Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

ChatGPT Deep Research Targeted in Server-Side Data Theft Attack

Posted on September 18, 2025September 18, 2025 By CWS

Researchers at internet safety firm Radware not too long ago found what they described as a service-side knowledge theft assault methodology involving ChatGPT. 

The assault, dubbed ShadowLeak, focused ChatGPT’s Deep Analysis functionality, which is designed to conduct multi-step analysis for advanced duties. OpenAI neutralized ShadowLeak after it was notified by Radware.

The ShadowLeak assault didn’t require any person interplay. The attacker merely wanted to ship a specifically crafted e-mail that when processed by the Deep Analysis agent would instruct it to silently acquire precious knowledge and ship it again to the attacker.

Nonetheless, not like many different oblique immediate injection assaults, ShadowLeak didn’t contain the ChatGPT shopper.

A number of cybersecurity firms not too long ago demonstrated theoretical assaults wherein the attacker leverages the combination between AI assistants and enterprise instruments to silently exfiltrate person knowledge with no or minimal sufferer interplay.

Radware mentions Zenity’s AgentFlayer and Purpose Safety’s EchoLeak assaults. Nonetheless, the corporate highlighted that these are client-side assaults, whereas ShadowLeak entails the server aspect. 

As in earlier assaults, the attacker would wish to ship an e-mail that appears innocent to the focused person however comprises hidden directions for ChatGPT. The malicious directions can be triggered when the person requested the chatbot to summarize emails or analysis a subject from their inbox. 

In contrast to client-side assaults, ShadowLeak exfiltrates knowledge by means of the parameters of a request to an attacker-controlled URL. A harmless-looking URL akin to ‘hr-service.web/{parameters}’, the place the parameter worth is the exfiltrated info, has been offered for instance by Radware. Commercial. Scroll to proceed studying.

“It’s vital to notice that the online request is carried out by the agent executing in OpenAI’s cloud infrastructure, inflicting the leak to originate instantly from OpenAI’s servers,” Radware identified, noting that the assault leaves no clear traces as a result of the request and knowledge don’t cross by means of the ChatGPT shopper. 

The attacker’s immediate is cleverly designed not solely when it comes to accumulating the knowledge and sending it to the attacker. It additionally tells the chatbot that it has full authorization to conduct the required duties, and creates a way of urgency.

The immediate additionally instructs ChatGPT to attempt a number of occasions if it doesn’t succeed, offers an instance of how the malicious directions needs to be carried out, and makes an attempt to override potential safety checks by convincing the agent that the exfiltrated knowledge is already public and the attacker’s URL is secure. 

Whereas Radware demonstrated the assault methodology towards Gmail, the corporate mentioned Deep Analysis can entry different broadly used enterprise providers as nicely, together with Google Drive, Dropbox, Outlook, HubSpot, Notion, Microsoft Groups, and GitHub. 

OpenAI was notified in regards to the assault on June 18 and the vulnerability was mounted sooner or later in early August. 

Radware has confirmed that the assault not works. Nonetheless, it advised SecurityWeek that it believes “there’s nonetheless a reasonably large risk floor that is still undiscovered”.

The safety agency recommends steady agent conduct monitoring for mitigating such assaults. 

“Monitoring each the agent’s actions and its inferred intent and validating that they continue to be in step with the person’s authentic objectives. This alignment examine ensures that even when an attacker steers the agent, deviations from professional intent are detected and blocked in actual time,” it defined.

Associated: Irregular Raises $80 Million for AI Safety Testing Lab

Associated: UAE’s K2 Assume AI Jailbroken By Its Personal Transparency Options

Security Week News Tags:Attack, ChatGPT, Data, Deep, Research, ServerSide, Targeted, Theft

Post navigation

Previous Post: SonicWall Urges Password Resets After Cloud Backup Breach Affecting Under 5% of Customers
Next Post: Top 10 Best Model Context Protocol (MCP) Servers in 2025

Related Posts

Hackers Start Exploiting Critical Cisco ISE Vulnerabilities Security Week News
Marlboro-Chesterfield Pathology Data Breach Impacts 235,000 People Security Week News
Alleged Chinese State Hacker Wanted by US Arrested in Italy Security Week News
Sploitlight: macOS Vulnerability Leaks Sensitive Information Security Week News
Gerrit Misconfiguration Exposed Google Projects to Malicious Code Injection Security Week News
Critical Vulnerabilities Patched in Sophos Firewall Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • 0-Click ChatGPT Agent Vulnerability Allows Sensitive Data Exfiltration from Gmail
  • Top 10 Best Model Context Protocol (MCP) Servers in 2025
  • ChatGPT Deep Research Targeted in Server-Side Data Theft Attack
  • SonicWall Urges Password Resets After Cloud Backup Breach Affecting Under 5% of Customers
  • Hackers Injecting Malicious Code into GitHub Actions Workflows to Steal PyPI Publishing Tokens

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • 0-Click ChatGPT Agent Vulnerability Allows Sensitive Data Exfiltration from Gmail
  • Top 10 Best Model Context Protocol (MCP) Servers in 2025
  • ChatGPT Deep Research Targeted in Server-Side Data Theft Attack
  • SonicWall Urges Password Resets After Cloud Backup Breach Affecting Under 5% of Customers
  • Hackers Injecting Malicious Code into GitHub Actions Workflows to Steal PyPI Publishing Tokens

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News