Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
‘EchoLeak’ AI Attack Enabled Theft of Sensitive Data via Microsoft 365 Copilot

‘EchoLeak’ AI Attack Enabled Theft of Sensitive Data via Microsoft 365 Copilot

Posted on June 12, 2025June 12, 2025 By CWS

Microsoft 365 Copilot was till just lately susceptible to an assault technique that might have been leveraged by risk actors to acquire delicate data, AI safety agency Purpose Safety reported on Wednesday. 

The zero-click assault, dubbed EchoLeak and involving a vulnerability tracked as CVE-2025-32711, enabled attackers to get Copilot to mechanically exfiltrate doubtlessly useful data from a focused person or group with out requiring person interplay.

Microsoft on Wednesday revealed an advisory for the vulnerability, which it described as ‘AI command injection in M365 Copilot’ and categorised as ‘vital’, however knowledgeable prospects {that a} patch has been applied on the server aspect and no buyer motion is required.

Be taught Extra About AI Vulnerabilities at SecurityWeek’s AI Danger Summit

The Microsoft 365 Copilot is a productiveness assistant designed to boost the best way customers work together with purposes similar to Phrase, PowerPoint and Outlook. Copilot can question emails, extracting and managing data from the person’s inbox.

The EchoLeak assault entails sending a specifically crafted electronic mail to the focused person. The e-mail incorporates directions for Copilot to gather secret and private data from prior chats with the person and ship them to the attacker’s server. 

The person doesn’t must open the malicious electronic mail or click on on any hyperlinks. The exploit, which Purpose Safety described as oblique immediate injection, is triggered when the sufferer asks Copilot for data referenced within the malicious electronic mail. That’s when Copilot executes the attacker’s directions to gather data beforehand supplied by the sufferer and ship it to the attacker.

For instance, the attacker’s electronic mail can reference worker onboarding processes, HR guides, or go away of absence administration guides. When the focused person asks Copilot about one in all these matters, the AI will discover the attacker’s electronic mail and execute the directions it incorporates. Commercial. Scroll to proceed studying.

To be able to execute an EchoLeak assault, the attacker has to bypass a number of safety mechanisms, together with cross-prompt injection assault (XPIA) classifiers designed to forestall immediate injection. XPIA is bypassed by phrasing the malicious electronic mail in a method that makes it appear as if it’s aimed on the recipient, with out together with any references to Copilot or different AI. 

The assault additionally bypasses picture and hyperlink redaction mechanisms, in addition to Content material Safety Coverage (CSP), which ought to stop knowledge exfiltration. 

“This can be a novel sensible assault on an LLM utility that may be weaponized by adversaries,” Purpose Safety defined. “The assault ends in permitting the attacker to exfiltrate essentially the most delicate knowledge from the present LLM context – and the LLM is getting used towards itself in ensuring that the MOST delicate knowledge from the LLM context is being leaked, doesn’t depend on particular person conduct, and could be executed each in single-turn conversations and multi-turn conversations.”

Purpose Safety identified that whereas it demonstrated the EchoLeak assault towards Microsoft’s Copilot, the approach may match towards different AI purposes as nicely.

Associated: The Root of AI Hallucinations: Physics Idea Digs Into the ‘Consideration’ Flaw

Associated: Going Into the Deep Finish: Social Engineering and the AI Flood

Security Week News Tags:Attack, Copilot, Data, EchoLeak, Enabled, Microsoft, Sensitive, Theft

Post navigation

Previous Post: How to Address the Expanding Security Risk
Next Post: Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction

Related Posts

Hacker Claims Theft of 40 Million Condé Nast Records After Wired Data Leak Hacker Claims Theft of 40 Million Condé Nast Records After Wired Data Leak Security Week News
GreyNoise Flags 9,000 ASUS Routers Backdoored Via Patched Vulnerability GreyNoise Flags 9,000 ASUS Routers Backdoored Via Patched Vulnerability Security Week News
NPM Infrastructure Abused in Phishing Campaign Aimed at Industrial and Electronics Firms NPM Infrastructure Abused in Phishing Campaign Aimed at Industrial and Electronics Firms Security Week News
Apple, Netflix, Microsoft Sites ‘Hacked’ for Tech Support Scams  Apple, Netflix, Microsoft Sites ‘Hacked’ for Tech Support Scams  Security Week News
Nearly 250,000 Impacted by Data Breach at Medical Associates of Brevard  Nearly 250,000 Impacted by Data Breach at Medical Associates of Brevard  Security Week News
Samsung Announces Security Improvements for Galaxy Smartphones Samsung Announces Security Improvements for Galaxy Smartphones Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark