Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
ChatGPT Deep Research Targeted in Server-Side Data Theft Attack

ChatGPT Deep Research Targeted in Server-Side Data Theft Attack

Posted on September 18, 2025September 18, 2025 By CWS

Researchers at internet safety firm Radware not too long ago found what they described as a service-side knowledge theft assault methodology involving ChatGPT. 

The assault, dubbed ShadowLeak, focused ChatGPT’s Deep Analysis functionality, which is designed to conduct multi-step analysis for advanced duties. OpenAI neutralized ShadowLeak after it was notified by Radware.

The ShadowLeak assault didn’t require any person interplay. The attacker merely wanted to ship a specifically crafted e-mail that when processed by the Deep Analysis agent would instruct it to silently acquire precious knowledge and ship it again to the attacker.

Nonetheless, not like many different oblique immediate injection assaults, ShadowLeak didn’t contain the ChatGPT shopper.

A number of cybersecurity firms not too long ago demonstrated theoretical assaults wherein the attacker leverages the combination between AI assistants and enterprise instruments to silently exfiltrate person knowledge with no or minimal sufferer interplay.

Radware mentions Zenity’s AgentFlayer and Purpose Safety’s EchoLeak assaults. Nonetheless, the corporate highlighted that these are client-side assaults, whereas ShadowLeak entails the server aspect. 

As in earlier assaults, the attacker would wish to ship an e-mail that appears innocent to the focused person however comprises hidden directions for ChatGPT. The malicious directions can be triggered when the person requested the chatbot to summarize emails or analysis a subject from their inbox. 

In contrast to client-side assaults, ShadowLeak exfiltrates knowledge by means of the parameters of a request to an attacker-controlled URL. A harmless-looking URL akin to ‘hr-service.web/{parameters}’, the place the parameter worth is the exfiltrated info, has been offered for instance by Radware. Commercial. Scroll to proceed studying.

“It’s vital to notice that the online request is carried out by the agent executing in OpenAI’s cloud infrastructure, inflicting the leak to originate instantly from OpenAI’s servers,” Radware identified, noting that the assault leaves no clear traces as a result of the request and knowledge don’t cross by means of the ChatGPT shopper. 

The attacker’s immediate is cleverly designed not solely when it comes to accumulating the knowledge and sending it to the attacker. It additionally tells the chatbot that it has full authorization to conduct the required duties, and creates a way of urgency.

The immediate additionally instructs ChatGPT to attempt a number of occasions if it doesn’t succeed, offers an instance of how the malicious directions needs to be carried out, and makes an attempt to override potential safety checks by convincing the agent that the exfiltrated knowledge is already public and the attacker’s URL is secure. 

Whereas Radware demonstrated the assault methodology towards Gmail, the corporate mentioned Deep Analysis can entry different broadly used enterprise providers as nicely, together with Google Drive, Dropbox, Outlook, HubSpot, Notion, Microsoft Groups, and GitHub. 

OpenAI was notified in regards to the assault on June 18 and the vulnerability was mounted sooner or later in early August. 

Radware has confirmed that the assault not works. Nonetheless, it advised SecurityWeek that it believes “there’s nonetheless a reasonably large risk floor that is still undiscovered”.

The safety agency recommends steady agent conduct monitoring for mitigating such assaults. 

“Monitoring each the agent’s actions and its inferred intent and validating that they continue to be in step with the person’s authentic objectives. This alignment examine ensures that even when an attacker steers the agent, deviations from professional intent are detected and blocked in actual time,” it defined.

Associated: Irregular Raises $80 Million for AI Safety Testing Lab

Associated: UAE’s K2 Assume AI Jailbroken By Its Personal Transparency Options

Security Week News Tags:Attack, ChatGPT, Data, Deep, Research, ServerSide, Targeted, Theft

Post navigation

Previous Post: SonicWall Urges Password Resets After Cloud Backup Breach Affecting Under 5% of Customers
Next Post: Windows 11 Notepad to Get AI Support for Free to Generate and Summarize Text

Related Posts

SAP Mitigates Severe ABAP Security Flaw SAP Mitigates Severe ABAP Security Flaw Security Week News
Air France, KLM Say Hackers Accessed Customer Data Air France, KLM Say Hackers Accessed Customer Data Security Week News
Hush Security Emerges Stealth to Eliminate Credential Threats With No-Secrets Platform Hush Security Emerges Stealth to Eliminate Credential Threats With No-Secrets Platform Security Week News
Google Enhances Chrome Security with Quantum-Safe Certificates Google Enhances Chrome Security with Quantum-Safe Certificates Security Week News
White House Proposes 7 Million CISA Budget Cut White House Proposes $707 Million CISA Budget Cut Security Week News
Extortion Group Leaks Millions of Records From Salesforce Hacks Extortion Group Leaks Millions of Records From Salesforce Hacks Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark