Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
ChatGPT’s Calendar Integration Can Be Exploited to Steal Emails

ChatGPT’s Calendar Integration Can Be Exploited to Steal Emails

Posted on September 16, 2025September 16, 2025 By CWS

A brand new ChatGPT calendar integration could be abused to execute an attacker’s instructions, and researchers at AI safety agency EdisonWatch have demonstrated the potential influence by displaying how the strategy could be leveraged to steal a person’s emails.

EdisonWatch founder Eito Miyamura revealed over the weekend that his firm has analyzed ChatGPT’s newly added Mannequin Context Protocol (MCP) device assist, which permits the gen-AI service to work together with a person’s electronic mail, calendar, fee, enterprise collaboration, and different third-party providers. 

Miyamura confirmed in a demo how an attacker may exfiltrate delicate data from a person’s electronic mail account just by figuring out the goal’s electronic mail handle. 

The assault begins with a specifically crafted calendar invitation despatched by the attacker to the goal. The invitation incorporates what Miyamura described as a ‘jailbreak immediate’ that instructs ChatGPT to seek for delicate data within the sufferer’s inbox and ship it to an electronic mail handle specified by the attacker.

The sufferer doesn’t want to simply accept the attacker’s calendar invite to set off the malicious ChatGPT instructions. As an alternative, the attacker’s immediate is initiated when the sufferer asks ChatGPT to test their calendar and assist them put together for the day.

Some of these AI assaults are usually not unusual and they don’t seem to be particular to ChatGPT. SafeBreach final month demonstrated an identical calendar invite assault concentrating on Gemini and Google Workspace. The safety agency’s researchers confirmed how an attacker may conduct spamming and phishing, delete calendar occasions, study the sufferer’s location, remotely management house home equipment, and exfiltrate emails.

Zenity additionally confirmed final month how integration between AI assistants and enterprise instruments could be exploited for varied functions. The AI safety startup shared examples of assaults concentrating on ChatGPT, Copilot, Cursor, Gemini, and Salesforce Einstein. 

EdisonWatch’s demonstration is the primary to focus on the newly launched ChatGPT calendar integration. The analysis is noteworthy for a way the agent fetches and executes calendar content material by way of device calls, which may amplify influence throughout related techniques. However, “it’s not distinctive to OpenAI,” Miyamura defined. Commercial. Scroll to proceed studying.

As a result of it’s a identified class of vulnerabilities associated to LLM integration and it’s not particular to ChatGPT, the findings haven’t been reported to OpenAI. AI firms are usually conscious that most of these assaults are doable.

Within the case of the ChatGPT assault demonstrated by EdisonWatch, the abused characteristic is at present solely obtainable in developer mode and the person must manually approve the AI chatbot’s actions. Alternatively, Miyamura identified that even when the assault requires sufferer interplay it may nonetheless be helpful for risk actors.

“Determination fatigue is an actual factor, and regular folks will simply belief the AI with out figuring out what to do and click on approve, approve, approve,” Miyamura mentioned.

EdisonWatch, based by a crew of Oxford laptop science alumni, focuses on monitoring and implementing firm policy-as-code for AI interactions with firm software program and techniques of file in an effort to assist organisations scale AI pilots safely and securely. 

The safety agency has launched model 1 of an open supply answer designed to mitigate the commonest kinds of AI assaults, serving to safe integrations and lowering the chance of information exfiltration. 

Associated: UAE’s K2 Assume AI Jailbroken By Its Personal Transparency Options

Associated: Methods to Shut the AI Governance Hole in Software program Growth

Security Week News Tags:Calendar, ChatGPTs, Emails, Exploited, Integration, Steal

Post navigation

Previous Post: Fraud Prevention Company SEON Raises $80 Million in Series C Funding
Next Post: New Persistence Technique Allows Attackers to Hide Malware Within AWS Cloud Environment

Related Posts

In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k Security Week News
US Targets Chinese Firms Exploiting AI Innovations US Targets Chinese Firms Exploiting AI Innovations Security Week News
Three Charged in AI Technology Smuggling to China Three Charged in AI Technology Smuggling to China Security Week News
263,000 Impacted by Esse Health Data Breach 263,000 Impacted by Esse Health Data Breach Security Week News
In Other News: Norway Dam Hacked, 7M Data Breach Settlement, UNFI Attack Update In Other News: Norway Dam Hacked, $177M Data Breach Settlement, UNFI Attack Update Security Week News
Gabbard Says UK Scraps Demand for Apple to Give Backdoor Access to Data Gabbard Says UK Scraps Demand for Apple to Give Backdoor Access to Data Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark