#url-parameter-injection

[ follow ]
fromZDNET
1 week ago

How a simple link allowed hackers to bypass Copilot's security guardrails - and what Microsoft did about it

Reprompt impacted Microsoft Copilot Personal and, according to the team, gave "threat actors an invisible entry point to perform a data‑exfiltration chain that bypasses enterprise security controls entirely and accesses sensitive data without detection -- all from one click." No user interaction with Copilot or plugins was required for this attack to trigger. Instead, victims had to click a link.
Information security
Information security
fromThe Hacker News
1 week ago

Researchers Reveal Reprompt Attack Allowing Single-Click Data Exfiltration From Microsoft Copilot

Reprompt enables single-click exfiltration of sensitive data from AI chatbots like Microsoft Copilot by injecting prompts via URL and bypassing guardrails.
[ Load more ]