Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
ChatGPT Deep Research Targeted in Server-Side Data Theft Attack

ChatGPT Deep Research Targeted in Server-Side Data Theft Attack

Posted on September 18, 2025September 18, 2025 By CWS

Researchers at internet safety firm Radware not too long ago found what they described as a service-side knowledge theft assault methodology involving ChatGPT. 

The assault, dubbed ShadowLeak, focused ChatGPT’s Deep Analysis functionality, which is designed to conduct multi-step analysis for advanced duties. OpenAI neutralized ShadowLeak after it was notified by Radware.

The ShadowLeak assault didn’t require any person interplay. The attacker merely wanted to ship a specifically crafted e-mail that when processed by the Deep Analysis agent would instruct it to silently acquire precious knowledge and ship it again to the attacker.

Nonetheless, not like many different oblique immediate injection assaults, ShadowLeak didn’t contain the ChatGPT shopper.

A number of cybersecurity firms not too long ago demonstrated theoretical assaults wherein the attacker leverages the combination between AI assistants and enterprise instruments to silently exfiltrate person knowledge with no or minimal sufferer interplay.

Radware mentions Zenity’s AgentFlayer and Purpose Safety’s EchoLeak assaults. Nonetheless, the corporate highlighted that these are client-side assaults, whereas ShadowLeak entails the server aspect. 

As in earlier assaults, the attacker would wish to ship an e-mail that appears innocent to the focused person however comprises hidden directions for ChatGPT. The malicious directions can be triggered when the person requested the chatbot to summarize emails or analysis a subject from their inbox. 

In contrast to client-side assaults, ShadowLeak exfiltrates knowledge by means of the parameters of a request to an attacker-controlled URL. A harmless-looking URL akin to ‘hr-service.web/{parameters}’, the place the parameter worth is the exfiltrated info, has been offered for instance by Radware. Commercial. Scroll to proceed studying.

“It’s vital to notice that the online request is carried out by the agent executing in OpenAI’s cloud infrastructure, inflicting the leak to originate instantly from OpenAI’s servers,” Radware identified, noting that the assault leaves no clear traces as a result of the request and knowledge don’t cross by means of the ChatGPT shopper. 

The attacker’s immediate is cleverly designed not solely when it comes to accumulating the knowledge and sending it to the attacker. It additionally tells the chatbot that it has full authorization to conduct the required duties, and creates a way of urgency.

The immediate additionally instructs ChatGPT to attempt a number of occasions if it doesn’t succeed, offers an instance of how the malicious directions needs to be carried out, and makes an attempt to override potential safety checks by convincing the agent that the exfiltrated knowledge is already public and the attacker’s URL is secure. 

Whereas Radware demonstrated the assault methodology towards Gmail, the corporate mentioned Deep Analysis can entry different broadly used enterprise providers as nicely, together with Google Drive, Dropbox, Outlook, HubSpot, Notion, Microsoft Groups, and GitHub. 

OpenAI was notified in regards to the assault on June 18 and the vulnerability was mounted sooner or later in early August. 

Radware has confirmed that the assault not works. Nonetheless, it advised SecurityWeek that it believes “there’s nonetheless a reasonably large risk floor that is still undiscovered”.

The safety agency recommends steady agent conduct monitoring for mitigating such assaults. 

“Monitoring each the agent’s actions and its inferred intent and validating that they continue to be in step with the person’s authentic objectives. This alignment examine ensures that even when an attacker steers the agent, deviations from professional intent are detected and blocked in actual time,” it defined.

Associated: Irregular Raises $80 Million for AI Safety Testing Lab

Associated: UAE’s K2 Assume AI Jailbroken By Its Personal Transparency Options

Security Week News Tags:Attack, ChatGPT, Data, Deep, Research, ServerSide, Targeted, Theft

Post navigation

Previous Post: SonicWall Urges Password Resets After Cloud Backup Breach Affecting Under 5% of Customers
Next Post: Windows 11 Notepad to Get AI Support for Free to Generate and Summarize Text

Related Posts

US Seeks Forfeiture of .74M in Cryptocurrency Tied to North Korean IT Workers US Seeks Forfeiture of $7.74M in Cryptocurrency Tied to North Korean IT Workers Security Week News
High-Severity Vulnerabilities Patched by Cisco, Atlassian High-Severity Vulnerabilities Patched by Cisco, Atlassian Security Week News
OpenAI User Data Exposed in Mixpanel Hack OpenAI User Data Exposed in Mixpanel Hack Security Week News
In Other News: Viasat Hacked by China, Washington Post Cyberattack, Crowhammer In Other News: Viasat Hacked by China, Washington Post Cyberattack, Crowhammer Security Week News
Russian Hackers Exploited WinRAR Zero-Day in Attacks on Europe, Canada Russian Hackers Exploited WinRAR Zero-Day in Attacks on Europe, Canada Security Week News
Sublime Security Raises 0 Million for Email Security Platform Sublime Security Raises $150 Million for Email Security Platform Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News