Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
‘Whisper Leak’ LLM Side-Channel Attack Infers User Prompt Topics

‘Whisper Leak’ LLM Side-Channel Attack Infers User Prompt Topics

Posted on November 11, 2025November 11, 2025 By CWS

Microsoft researchers have devised a brand new AI side-channel assault that depends on metadata patterns to deduce the dialog a person has with a distant language mannequin, even when the communication is end-to-end encrypted.

The problem, they are saying, impacts all LLMs and poses a major threat to entities beneath surveillance from ISPs, governments, or cyber actors, because it exposes delicate conversations, starting from authorized recommendation to medical consultations and different personal subjects, to eavesdropping.

“This particularly poses real-world dangers to customers by oppressive governments the place they might be focusing on subjects comparable to protesting, banned materials, election course of, or journalism,” Microsoft notes.

The assault, known as Whisper Leak, assumes that the adversary is positioned to observe the community site visitors between the sufferer and the LLM. Even with out having the ability to decrypt the site visitors, the adversary can infer the dialog matter based mostly on packet measurement and timing patterns within the chatbot’s responses.

The assault exploits the truth that LLMs generate responses by predicting tokens (phrases or sub-words) based mostly on the person’s enter and beforehand generated tokens, in a step-by-step method. Moreover, they serve the tokens instantly or in batches, in a ‘streaming’ strategy.

In keeping with Microsoft’s researchers, this influences the timing and measurement of the information chunks the LLM sends to the consumer. The communication, nonetheless, is often encrypted utilizing HTTP over TLS (HTTPS).

“Fashionable TLS encryption schemes protect the dimensions relationship between plaintext and ciphertext. When information is encrypted, the ensuing ciphertext measurement is instantly proportional to the unique plaintext measurement, plus a small fixed overhead,” the researchers notice of their technical paper.

Basically, which means that, whereas the content material of the communication is efficiently encrypted, the dimensions of the transmitted information chunks is leaked.Commercial. Scroll to proceed studying.

“For LLM providers that stream responses token by token, this measurement info reveals patterns in regards to the tokens being generated. Mixed with timing info between packets, these leaked patterns kind the premise of the Whisper Leak assault,” the researchers clarify.

To guage the assault, the researchers simulated a situation the place the attacker may solely observe the encrypted site visitors, and skilled a binary classifier to tell apart between the subject of “legality of cash laundering” and background site visitors.

The researchers’ experiment confirmed that 17 of the 28 examined fashions achieved over 98% accuracy in distinguishing the goal matter, with some reaching over 99.9% accuracy. Basically, they permit attackers to “establish 1 in 10,000 goal conversations with near-zero false positives”, the researchers say.

The researchers recommend random padding, token batching, and packet injection as attainable mitigation methods. OpenAI and Microsoft Azure have carried out an extra discipline in streaming responses, including a random sequence of textual content of variable size to masks the token size. Mistral added a brand new parameter with an analogous impact.

Customers, the researchers say, ought to keep away from discussing delicate subjects with AI chatbots when utilizing untrustworthy networks, ought to use VPN providers, use suppliers which have carried out the mitigations, use non-streaming fashions, and keep knowledgeable on the supplier’s safety practices.

Associated: Researchers Hack ChatGPT Recollections and Net Search Options

Associated: The Y2K38 Bug Is a Vulnerability, Not Only a Date Downside, Researchers Warn

Associated: Researchers Earn $150,000 for L1TF Exploit Leaking Information From Public Cloud

Associated: RMPocalypse: New Assault Breaks AMD Confidential Computing

Security Week News Tags:Attack, Infers, Leak, LLM, Prompt, SideChannel, Topics, User, Whisper

Post navigation

Previous Post: CISO’s Expert Guide To AI Supply Chain Attacks
Next Post: Honoring Our Veteran Readers: Thank You for Your Service

Related Posts

Hacker Conversations: Alex Hall, One-time Fraudster Hacker Conversations: Alex Hall, One-time Fraudster Security Week News
Canadian Airline WestJet Says Hackers Stole Customer Data Canadian Airline WestJet Says Hackers Stole Customer Data Security Week News
Evervault Secures M in Series B to Enhance Encryption Tech Evervault Secures $25M in Series B to Enhance Encryption Tech Security Week News
Jordanian Admits in US Court to Selling Access to 50 Enterprise Networks Jordanian Admits in US Court to Selling Access to 50 Enterprise Networks Security Week News
Academics Build AI-Powered Android Vulnerability Discovery and Validation Tool Academics Build AI-Powered Android Vulnerability Discovery and Validation Tool Security Week News
Iran-Linked Cyber Attacks Threaten US Amidst Ongoing Conflict Iran-Linked Cyber Attacks Threaten US Amidst Ongoing Conflict Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark