Microsoft has patched a critical vulnerability in its 365 Copilot service that exposed user data to severe risks through an advanced exploitation technique known as ASCII smuggling, the company announced.
Under the right conditions, perpetrators could exploit this vulnerability to steal multi-factor authentication (MFA) codes and other sensitive information from users.
Security researcher Johann Rehberger explained the mechanics behind ASCII smuggling: “ASCII Smuggling is a novel technique that uses special Unicode characters that mirror ASCII but are actually not visible in the user interface. This means that an attacker can have the LLM render, to the user, invisible data, and embed them within clickable hyperlinks. This technique basically stages the data for exfiltration!"
The flaw hinged on several interlinked attack methods that form a potential exploit chain:
After the vulnerability’s disclosure in January, Microsoft quickly released a patch to fix the flaws before they could be exploited.
Security researchers demonstrated proof-of-concept attacks that could manipulate Copilot responses, extract private data and bypass security measures.
One particularly alarming exploit, referred to as “LOLCopilot,” could let threat actors weaponize an AI system, turning it into a spear-phishing tool that could send phishing messages that mimic the communication style of the compromised account.
Additionally, Microsoft acknowledged the risks posed by publicly accessible Copilot bots created with Microsoft Copilot Studio, especially those without proper authentication measures.
Threat actors could exploit these bots to siphon off sensitive information if they possess prior knowledge of the Copilot's name or URL.
tags
Vlad's love for technology and writing created rich soil for his interest in cybersecurity to sprout into a full-on passion. Before becoming a Security Analyst, he covered tech and security topics.
View all postsDecember 24, 2024
December 19, 2024
November 14, 2024