Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New ChatGPT Flaws Allow Attackers to Exfiltrate Sensitive Data from Gmail, Outlook, and GitHub

New ChatGPT Flaws Allow Attackers to Exfiltrate Sensitive Data from Gmail, Outlook, and GitHub

Posted on January 8, 2026January 8, 2026 By CWS

Crucial vulnerabilities in ChatGPT permit attackers to exfiltrate delicate information from linked companies like Gmail, Outlook, and GitHub with out person interplay.

Dubbed ShadowLeak and ZombieAgent, these flaws exploit the AI’s Connectors and Reminiscence options for zero-click assaults, persistence, and even propagation.​

OpenAI’s Connectors allow ChatGPT to combine with exterior techniques comparable to Gmail, Jira, GitHub, Groups, and Google Drive in just a few clicks.

The Reminiscence characteristic, enabled by default, shops person conversations and information for personalised responses, permitting the AI to learn, edit, or delete entries.

Whereas enhancing utility, these capabilities grant broad entry to non-public and company information, amplifying dangers from insufficient safeguards.​

ChatGPT Zero-Click on and One-Click on Assaults

Attackers ship malicious emails or share recordsdata embedding hidden directions, invisible to customers, by way of white textual content, tiny fonts, or footers.

Assault Chain (Supply: Radware)

Within the zero-click server-side variant, ChatGPT scans the inbox throughout routine duties like summarizing emails, executes the payload, and leaks information by way of OpenAI’s servers earlier than customers discover.

A one-click model triggers when victims add tainted recordsdata, enabling chained assaults on linked repositories or drives.​

Assault TypeTriggerExfiltration MethodScopeZero-Click on Server-SideShared a malicious fileVia browser.open() software on OpenAI serversGmail inboxes, PII​One-Click on Server-SideMemory modification by way of a fileHidden prompts in docs​Google Drive, GitHub​Persistence (ZombieAgent)Reminiscence modification by way of fileOngoing leaks per question ​All chats, medical information​PropagationEmail deal with harvestingAuto-forward to contacts [query context]Organizational unfold

OpenAI blocked dynamic URL modifications, however researchers bypassed this with pre-built URLs for every character (a-z, 0-9, $ for areas).

ChatGPT normalizes delicate strings like “Zvika Doe” to “zvikadoe”, then sequentially opens static hyperlinks like compliance.hr-service.web/get-public-joke/z, exfiltrating information with out development. This service-side technique evades client-side defenses, browsers, and UI visibility.​

For persistence, attackers inject memory-altering guidelines by way of recordsdata: on each message, learn a particular attacker e mail and leak information first.

Regardless of OpenAI’s restrictions on mixing Connectors and Reminiscence, reverse entry works, enabling countless exfiltration even in new chats. Propagation scans inboxes for addresses, exfiltrates them, and attacker servers auto-send payloads, focusing on organizations.​

Radware reported the problems on September 26, 2025, by way of BugCrowd, offering particulars and upgrades. OpenAI mounted ShadowLeak on September 3 and the total set on December 16, 2025, after copy.

Consultants urge monitoring agent behaviors and sanitizing inputs, as agentic AI blind spots persist.​

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attackers, ChatGPT, Data, Exfiltrate, Flaws, GitHub, Gmail, Outlook, Sensitive

Post navigation

Previous Post: Trump Signals U.S. Cyber Role in Caracas Blackout During Maduro Capture
Next Post: Rethinking Security for Agentic AI

Related Posts

CISA Warns of Apple iOS, iPadOS, and macOS 0-day Vulnerability Exploited in Attacks CISA Warns of Apple iOS, iPadOS, and macOS 0-day Vulnerability Exploited in Attacks Cyber Security News
40,000+ Cyberattacks Targeting API Environments To Inject Malicious Code 40,000+ Cyberattacks Targeting API Environments To Inject Malicious Code Cyber Security News
Lenovo Vantage Vulnerabilities Allow Attackers to Escalate Privileges as SYSTEM User Lenovo Vantage Vulnerabilities Allow Attackers to Escalate Privileges as SYSTEM User Cyber Security News
Vulnerabilities in Preinstalled Android Apps Expose PIN Codes and Allow Command Injection Vulnerabilities in Preinstalled Android Apps Expose PIN Codes and Allow Command Injection Cyber Security News
Clop Ransomware Group Exploiting Gladinet CentreStack Servers to Steal Data Clop Ransomware Group Exploiting Gladinet CentreStack Servers to Steal Data Cyber Security News
New Active Directory Lateral Movement Techniques that Bypasses Authentication and Exfiltrate Data New Active Directory Lateral Movement Techniques that Bypasses Authentication and Exfiltrate Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws
  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws
  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark