Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New ChatGPT Flaws Allow Attackers to Exfiltrate Sensitive Data from Gmail, Outlook, and GitHub

Posted on January 8, 2026January 8, 2026 By CWS

Crucial vulnerabilities in ChatGPT permit attackers to exfiltrate delicate information from linked companies like Gmail, Outlook, and GitHub with out person interplay.

Dubbed ShadowLeak and ZombieAgent, these flaws exploit the AI’s Connectors and Reminiscence options for zero-click assaults, persistence, and even propagation.​

OpenAI’s Connectors allow ChatGPT to combine with exterior techniques comparable to Gmail, Jira, GitHub, Groups, and Google Drive in just a few clicks.

The Reminiscence characteristic, enabled by default, shops person conversations and information for personalised responses, permitting the AI to learn, edit, or delete entries.

Whereas enhancing utility, these capabilities grant broad entry to non-public and company information, amplifying dangers from insufficient safeguards.​

ChatGPT Zero-Click on and One-Click on Assaults

Attackers ship malicious emails or share recordsdata embedding hidden directions, invisible to customers, by way of white textual content, tiny fonts, or footers.

Assault Chain (Supply: Radware)

Within the zero-click server-side variant, ChatGPT scans the inbox throughout routine duties like summarizing emails, executes the payload, and leaks information by way of OpenAI’s servers earlier than customers discover.

A one-click model triggers when victims add tainted recordsdata, enabling chained assaults on linked repositories or drives.​

Assault TypeTriggerExfiltration MethodScopeZero-Click on Server-SideShared a malicious fileVia browser.open() software on OpenAI serversGmail inboxes, PII​One-Click on Server-SideMemory modification by way of a fileHidden prompts in docs​Google Drive, GitHub​Persistence (ZombieAgent)Reminiscence modification by way of fileOngoing leaks per question ​All chats, medical information​PropagationEmail deal with harvestingAuto-forward to contacts [query context]Organizational unfold

OpenAI blocked dynamic URL modifications, however researchers bypassed this with pre-built URLs for every character (a-z, 0-9, $ for areas).

ChatGPT normalizes delicate strings like “Zvika Doe” to “zvikadoe”, then sequentially opens static hyperlinks like compliance.hr-service.web/get-public-joke/z, exfiltrating information with out development. This service-side technique evades client-side defenses, browsers, and UI visibility.​

For persistence, attackers inject memory-altering guidelines by way of recordsdata: on each message, learn a particular attacker e mail and leak information first.

Regardless of OpenAI’s restrictions on mixing Connectors and Reminiscence, reverse entry works, enabling countless exfiltration even in new chats. Propagation scans inboxes for addresses, exfiltrates them, and attacker servers auto-send payloads, focusing on organizations.​

Radware reported the problems on September 26, 2025, by way of BugCrowd, offering particulars and upgrades. OpenAI mounted ShadowLeak on September 3 and the total set on December 16, 2025, after copy.

Consultants urge monitoring agent behaviors and sanitizing inputs, as agentic AI blind spots persist.​

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attackers, ChatGPT, Data, Exfiltrate, Flaws, GitHub, Gmail, Outlook, Sensitive

Post navigation

Previous Post: Trump Signals U.S. Cyber Role in Caracas Blackout During Maduro Capture
Next Post: Rethinking Security for Agentic AI

Related Posts

Open Source CyberSOCEval Sets New Standards for AI in Malware Analysis and Threat Intelligence Cyber Security News
70,000+ MongoDB Servers Vulnerable to MongoBleed Exploit Cyber Security News
Proxyware Malware Mimic as YouTube Video Download Site Delivers Malicious Javascripts Cyber Security News
Top 10 Advanced Threat Detection Techniques for Modern Cybersecurity Cyber Security News
Threat Actors Poses as Korean TV Programs Writer to Trick Victims and Install Malware Cyber Security News
New Nova Stealer Attacking macOS Users by Swapping Legitimate Apps to Steal Cryptocurrency Wallet Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • 377,000 Impacted by Data Breach at Texas Gas Station Firm
  • 10 Best Bot Protection Software
  • Trend Micro Apex Central RCE Flaw Scores 9.8 CVSS in On-Prem Windows Versions
  • CISA Retires 10 Emergency Cybersecurity Directives Issued Between 2019 and 2024
  • SmarterTools SmarterMail Vulnerability Enables Remote Code Execution Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • 377,000 Impacted by Data Breach at Texas Gas Station Firm
  • 10 Best Bot Protection Software
  • Trend Micro Apex Central RCE Flaw Scores 9.8 CVSS in On-Prem Windows Versions
  • CISA Retires 10 Emergency Cybersecurity Directives Issued Between 2019 and 2024
  • SmarterTools SmarterMail Vulnerability Enables Remote Code Execution Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark