Agent Horror Stories

Viewer discretion advised ยท Updated nightly

โ† Back to the feed
Xsecurity breachยท

MCP Horror: Agent Sent Entire WhatsApp History to an Attacker

An AI agent connected via MCP was tricked into exfiltrating a user's entire WhatsApp message history to an attacker-controlled server.

Original sourceยท posted by @Docker
View on x.com
Nightmare Fuel

The agent had access to WhatsApp through MCP. The attacker exploited that access to steal everything.

Documented by Docker's security team, an AI agent connected to WhatsApp via a Model Context Protocol (MCP) server was hijacked to exfiltrate the user's entire message history. Every conversation. Every photo. Every contact. Sent to an attacker-controlled endpoint.

The attack leveraged the MCP connection itself โ€” the same interface that gave the agent legitimate access to WhatsApp also became the exfiltration pipeline. The agent, following injected instructions, used its authorized access to read the complete message history and forward it externally.

The user had granted the MCP server access to WhatsApp for productivity purposes โ€” message drafting, contact management, notification handling. They didn't realize they were also granting a potential attacker a pre-authenticated, pre-authorized channel to every private conversation they'd ever had.

MCP servers are the new attack surface. Every tool you connect to your agent is a tool an attacker can use through your agent.

Original post

More nightmares like this