Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

ChatGPT Deep Research Targeted in Server-Side Data Theft Attack

Posted on September 18, 2025September 18, 2025 By CWS

Researchers at internet safety firm Radware not too long ago found what they described as a service-side knowledge theft assault methodology involving ChatGPT. 

The assault, dubbed ShadowLeak, focused ChatGPT’s Deep Analysis functionality, which is designed to conduct multi-step analysis for advanced duties. OpenAI neutralized ShadowLeak after it was notified by Radware.

The ShadowLeak assault didn’t require any person interplay. The attacker merely wanted to ship a specifically crafted e-mail that when processed by the Deep Analysis agent would instruct it to silently acquire precious knowledge and ship it again to the attacker.

Nonetheless, not like many different oblique immediate injection assaults, ShadowLeak didn’t contain the ChatGPT shopper.

A number of cybersecurity firms not too long ago demonstrated theoretical assaults wherein the attacker leverages the combination between AI assistants and enterprise instruments to silently exfiltrate person knowledge with no or minimal sufferer interplay.

Radware mentions Zenity’s AgentFlayer and Purpose Safety’s EchoLeak assaults. Nonetheless, the corporate highlighted that these are client-side assaults, whereas ShadowLeak entails the server aspect. 

As in earlier assaults, the attacker would wish to ship an e-mail that appears innocent to the focused person however comprises hidden directions for ChatGPT. The malicious directions can be triggered when the person requested the chatbot to summarize emails or analysis a subject from their inbox. 

In contrast to client-side assaults, ShadowLeak exfiltrates knowledge by means of the parameters of a request to an attacker-controlled URL. A harmless-looking URL akin to ‘hr-service.web/{parameters}’, the place the parameter worth is the exfiltrated info, has been offered for instance by Radware. Commercial. Scroll to proceed studying.

“It’s vital to notice that the online request is carried out by the agent executing in OpenAI’s cloud infrastructure, inflicting the leak to originate instantly from OpenAI’s servers,” Radware identified, noting that the assault leaves no clear traces as a result of the request and knowledge don’t cross by means of the ChatGPT shopper. 

The attacker’s immediate is cleverly designed not solely when it comes to accumulating the knowledge and sending it to the attacker. It additionally tells the chatbot that it has full authorization to conduct the required duties, and creates a way of urgency.

The immediate additionally instructs ChatGPT to attempt a number of occasions if it doesn’t succeed, offers an instance of how the malicious directions needs to be carried out, and makes an attempt to override potential safety checks by convincing the agent that the exfiltrated knowledge is already public and the attacker’s URL is secure. 

Whereas Radware demonstrated the assault methodology towards Gmail, the corporate mentioned Deep Analysis can entry different broadly used enterprise providers as nicely, together with Google Drive, Dropbox, Outlook, HubSpot, Notion, Microsoft Groups, and GitHub. 

OpenAI was notified in regards to the assault on June 18 and the vulnerability was mounted sooner or later in early August. 

Radware has confirmed that the assault not works. Nonetheless, it advised SecurityWeek that it believes “there’s nonetheless a reasonably large risk floor that is still undiscovered”.

The safety agency recommends steady agent conduct monitoring for mitigating such assaults. 

“Monitoring each the agent’s actions and its inferred intent and validating that they continue to be in step with the person’s authentic objectives. This alignment examine ensures that even when an attacker steers the agent, deviations from professional intent are detected and blocked in actual time,” it defined.

Associated: Irregular Raises $80 Million for AI Safety Testing Lab

Associated: UAE’s K2 Assume AI Jailbroken By Its Personal Transparency Options

Security Week News Tags:Attack, ChatGPT, Data, Deep, Research, ServerSide, Targeted, Theft

Post navigation

Previous Post: SonicWall Urges Password Resets After Cloud Backup Breach Affecting Under 5% of Customers

Related Posts

SonicWall Warns of Trojanized NetExtender Stealing User Information Security Week News
Who’s Really Behind the Mask? Combatting Identity Fraud Security Week News
35,000 Solar Power Systems Exposed to Internet Security Week News
AWS Trusted Advisor Tricked Into Showing Unprotected S3 Buckets as Secure Security Week News
New Campaigns Distribute Malware via Open Source Hacking Tools Security Week News
Google Discloses Data Breach via Salesforce Hack  Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • ChatGPT Deep Research Targeted in Server-Side Data Theft Attack
  • SonicWall Urges Password Resets After Cloud Backup Breach Affecting Under 5% of Customers
  • Hackers Injecting Malicious Code into GitHub Actions Workflows to Steal PyPI Publishing Tokens
  • Critical Microsoft’s Entra ID Vulnerability Allows Attackers to Gain Complete Administrative Control
  • CountLoader Broadens Russian Ransomware Operations With Multi-Version Malware Loader

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • ChatGPT Deep Research Targeted in Server-Side Data Theft Attack
  • SonicWall Urges Password Resets After Cloud Backup Breach Affecting Under 5% of Customers
  • Hackers Injecting Malicious Code into GitHub Actions Workflows to Steal PyPI Publishing Tokens
  • Critical Microsoft’s Entra ID Vulnerability Allows Attackers to Gain Complete Administrative Control
  • CountLoader Broadens Russian Ransomware Operations With Multi-Version Malware Loader

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News