Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Google Gemini Vulnerabilities Let Attackers Exfiltrate User’s Saved Data and Location

Posted on September 30, 2025September 30, 2025 By CWS

Three new vulnerabilities in Google’s Gemini AI assistant suite might have allowed attackers to exfiltrate customers’ saved data and placement knowledge.

The vulnerabilities uncovered by Tenable, dubbed the “Gemini Trifecta,” spotlight how AI techniques will be was assault automobiles, not simply targets. The analysis uncovered important privateness dangers throughout completely different parts of the Gemini ecosystem.

Whereas Google has since patched the problems, the invention serves as a essential reminder of the safety challenges inherent in extremely customized, AI-driven platforms. The three distinct vulnerabilities focused separate features inside Gemini.

Gemini Trifecta

Gemini Cloud Help: A prompt-injection vulnerability within the Google Cloud software might have enabled attackers to compromise cloud assets or execute phishing makes an attempt. Researchers discovered that log entries, which Gemini can summarize, could possibly be poisoned with malicious prompts. This represents a brand new assault class the place log injections can manipulate AI inputs.

Gemini Search Personalization Mannequin: This search-injection flaw gave attackers the flexibility to manage Gemini’s conduct by manipulating a person’s Chrome search historical past. By injecting malicious search queries, an attacker might trick Gemini into leaking a person’s saved data and placement knowledge.

Gemini Looking Instrument: A vulnerability on this software allowed for the direct exfiltration of a person’s saved data. Attackers might abuse the software’s performance to ship delicate knowledge to an exterior server.

The core of the assault methodology concerned a two-step course of: infiltration and exfiltration. Attackers first wanted to inject a malicious immediate that Gemini would course of as a professional command.

Tenable found stealthy strategies for this “oblique immediate injection,” akin to embedding directions inside a log entry’s Person-Agent header or utilizing JavaScript so as to add malicious queries to a sufferer’s browser historical past silently.

As soon as the immediate was injected, the subsequent problem was to extract the info, bypassing Google’s safety measures that filter outputs like hyperlinks and picture markdowns.

The researchers found they may exploit the Gemini Looking Instrument as a facet channel. They crafted a immediate that instructed Gemini to make use of its looking software to fetch a URL, embedding the person’s personal knowledge straight into the URL request despatched to an attacker-controlled server.

This exfiltration occurred by way of software execution quite than response rendering, circumventing a lot of Google’s defenses.

Google has efficiently remediated all three vulnerabilities. The fixes embody stopping hyperlinks from rendering in log summaries, rolling again the weak search personalization mannequin, and stopping knowledge exfiltration by way of the looking software throughout oblique immediate injections.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attackers, Data, Exfiltrate, Gemini, Google, Location, Saved, Users, Vulnerabilities

Post navigation

Previous Post: Threat Actors Allegedly Listed Veeam RCE Exploit for Sale on Dark Web
Next Post: CISA Warns of Linux Sudo Vulnerability Actively Exploited in Attacks

Related Posts

AppSuite PDF Editor Hacked to Execute Arbitrary Commands on The Infected System Cyber Security News
UAC-0001 Hackers Attacking ICS Devices Running Windows Systems as a Server Cyber Security News
Securing IoT Devices in the Enterprise Challenges and Solutions Cyber Security News
Cisco Nexus 3000 and 9000 Series Vulnerability Let Attackers Trigger DoS Attack Cyber Security News
Achieving Continuous Compliance in Dynamic Threat Environments Cyber Security News
Microsoft Warns of Hackers Using ClickFix Technique to Attack Windows and macOS Devices Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News