Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

‘Whisper Leak’ LLM Side-Channel Attack Infers User Prompt Topics

Posted on November 11, 2025November 11, 2025 By CWS

Microsoft researchers have devised a brand new AI side-channel assault that depends on metadata patterns to deduce the dialog a person has with a distant language mannequin, even when the communication is end-to-end encrypted.

The problem, they are saying, impacts all LLMs and poses a major threat to entities beneath surveillance from ISPs, governments, or cyber actors, because it exposes delicate conversations, starting from authorized recommendation to medical consultations and different personal subjects, to eavesdropping.

“This particularly poses real-world dangers to customers by oppressive governments the place they might be focusing on subjects comparable to protesting, banned materials, election course of, or journalism,” Microsoft notes.

The assault, known as Whisper Leak, assumes that the adversary is positioned to observe the community site visitors between the sufferer and the LLM. Even with out having the ability to decrypt the site visitors, the adversary can infer the dialog matter based mostly on packet measurement and timing patterns within the chatbot’s responses.

The assault exploits the truth that LLMs generate responses by predicting tokens (phrases or sub-words) based mostly on the person’s enter and beforehand generated tokens, in a step-by-step method. Moreover, they serve the tokens instantly or in batches, in a ‘streaming’ strategy.

In keeping with Microsoft’s researchers, this influences the timing and measurement of the information chunks the LLM sends to the consumer. The communication, nonetheless, is often encrypted utilizing HTTP over TLS (HTTPS).

“Fashionable TLS encryption schemes protect the dimensions relationship between plaintext and ciphertext. When information is encrypted, the ensuing ciphertext measurement is instantly proportional to the unique plaintext measurement, plus a small fixed overhead,” the researchers notice of their technical paper.

Basically, which means that, whereas the content material of the communication is efficiently encrypted, the dimensions of the transmitted information chunks is leaked.Commercial. Scroll to proceed studying.

“For LLM providers that stream responses token by token, this measurement info reveals patterns in regards to the tokens being generated. Mixed with timing info between packets, these leaked patterns kind the premise of the Whisper Leak assault,” the researchers clarify.

To guage the assault, the researchers simulated a situation the place the attacker may solely observe the encrypted site visitors, and skilled a binary classifier to tell apart between the subject of “legality of cash laundering” and background site visitors.

The researchers’ experiment confirmed that 17 of the 28 examined fashions achieved over 98% accuracy in distinguishing the goal matter, with some reaching over 99.9% accuracy. Basically, they permit attackers to “establish 1 in 10,000 goal conversations with near-zero false positives”, the researchers say.

The researchers recommend random padding, token batching, and packet injection as attainable mitigation methods. OpenAI and Microsoft Azure have carried out an extra discipline in streaming responses, including a random sequence of textual content of variable size to masks the token size. Mistral added a brand new parameter with an analogous impact.

Customers, the researchers say, ought to keep away from discussing delicate subjects with AI chatbots when utilizing untrustworthy networks, ought to use VPN providers, use suppliers which have carried out the mitigations, use non-streaming fashions, and keep knowledgeable on the supplier’s safety practices.

Associated: Researchers Hack ChatGPT Recollections and Net Search Options

Associated: The Y2K38 Bug Is a Vulnerability, Not Only a Date Downside, Researchers Warn

Associated: Researchers Earn $150,000 for L1TF Exploit Leaking Information From Public Cloud

Associated: RMPocalypse: New Assault Breaks AMD Confidential Computing

Security Week News Tags:Attack, Infers, Leak, LLM, Prompt, SideChannel, Topics, User, Whisper

Post navigation

Previous Post: CISO’s Expert Guide To AI Supply Chain Attacks
Next Post: CMMC Live: Pentagon Demands Verified Cybersecurity From Contractors

Related Posts

Black Hat USA 2025 – Summary of Vendor Announcements (Part 4) Security Week News
The Wild Wild West of Agentic AI – An Attack Surface CISOs Can’t Afford to Ignore Security Week News
In Other News: FBI Warns of BadBox 2, NSO Disputes WhatsApp Fine, 1,000 Leave CISA Security Week News
France Says Administrator of Cybercrime Forum XSS Arrested in Ukraine Security Week News
Webinar Today: Breaking AI – Inside the Art of LLM Pen Testing Security Week News
Nevada State Offices Closed Following Disruptive Cyberattack Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CMMC Live: Pentagon Demands Verified Cybersecurity From Contractors
  • ‘Whisper Leak’ LLM Side-Channel Attack Infers User Prompt Topics
  • CISO’s Expert Guide To AI Supply Chain Attacks
  • Researchers Detect Malicious npm Package Targeting GitHub-Owned Repositories
  • 65% of Leading AI Companies Exposes Verified Secrets Including Keys and Tokens on GitHub

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CMMC Live: Pentagon Demands Verified Cybersecurity From Contractors
  • ‘Whisper Leak’ LLM Side-Channel Attack Infers User Prompt Topics
  • CISO’s Expert Guide To AI Supply Chain Attacks
  • Researchers Detect Malicious npm Package Targeting GitHub-Owned Repositories
  • 65% of Leading AI Companies Exposes Verified Secrets Including Keys and Tokens on GitHub

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News