AI-based agency campaigns such as GTG-1002 are multi-phase operations conducted at incredible speed, often without using custom malware but leveraging legitimate tools and protocols. In this model, defense based on observing network behavior, rather than just signatures, becomes key. ExtraHop addresses this problem comprehensively:
1️⃣ Holistic network visibility and elimination of blind spots
The foundation for effective defense against autonomous agents is complete, consistent telemetry from the network. ExtraHop provides end-to-end visibility through line-rate traffic analysis, decryption, and deep protocol decoding. This includes both standard communication layers and business applications and APIs that AI agents exploit for reconnaissance, access escalation, and data theft. As a result, ExtraHop reveals activities that would otherwise remain hidden in encrypted traffic or in the “gray zone” of legitimate protocols.
2️⃣ Detection of characteristic “orchestration traffic” to LLM/MCP services
A new feature of agency campaigns is continuous communication between the internal agent and external orchestration infrastructure – e.g., MCP servers and Large Language Model services. ExtraHop can identify this type of traffic as a separate, highly diagnostic threat signal. In practice, it is often easier to notice because it creates long-lasting, repetitive connections with unusual characteristics. Detecting this pattern enables security teams to quickly disrupt the attack chain by severing the AI agent from its “control system.”
3️⃣ Real-time detection of behavioral anomalies
ExtraHop uses advanced machine learning models to detect behavioral anomalies in real-time. In the initial phases, this includes high-volume scans, unusual service enumerations, and systematic vulnerability validation. In later stages, the platform detects automated lateral movement, unusual use of privileged accounts, and other patterns indicative of “agent” activity.
4️⃣ Forensic analysis
After detecting an incident, it is equally important to precisely understand its course. ExtraHop retains high-quality packet data and network metadata, enabling the reconstruction of the full attack path: which services the AI agent enumerated, which resources it accessed, what data it processed, and how it attempted to exfiltrate it. Packet records allow the reconstruction of complex action chains and automated decisions made by AI frameworks, which is crucial for strengthening security for the future.
5️⃣ Integration with threat intelligence and IOC/TTP correlation
Agent campaigns, despite a high degree of autonomy, still rely on components of external infrastructure – such as callback servers, C2 addresses, or tool repositories. ExtraHop integrates with reliable sources of Threat Intelligence, enriching detections with known indicators of compromise (IOC) and assigning observed actions to MITRE ATT&CK techniques.
6️⃣ Accelerated incident response and precise remediation
ExtraHop generates high-confidence alerts and visualizes the attack path, indicating compromised hosts, their relationships, and vulnerable resources threatened by lateral movement. This level of detail allows SOC teams to make accurate decisions quickly: isolate specific systems, block lateral movement vectors and – crucial in agent campaigns – immediately sever connections between the internal AI agent and its external orchestration servers.
NDR class solutions from ExtraHop provide a combination of full visibility, behavioral detection, identification of AI agent-specific signals, and deep forensic analysis. This set of functions is essential for effectively detecting and disrupting the new generation of espionage campaigns where artificial intelligence acts as an autonomous attack operator.