Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

‘EchoLeak’ AI Attack Enabled Theft of Sensitive Data via Microsoft 365 Copilot

Posted on June 12, 2025June 12, 2025 By CWS

Microsoft 365 Copilot was till just lately susceptible to an assault technique that might have been leveraged by risk actors to acquire delicate data, AI safety agency Purpose Safety reported on Wednesday. 

The zero-click assault, dubbed EchoLeak and involving a vulnerability tracked as CVE-2025-32711, enabled attackers to get Copilot to mechanically exfiltrate doubtlessly useful data from a focused person or group with out requiring person interplay.

Microsoft on Wednesday revealed an advisory for the vulnerability, which it described as ‘AI command injection in M365 Copilot’ and categorised as ‘vital’, however knowledgeable prospects {that a} patch has been applied on the server aspect and no buyer motion is required.

Be taught Extra About AI Vulnerabilities at SecurityWeek’s AI Danger Summit

The Microsoft 365 Copilot is a productiveness assistant designed to boost the best way customers work together with purposes similar to Phrase, PowerPoint and Outlook. Copilot can question emails, extracting and managing data from the person’s inbox.

The EchoLeak assault entails sending a specifically crafted electronic mail to the focused person. The e-mail incorporates directions for Copilot to gather secret and private data from prior chats with the person and ship them to the attacker’s server. 

The person doesn’t must open the malicious electronic mail or click on on any hyperlinks. The exploit, which Purpose Safety described as oblique immediate injection, is triggered when the sufferer asks Copilot for data referenced within the malicious electronic mail. That’s when Copilot executes the attacker’s directions to gather data beforehand supplied by the sufferer and ship it to the attacker.

For instance, the attacker’s electronic mail can reference worker onboarding processes, HR guides, or go away of absence administration guides. When the focused person asks Copilot about one in all these matters, the AI will discover the attacker’s electronic mail and execute the directions it incorporates. Commercial. Scroll to proceed studying.

To be able to execute an EchoLeak assault, the attacker has to bypass a number of safety mechanisms, together with cross-prompt injection assault (XPIA) classifiers designed to forestall immediate injection. XPIA is bypassed by phrasing the malicious electronic mail in a method that makes it appear as if it’s aimed on the recipient, with out together with any references to Copilot or different AI. 

The assault additionally bypasses picture and hyperlink redaction mechanisms, in addition to Content material Safety Coverage (CSP), which ought to stop knowledge exfiltration. 

“This can be a novel sensible assault on an LLM utility that may be weaponized by adversaries,” Purpose Safety defined. “The assault ends in permitting the attacker to exfiltrate essentially the most delicate knowledge from the present LLM context – and the LLM is getting used towards itself in ensuring that the MOST delicate knowledge from the LLM context is being leaked, doesn’t depend on particular person conduct, and could be executed each in single-turn conversations and multi-turn conversations.”

Purpose Safety identified that whereas it demonstrated the EchoLeak assault towards Microsoft’s Copilot, the approach may match towards different AI purposes as nicely.

Associated: The Root of AI Hallucinations: Physics Idea Digs Into the ‘Consideration’ Flaw

Associated: Going Into the Deep Finish: Social Engineering and the AI Flood

Security Week News Tags:Attack, Copilot, Data, EchoLeak, Enabled, Microsoft, Sensitive, Theft

Post navigation

Previous Post: How to Address the Expanding Security Risk
Next Post: Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction

Related Posts

RondoDox Botnet Takes ‘Exploit Shotgun’ Approach Security Week News
Google Patches Gemini AI Hacks Involving Poisoned Logs, Search Results Security Week News
Two Scattered Spider Suspects Arrested in UK; One Charged in US Security Week News
Palo Alto Networks Patches Privilege Escalation Vulnerabilities Security Week News
Ox Security Launches AI Agent That Auto-Generates Code to Fix Vulnerabilities Security Week News
CISO Conversations: John ‘Four’ Flynn, VP of Security at Google DeepMind Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • APT-C-35 Infrastructure Activity Leveraged Using Apache HTTP Response Indicators
  • Russian Hackers Attacking Network Edge Devices in Western Critical Infrastructure
  • LLMs are Accelerating the Ransomware Operations with Functional Tools and RaaS
  • Hackers Can Manipulate Internet-Based Solar Panel Systems to Execute Attacks in Minutes
  • From Open Source to OpenAI: The Evolution of Third-Party Risk

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • APT-C-35 Infrastructure Activity Leveraged Using Apache HTTP Response Indicators
  • Russian Hackers Attacking Network Edge Devices in Western Critical Infrastructure
  • LLMs are Accelerating the Ransomware Operations with Functional Tools and RaaS
  • Hackers Can Manipulate Internet-Based Solar Panel Systems to Execute Attacks in Minutes
  • From Open Source to OpenAI: The Evolution of Third-Party Risk

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark