Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

AI Systems Vulnerable to Prompt Injection via Image Scaling Attack

Posted on August 26, 2025August 26, 2025 By CWS

Researchers have proven how in style AI methods will be tricked into processing malicious directions by an oblique immediate injection assault that includes picture scaling. 

Picture scaling assaults in opposition to AI should not a brand new idea, however consultants at cybersecurity analysis and consulting agency Path of Bits have now proven how the approach will be leveraged in opposition to trendy AI methods. 

AI merchandise, notably these that may course of massive photos, usually routinely downscale a picture earlier than sending it to the core AI mannequin for evaluation. 

Path of Bits researchers confirmed how risk actors can create a specifically crafted picture that accommodates a hidden malicious immediate. The attacker’s immediate is invisible within the high-resolution picture, but it surely turns into seen when the picture is downscaled by preprocessing algorithms. 

The low-resolution picture with the seen malicious immediate is handed on to the AI mannequin, which can interpret the message as a professional instruction. 

Path of Bits demonstrated the potential influence of the assault by hiding a textual content instructing the AI mannequin to exfiltrate the consumer’s calendar information.

AI instruments are more and more built-in with different options, notably in enterprise environments, and researchers frequently present how AI assistants will be abused for delicate information theft and manipulation by hidden prompts.  

Path of Bits mentioned its picture scaling assault works in opposition to the Gemini command-line interface (CLI), Gemini’s net and API interfaces, Vertex AI Studio, Google Assistant, Genspark, and certain different merchandise. Commercial. Scroll to proceed studying.

In some circumstances, notably when a CLI is used, the sufferer doesn’t see the rescaled picture (during which the malicious immediate is seen) earlier than it’s processed by the AI mannequin, which makes the assault try even much less prone to be found.

The safety agency has launched an open supply device named Anamorpher, which can be utilized by different researchers to craft and visualize picture scaling assaults in opposition to AI methods.

Associated: OneFlip: An Rising Risk to AI that Might Make Autos Crash and Facial Recognition Fail

Associated: GPT-5 Has a Vulnerability: Its Router Can Ship You to Older, Much less Secure Fashions

Associated: Purple Groups Jailbreak GPT-5 With Ease, Warn It’s ‘Practically Unusable’ for Enterprise

Security Week News Tags:Attack, Image, Injection, Prompt, Scaling, Systems, Vulnerable

Post navigation

Previous Post: Hundreds of Thousands Affected by Auchan Data Breach
Next Post: ShadowCaptcha Exploits WordPress Sites to Spread Ransomware, Info Stealers, and Crypto Miners

Related Posts

Enterprise Secrets Exposed by CyberArk Conjur Vulnerabilities Security Week News
Filigran Raises $58 Million in Series C Funding Security Week News
Settlement Reached in Investors’ Lawsuit Against Meta CEO Mark Zuckerberg and Other Company Leaders Security Week News
Organizations Warned of Exploited Sudo Vulnerability Security Week News
GitHub Workflows Attack Affects Hundreds of Repos, Thousands of Secrets Security Week News
Qantas Confirms 5.7 Million Impacted by Data Breach Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Chaosbot Leveraging CiscoVPN and Active Directory Passwords to Execute Network Commands
  • Threat Actors Exploiting SonicWall SSL VPN Devices in Wild to Deploy Akira Ransomware
  • Nanoprecise partners with AccuKnox to strengthen its Zero Trust Cloud Security and Compliance Posture
  • Stealit Malware Abuses Node.js Single Executable Feature via Game and VPN Installers
  • In Other News: Gladinet Flaw Exploitation, Attacks on ICS Honeypot, ClayRat Spyware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Chaosbot Leveraging CiscoVPN and Active Directory Passwords to Execute Network Commands
  • Threat Actors Exploiting SonicWall SSL VPN Devices in Wild to Deploy Akira Ransomware
  • Nanoprecise partners with AccuKnox to strengthen its Zero Trust Cloud Security and Compliance Posture
  • Stealit Malware Abuses Node.js Single Executable Feature via Game and VPN Installers
  • In Other News: Gladinet Flaw Exploitation, Attacks on ICS Honeypot, ClayRat Spyware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News