Close Menu
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

What's On

Review: HP OmniBook X Flip 14

21 July 2025

Vivo Y50m 5G, Y50 5G Launched With MediaTek Dimensity 6300 SoC, 6,000mAh Battery: Price, Specifications

21 July 2025

Mark Zuckerberg Is Expanding His Secretive Hawaii Compound. Part of It Sits Atop a Burial Ground

21 July 2025
Facebook X (Twitter) Instagram
Just In
  • Review: HP OmniBook X Flip 14
  • Vivo Y50m 5G, Y50 5G Launched With MediaTek Dimensity 6300 SoC, 6,000mAh Battery: Price, Specifications
  • Mark Zuckerberg Is Expanding His Secretive Hawaii Compound. Part of It Sits Atop a Burial Ground
  • Perplexity In Talks With Smartphone Brands to Preinstall AI-Powered Comet Browser: Report
  • Does Anyone Know What ‘Wellness’ Means Anymore?
  • Snapdragon 8 Elite 2, MediaTek Dimensity 9500 to Launch Without Notable Price Increase, Tipster Claims
  • Oppo K13 Turbo Pro With Snapdragon 8s Gen 4 SoC, Inbuilt Fan Launched Alongside Oppo K13 Turbo
  • Vivo Y50m 5G – Price in India, Specifications (21st July 2025)
Facebook X (Twitter) Instagram Pinterest Vimeo
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release
Subscribe
Best in TechnologyBest in Technology
Home » Microsoft’s AI Can Be Turned Into an Automated Phishing Machine
News

Microsoft’s AI Can Be Turned Into an Automated Phishing Machine

News RoomBy News Room8 August 20243 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email

Among the other attacks created by Bargury is a demonstration of how a hacker—who, again, must already have hijacked an email account—can gain access to sensitive information, such as people’s salaries, without triggering Microsoft’s protections for sensitive files. When asking for the data, Bargury’s prompt demands the system does not provide references to the files data is taken from. “A bit of bullying does help,” Bargury says.

In other instances, he shows how an attacker—who doesn’t have access to email accounts but poisons the AI’s database by sending it a malicious email—can manipulate answers about banking information to provide their own bank details. “Every time you give AI access to data, that is a way for an attacker to get in,” Bargury says.

Another demo shows how an external hacker could get some limited information about whether an upcoming company earnings call will be good or bad, while the final instance, Bargury says, turns Copilot into a “malicious insider” by providing users with links to phishing websites.

Phillip Misner, head of AI incident detection and response at Microsoft, says the company appreciates Bargury identifying the vulnerability and says it has been working with him to assess the findings. “The risks of post-compromise abuse of AI are similar to other post-compromise techniques,” Misner says. “Security prevention and monitoring across environments and identities help mitigate or stop such behaviors.”

As generative AI systems, such as OpenAI’s ChatGPT, Microsoft’s Copilot, and Google’s Gemini, have developed in the past two years, they’ve moved onto a trajectory where they may eventually be completing tasks for people, like booking meetings or online shopping. However, security researchers have consistently highlighted that allowing external data into AI systems, such as through emails or accessing content from websites, creates security risks through indirect prompt injection and poisoning attacks.

“I think it’s not that well understood how much more effective an attacker can actually become now,” says Johann Rehberger, a security researcher and red team director, who has extensively demonstrated security weaknesses in AI systems. “What we have to be worried [about] now is actually what is the LLM producing and sending out to the user.”

Bargury says Microsoft has put a lot of effort into protecting its Copilot system from prompt injection attacks, but he says he found ways to exploit it by unraveling how the system is built. This included extracting the internal system prompt, he says, and working out how it can access enterprise resources and the techniques it uses to do so. “You talk to Copilot and it’s a limited conversation, because Microsoft has put a lot of controls,” he says. “But once you use a few magic words, it opens up and you can do whatever you want.”

Rehberger broadly warns that some data issues are linked to the long-standing problem of companies allowing too many employees access to files and not properly setting access permissions across their organizations. “Now imagine you put Copilot on top of that problem,” Rehberger says. He says he has used AI systems to search for common passwords, such as Password123, and it has returned results from within companies.

Both Rehberger and Bargury say there needs to be more focus on monitoring what an AI produces and sends out to a user. “The risk is about how AI interacts with your environment, how it interacts with your data, how it performs operations on your behalf,” Bargury says. “You need to figure out what the AI agent does on a user’s behalf. And does that make sense with what the user actually asked for.”

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleSamsung Has Reportedly Patented a New Under-Display Camera Technology
Next Article This HP business laptop with Copilot is over $900 off

Related Articles

News

Review: HP OmniBook X Flip 14

21 July 2025
News

Mark Zuckerberg Is Expanding His Secretive Hawaii Compound. Part of It Sits Atop a Burial Ground

21 July 2025
News

Does Anyone Know What ‘Wellness’ Means Anymore?

21 July 2025
News

The Best Nintendo Switch 2 Controllers

20 July 2025
News

The Best Dolby Atmos Experience Could Be Waiting in Your Driveway

20 July 2025
News

How to Limit Galaxy AI to On-Device Processing—or Turn It Off Altogether

20 July 2025
Demo
Top Articles

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 2024102 Views

Costco partners with Electric Era to bring back EV charging in the U.S.

28 October 202495 Views

Oppo Reno 14, Reno 14 Pro India Launch Timeline and Colourways Leaked

27 May 202582 Views

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Latest News
Phones

Snapdragon 8 Elite 2, MediaTek Dimensity 9500 to Launch Without Notable Price Increase, Tipster Claims

News Room21 July 2025
Phones

Oppo K13 Turbo Pro With Snapdragon 8s Gen 4 SoC, Inbuilt Fan Launched Alongside Oppo K13 Turbo

News Room21 July 2025
Laptops

Vivo Y50m 5G – Price in India, Specifications (21st July 2025)

News Room21 July 2025
Most Popular

The Spectacular Burnout of a Solar Panel Salesman

13 January 2025124 Views

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 2024102 Views

Costco partners with Electric Era to bring back EV charging in the U.S.

28 October 202495 Views
Our Picks

Perplexity In Talks With Smartphone Brands to Preinstall AI-Powered Comet Browser: Report

21 July 2025

Does Anyone Know What ‘Wellness’ Means Anymore?

21 July 2025

Snapdragon 8 Elite 2, MediaTek Dimensity 9500 to Launch Without Notable Price Increase, Tipster Claims

21 July 2025

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Facebook X (Twitter) Instagram Pinterest
  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact Us
© 2025 Best in Technology. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.