Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New ChatGPT Flaws Allow Attackers to Exfiltrate Sensitive Data from Gmail, Outlook, and GitHub

New ChatGPT Flaws Allow Attackers to Exfiltrate Sensitive Data from Gmail, Outlook, and GitHub

Posted on January 8, 2026January 8, 2026 By CWS

Crucial vulnerabilities in ChatGPT permit attackers to exfiltrate delicate information from linked companies like Gmail, Outlook, and GitHub with out person interplay.

Dubbed ShadowLeak and ZombieAgent, these flaws exploit the AI’s Connectors and Reminiscence options for zero-click assaults, persistence, and even propagation.​

OpenAI’s Connectors allow ChatGPT to combine with exterior techniques comparable to Gmail, Jira, GitHub, Groups, and Google Drive in just a few clicks.

The Reminiscence characteristic, enabled by default, shops person conversations and information for personalised responses, permitting the AI to learn, edit, or delete entries.

Whereas enhancing utility, these capabilities grant broad entry to non-public and company information, amplifying dangers from insufficient safeguards.​

ChatGPT Zero-Click on and One-Click on Assaults

Attackers ship malicious emails or share recordsdata embedding hidden directions, invisible to customers, by way of white textual content, tiny fonts, or footers.

Assault Chain (Supply: Radware)

Within the zero-click server-side variant, ChatGPT scans the inbox throughout routine duties like summarizing emails, executes the payload, and leaks information by way of OpenAI’s servers earlier than customers discover.

A one-click model triggers when victims add tainted recordsdata, enabling chained assaults on linked repositories or drives.​

Assault TypeTriggerExfiltration MethodScopeZero-Click on Server-SideShared a malicious fileVia browser.open() software on OpenAI serversGmail inboxes, PII​One-Click on Server-SideMemory modification by way of a fileHidden prompts in docs​Google Drive, GitHub​Persistence (ZombieAgent)Reminiscence modification by way of fileOngoing leaks per question ​All chats, medical information​PropagationEmail deal with harvestingAuto-forward to contacts [query context]Organizational unfold

OpenAI blocked dynamic URL modifications, however researchers bypassed this with pre-built URLs for every character (a-z, 0-9, $ for areas).

ChatGPT normalizes delicate strings like “Zvika Doe” to “zvikadoe”, then sequentially opens static hyperlinks like compliance.hr-service.web/get-public-joke/z, exfiltrating information with out development. This service-side technique evades client-side defenses, browsers, and UI visibility.​

For persistence, attackers inject memory-altering guidelines by way of recordsdata: on each message, learn a particular attacker e mail and leak information first.

Regardless of OpenAI’s restrictions on mixing Connectors and Reminiscence, reverse entry works, enabling countless exfiltration even in new chats. Propagation scans inboxes for addresses, exfiltrates them, and attacker servers auto-send payloads, focusing on organizations.​

Radware reported the problems on September 26, 2025, by way of BugCrowd, offering particulars and upgrades. OpenAI mounted ShadowLeak on September 3 and the total set on December 16, 2025, after copy.

Consultants urge monitoring agent behaviors and sanitizing inputs, as agentic AI blind spots persist.​

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attackers, ChatGPT, Data, Exfiltrate, Flaws, GitHub, Gmail, Outlook, Sensitive

Post navigation

Previous Post: Trump Signals U.S. Cyber Role in Caracas Blackout During Maduro Capture
Next Post: Rethinking Security for Agentic AI

Related Posts

UAT-638 Hackers Exploit Cityworks Zero-Day to Attack IIS Servers With VSHell Malware UAT-638 Hackers Exploit Cityworks Zero-Day to Attack IIS Servers With VSHell Malware Cyber Security News
Claude Vulnerabilities Let Attackers Execute Unauthorized Commands With its Own Help Claude Vulnerabilities Let Attackers Execute Unauthorized Commands With its Own Help Cyber Security News
Critical Linux Vulnerabilities Expose Password Hashes on Millions of Linux Systems Worldwide Critical Linux Vulnerabilities Expose Password Hashes on Millions of Linux Systems Worldwide Cyber Security News
Critical Hikvision Vulnerability Threatens Wireless Access Points Critical Hikvision Vulnerability Threatens Wireless Access Points Cyber Security News
OpenSSH Vulnerability Exploited Via ProxyCommand to Execute Remote Code OpenSSH Vulnerability Exploited Via ProxyCommand to Execute Remote Code Cyber Security News
10 Best NGINX Monitoring Tools 10 Best NGINX Monitoring Tools Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark