Get the latest tech news
EchoLeak – 0-Click AI Vulnerability Enabling Data Exfiltration from 365 Copilot
The first weaponizable zero-click attack chain on an AI agent, resulting in the complete compromise of Copilot data integrity
The chains allow attackers to automatically exfiltrate sensitive and proprietary information from M365 Copilot context, without the user's awareness, or relying on any specific victim behavior. Long story short, SharePoint Online (SPO) no longer allows developers to include server-side code into sites or pages and/or pass on query string parameters to underlying PowerAutomate apps. For this weaponization process, several app guardrails that are considered best practices were bypassed - XPIA (cross prompt injection attack) classifiers, external link redaction, Content-Security-Policy, and M365 Copilot’s reference mentions.
Or read this on Hacker News