Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

ChatGPT’s Calendar Integration Can Be Exploited to Steal Emails

Posted on September 16, 2025September 16, 2025 By CWS

A brand new ChatGPT calendar integration could be abused to execute an attacker’s instructions, and researchers at AI safety agency EdisonWatch have demonstrated the potential influence by displaying how the strategy could be leveraged to steal a person’s emails.

EdisonWatch founder Eito Miyamura revealed over the weekend that his firm has analyzed ChatGPT’s newly added Mannequin Context Protocol (MCP) device assist, which permits the gen-AI service to work together with a person’s electronic mail, calendar, fee, enterprise collaboration, and different third-party providers. 

Miyamura confirmed in a demo how an attacker may exfiltrate delicate data from a person’s electronic mail account just by figuring out the goal’s electronic mail handle. 

The assault begins with a specifically crafted calendar invitation despatched by the attacker to the goal. The invitation incorporates what Miyamura described as a ‘jailbreak immediate’ that instructs ChatGPT to seek for delicate data within the sufferer’s inbox and ship it to an electronic mail handle specified by the attacker.

The sufferer doesn’t want to simply accept the attacker’s calendar invite to set off the malicious ChatGPT instructions. As an alternative, the attacker’s immediate is initiated when the sufferer asks ChatGPT to test their calendar and assist them put together for the day.

Some of these AI assaults are usually not unusual and they don’t seem to be particular to ChatGPT. SafeBreach final month demonstrated an identical calendar invite assault concentrating on Gemini and Google Workspace. The safety agency’s researchers confirmed how an attacker may conduct spamming and phishing, delete calendar occasions, study the sufferer’s location, remotely management house home equipment, and exfiltrate emails.

Zenity additionally confirmed final month how integration between AI assistants and enterprise instruments could be exploited for varied functions. The AI safety startup shared examples of assaults concentrating on ChatGPT, Copilot, Cursor, Gemini, and Salesforce Einstein. 

EdisonWatch’s demonstration is the primary to focus on the newly launched ChatGPT calendar integration. The analysis is noteworthy for a way the agent fetches and executes calendar content material by way of device calls, which may amplify influence throughout related techniques. However, “it’s not distinctive to OpenAI,” Miyamura defined. Commercial. Scroll to proceed studying.

As a result of it’s a identified class of vulnerabilities associated to LLM integration and it’s not particular to ChatGPT, the findings haven’t been reported to OpenAI. AI firms are usually conscious that most of these assaults are doable.

Within the case of the ChatGPT assault demonstrated by EdisonWatch, the abused characteristic is at present solely obtainable in developer mode and the person must manually approve the AI chatbot’s actions. Alternatively, Miyamura identified that even when the assault requires sufferer interplay it may nonetheless be helpful for risk actors.

“Determination fatigue is an actual factor, and regular folks will simply belief the AI with out figuring out what to do and click on approve, approve, approve,” Miyamura mentioned.

EdisonWatch, based by a crew of Oxford laptop science alumni, focuses on monitoring and implementing firm policy-as-code for AI interactions with firm software program and techniques of file in an effort to assist organisations scale AI pilots safely and securely. 

The safety agency has launched model 1 of an open supply answer designed to mitigate the commonest kinds of AI assaults, serving to safe integrations and lowering the chance of information exfiltration. 

Associated: UAE’s K2 Assume AI Jailbroken By Its Personal Transparency Options

Associated: Methods to Shut the AI Governance Hole in Software program Growth

Security Week News Tags:Calendar, ChatGPTs, Emails, Exploited, Integration, Steal

Post navigation

Previous Post: Fraud Prevention Company SEON Raises $80 Million in Series C Funding
Next Post: New Persistence Technique Allows Attackers to Hide Malware Within AWS Cloud Environment

Related Posts

NATO-Flagged Vulnerability Tops Latest VMware Security Patch Batch Security Week News
FTC Calls on Tech Firms to Resist Foreign Anti-Encryption Demands Security Week News
Ransomware Group Exploits Hybrid Cloud Gaps, Gains Full Azure Control in Enterprise Attacks Security Week News
PromptLock Only PoC, but AI-Powered Ransomware Is Real Security Week News
Jaguar Land Rover Admits Data Breach Caused by Recent Cyberattack Security Week News
ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Phoenix Contact  Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Magecart Skimmer Attack With Malicious JavaScript Injection to Skim Payment Data
  • TA558 Uses AI-Generated Scripts to Deploy Venom RAT in Brazil Hotel Attacks
  • 224 Malicious Android Apps on Google Play With 38 Million Downloads Delivering Malicious Payloads
  • Agentless Access, Sensitive Data Masking, and Smooth Session Playback
  • Threat Actors Abuse Adtech Companies to Target Users With Malicious Ads

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Magecart Skimmer Attack With Malicious JavaScript Injection to Skim Payment Data
  • TA558 Uses AI-Generated Scripts to Deploy Venom RAT in Brazil Hotel Attacks
  • 224 Malicious Android Apps on Google Play With 38 Million Downloads Delivering Malicious Payloads
  • Agentless Access, Sensitive Data Masking, and Smooth Session Playback
  • Threat Actors Abuse Adtech Companies to Target Users With Malicious Ads

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News