Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

CISA adds flaws of Erlang SSH and RoundCube to famous exploited directory vulnerabilities

June 10, 2025

More than 70 organizations in several sectors aimed at Chinese Cyber ​​Spying Group

June 9, 2025

Two different botnets exploit the vulnerability of the WAZUH server to launch attacks based on peaceful

June 9, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Microsoft fixes ASCII smuggling bug that caused data theft from Microsoft 365 Copilot
Global Security

Microsoft fixes ASCII smuggling bug that caused data theft from Microsoft 365 Copilot

AdminBy AdminAugust 27, 2024No Comments3 Mins Read
Microsoft Fixes ASCII Smuggling Flaw
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


August 27, 2024Ravi LakshmananAI Security / Vulnerability

Microsoft fixes ASCII smuggling bug

Details have emerged about a patched vulnerability in Microsoft 365 Copilot that could allow the theft of sensitive user information using a technique called ASCII smuggling.

“ASCII smuggling is a new technique that uses special Unicode characters that represent ASCII but are not actually visible in the user interface,” security researcher Johann Rehberger said.

“This means that an attacker can get the (large language model) user rendering of invisible data and embed it in clickable hyperlinks. This technique basically prepares data for hijacking!”

Cyber ​​security

The entire attack combines a number of attack techniques to turn them into a robust chain of exploits. This involves the following steps –

  • Trigger quick injection through malicious content hidden in a document shared in a chat
  • Using a quick payload injection to instruct the Copilot to search for more emails and documents
  • Using ASCII Smuggling to trick a user into clicking a link to output valuable data to a third-party server

The end result of the attack is that sensitive data present in emails, including multi-factor authentication (MFA) codes, can be transmitted to a server controlled by an adversary. After a responsible disclosure in January 2024, Microsoft resolved these issues.

The development takes place in connection with proof-of-concept (PoC) attacks. demonstrated against Microsoft’s Copilot system for manipulating responses, stealing private data and evading security tools, again highlighting the need to monitor risks in artificial intelligence (AI) tools.

Methods, detailed a Anti-aircraft gunshipallow attackers to perform search-augmented generation (ANUCHA) poisoning and indirect instant rooting, leading to remote code execution attacks that can fully control Microsoft Copilot and other AI applications. In a hypothetical attack scenario, an external hacker with code execution capabilities could trick Copilot into providing phishing pages to users.

Cyber ​​security

Perhaps one of the newest attacks is the ability to turn artificial intelligence into a phishing machine. Red-teaming technique, duplicate LOLCopilotallows an attacker with access to a victim’s email account to send phishing messages that mimic the style of compromised users.

Microsoft too admitted that publicly exposed Copilot bots built with Microsoft Copilot Studio and lacking authentication protections could be a way for threat actors to extract sensitive information, provided they previously knew the Copilot name or URL.

“Enterprises must assess their risk tolerance and exposure to prevent data leakage from Copilots (formerly Power Virtual Agents) and include Data loss prevention and other security measures to control the creation and publication of copilots,” Rehberger said.

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

CISA adds flaws of Erlang SSH and RoundCube to famous exploited directory vulnerabilities

June 10, 2025

More than 70 organizations in several sectors aimed at Chinese Cyber ​​Spying Group

June 9, 2025

Two different botnets exploit the vulnerability of the WAZUH server to launch attacks based on peaceful

June 9, 2025

Think what your IDP or CASB covers the shadow? These 5 risks prove differently

June 9, 2025

Openai prohibits chatgpt accounts used by Russian, Iranian and Chinese hacking groups

June 9, 2025

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

CISA adds flaws of Erlang SSH and RoundCube to famous exploited directory vulnerabilities

June 10, 2025

More than 70 organizations in several sectors aimed at Chinese Cyber ​​Spying Group

June 9, 2025

Two different botnets exploit the vulnerability of the WAZUH server to launch attacks based on peaceful

June 9, 2025

Think what your IDP or CASB covers the shadow? These 5 risks prove differently

June 9, 2025

Openai prohibits chatgpt accounts used by Russian, Iranian and Chinese hacking groups

June 9, 2025

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

CISA adds flaws of Erlang SSH and RoundCube to famous exploited directory vulnerabilities

June 10, 2025

More than 70 organizations in several sectors aimed at Chinese Cyber ​​Spying Group

June 9, 2025

Two different botnets exploit the vulnerability of the WAZUH server to launch attacks based on peaceful

June 9, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.