><\/sup> (Radware ShadowLeak advisory page) &#8211; Paragraph 2, Paragraph 4, Paragraph 7<\/li>\n<li><sup><a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.radware.com\/getattachment\/7bf74537-e90e-414e-a82b-d7b4935bae08\/Threat-Advisory-ShadowLeak-Sept-2025.pdf.aspx\">[4]<\/a><\/sup> (Radware ShadowLeak PDF advisory) &#8211; Paragraph 2, Paragraph 4, Paragraph 7<\/li>\n<li><sup><a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.radware.com\/security\/threat-advisories-and-attack-reports\/the-ai-identity-dilemma-malicious-bots-in-disguise\/\">[5]<\/a><\/sup> (Radware report &#8220;The AI identity dilemma&#8221;) &#8211; Paragraph 6, Paragraph 7<\/li>\n<li><sup><a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.stocktitan.net\/news\/RDWR\/radware-unveils-zombie-agent-a-newly-discovered-zero-click-ai-agent-qp2pn3udihy4.html\">[6]<\/a><\/sup> (StockTitan summary) &#8211; Paragraph 5<\/li>\n<li><sup><a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/dataconomy.com\/2025\/09\/23\/chatgpt-shadowleak-zero-click-flaw\/\">[7]<\/a><\/sup> (Dataconomy coverage of ShadowLeak) &#8211; Paragraph 4<\/li>\n<\/ul>\n<p>Source: <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.noahwire.com\">Noah Wire Services<\/a><\/p>\n<\/p><\/div>\n<div>\n<h3 class=\"mt-0\">Noah Fact Check Pro<\/h3>\n<p class=\"text-sm\">The draft above was created using the information available at the time the story first<br \/>\n        emerged. We\u2019ve since applied our fact-checking process to the final narrative, based on the criteria listed<br \/>\n        below. The results are intended to help you assess the credibility of the piece and highlight any areas that may<br \/>\n        warrant further investigation.<\/p>\n<h3 class=\"mt-3 mb-1 font-semibold text-base\">Freshness check<\/h3>\n<p class=\"text-sm pt-0\"><span class=\"font-bold\">Score:<br \/>\n        <\/span>8<\/p>\n<p class=\"text-sm pt-0\"><span class=\"font-bold\">Notes:<br \/>\n        <\/span>The narrative presents a recent discovery by Radware, dated January 8, 2026, detailing the &#8216;ZombieAgent&#8217; zero-click vulnerability in OpenAI&#8217;s Deep Research agent. This is a new development, with no prior reports found in the past seven days. The content is original and not recycled from previous news. The report is based on Radware&#8217;s press release, which typically warrants a high freshness score. No discrepancies in figures, dates, or quotes were identified. The inclusion of updated data alongside older material is noted, but the recent update justifies a higher freshness score.<\/p>\n<h3 class=\"mt-3 mb-1 font-semibold text-base\">Quotes check<\/h3>\n<p class=\"text-sm pt-0\"><span class=\"font-bold\">Score:<br \/>\n        <\/span>10<\/p>\n<p class=\"text-sm pt-0\"><span class=\"font-bold\">Notes:<br \/>\n        <\/span>The direct quotes from Pascal Geenens, vice president of threat intelligence at Radware, and other statements are unique to this report. No identical quotes appear in earlier material, indicating original content. No variations in quote wording were found, and no online matches were identified, suggesting potentially exclusive content.<\/p>\n<h3 class=\"mt-3 mb-1 font-semibold text-base\">Source reliability<\/h3>\n<p class=\"text-sm pt-0\"><span class=\"font-bold\">Score:<br \/>\n        <\/span>9<\/p>\n<p class=\"text-sm pt-0\"><span class=\"font-bold\">Notes:<br \/>\n        <\/span>The narrative originates from Radware, a reputable cybersecurity company known for its expertise in application security and threat intelligence. The report is based on Radware&#8217;s press release, which is a direct source of information. The press release is hosted on GlobeNewswire, a legitimate news distribution service. No unverifiable entities or fabricated information were identified.<\/p>\n<h3 class=\"mt-3 mb-1 font-semibold text-base\">Plausability check<\/h3>\n<p class=\"text-sm pt-0\"><span class=\"font-bold\">Score:<br \/>\n        <\/span>9<\/p>\n<p class=\"text-sm pt-0\"><span class=\"font-bold\">Notes:<br \/>\n    <\/span>The claims about the &#8216;ZombieAgent&#8217; vulnerability align with Radware&#8217;s previous research on similar vulnerabilities, such as &#8216;ShadowLeak&#8217;. The technical details provided are consistent with known cybersecurity threats involving AI agents. The narrative lacks supporting detail from other reputable outlets, which is noted as a limitation. The language and tone are consistent with typical corporate communications from Radware. No excessive or off-topic details were found, and the tone is appropriately formal and informative.<\/p>\n<h3 class=\"mt-3 mb-1 font-semibold text-base\">Overall assessment<\/h3>\n<p class=\"text-sm pt-0\"><span class=\"font-bold\">Verdict<\/span> (FAIL, OPEN, PASS): <span class=\"font-bold\">PASS<\/span><\/p>\n<p class=\"text-sm pt-0\"><span class=\"font-bold\">Confidence<\/span> (LOW, MEDIUM, HIGH): <span class=\"font-bold\">HIGH<\/span><\/p>\n<p class=\"text-sm mb-3 pt-0\"><span class=\"font-bold\">Summary:<br \/>\n        <\/span>The narrative presents a recent and original report from Radware about a new zero-click vulnerability in OpenAI&#8217;s Deep Research agent. The content is fresh, with no prior reports found in the past seven days. The quotes are unique and potentially exclusive. The source is reliable, originating from Radware&#8217;s press release. The claims are plausible and consistent with known cybersecurity threats, though lacking supporting detail from other reputable outlets. Overall, the narrative passes the fact-check with high confidence.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Radware reveals a new zero-click prompt injection flaw called &#8216;ZombieAgent&#8217; that targets OpenAI\u2019s Deep Research agent, risking silent data exfiltration and agent hijacking across organisations, with full technical details to be disclosed in January 2026. Radware has disclosed a newly discovered zero-click indirect prompt injection vulnerability it calls &#8220;ZombieAgent&#8221; that it says targets OpenAI\u2019s Deep<\/p>\n","protected":false},"author":1,"featured_media":20309,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[40],"tags":[],"class_list":{"0":"post-20308","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-london-news"},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/sawahsolutions.com\/alpha\/wp-json\/wp\/v2\/posts\/20308","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sawahsolutions.com\/alpha\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sawahsolutions.com\/alpha\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sawahsolutions.com\/alpha\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sawahsolutions.com\/alpha\/wp-json\/wp\/v2\/comments?post=20308"}],"version-history":[{"count":1,"href":"https:\/\/sawahsolutions.com\/alpha\/wp-json\/wp\/v2\/posts\/20308\/revisions"}],"predecessor-version":[{"id":20310,"href":"https:\/\/sawahsolutions.com\/alpha\/wp-json\/wp\/v2\/posts\/20308\/revisions\/20310"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sawahsolutions.com\/alpha\/wp-json\/wp\/v2\/media\/20309"}],"wp:attachment":[{"href":"https:\/\/sawahsolutions.com\/alpha\/wp-json\/wp\/v2\/media?parent=20308"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sawahsolutions.com\/alpha\/wp-json\/wp\/v2\/categories?post=20308"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sawahsolutions.com\/alpha\/wp-json\/wp\/v2\/tags?post=20308"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}