Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

Ransomware gang exploits flaws in less than simple help to target victims with double fear tor

New catalysts show significant advances in PFA degradation

How Agent AI is configured to change workplaces

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » Zero-click AI vulnerability exposes Microsoft 365 Copilot data without user interaction
Identity

Zero-click AI vulnerability exposes Microsoft 365 Copilot data without user interaction

userBy userJune 12, 2025No Comments6 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

A new attack technology named Echoleak is characterized as a vulnerability in “zero-click” artificial intelligence (AI) that allows bad actors to eliminate sensitive data from the context of Microsoft 365 Copilot.

Critically evaluated vulnerabilities are assigned the CVE identifier CVE-2025-32711 (CVSS score: 9.3). No customer action is required. It’s already been addressed by Microsoft. There is no evidence that the flaws have been misused in the wild.

“AI command injection on the M365 Copilot allows fraudulent attackers to disclose information through the network,” the company said in an advisory released Wednesday. It was then added to Microsoft’s Patch Tuesday list in June 2025, bringing the total number of fixed defects to 68.

We discovered and reported this issue, AIM security, which paved the way for indirect rapid injections, stated that it was an instance of a massive language model (LLM) scope violation that led to unintended behavior.

LLM scope violations occur when attacker instructions are embedded in untrusted content. For example, emails sent from outside an organization can trick AI systems into accessing and processing privileged internal data without explicit user intent or interaction.

“The chain allows attackers to automatically remove sensitive and unique information from the context of an M365 co-pilot, without user awareness or relying on the behavior of a particular victim,” said the Israeli cybersecurity company. “The results are achieved despite the M365 Copilot’s interface being open only to employees in the organization.”

Cybersecurity

The attack sequence unfolds as follows:

Injection: Attackers send harmlessly-looking emails to employee’s Outlook inbox, including exploits of LLM scope violations. Leak sensitive data to attackers via Microsoft Teams and SharePoint URLs

“As a zero-click AI vulnerability, Echoleak opens widespread opportunities for data removal and tor attacks for motivated threat actors,” AIM Security said. “The ever-evolving world of agents presents the potential risks inherent in the design of agents and chatbots.”

“Attacks allow attackers to exclude the most sensitive data from the current LLM context. LLM is used against itself to ensure that the most sensitive data from the LLM context is leaked and can be performed in both single-turn and multiple conversations, without relying on the behavior of a particular user.”

MCP and Advanced Tools Addiction

This disclosure is because Cyberark has disclosed a Tool Addiction Attack (TPA) that affects Model Context Protocol (MCP) standards and extends beyond the description of the tool to the entire tool schema. Attack technique is called Full Sheema Addiction (FSP).

“Most of the attention on tool addiction attacks focuses on the explanatory field, which is a very underestimation of other potential attack surfaces,” said security researcher Simcha Kosman. “Every part of the tool schema is not just an explanation, but a potential injection point.”

The cybersecurity company said the issue is rooted in the MCP’s “a fundamentally optimistic trust model” that equates syntactic correctness with semantic safety, and that LLMS only assumes reasons rather than explicitly documented behaviour.

Additionally, TPAs ​​and FSPs can be weaponized to stage advanced tool addiction attacks (ATPAs). This causes the attacker to design the tool with a benign description, but displays a fake error message that tricks LLM to access sensitive data (such as SSH keys) to address the alleged problem.

“As LLM agents become more capable and autonomous, interactions with external tools via protocols like MCP define how safe and reliable they operate,” Cosman said. “Tool addiction attacks, especially advanced forms like ATPA — expose important blind spots in current implementations.”

That’s not all. Given that MCP allows AI agents (or assistants) to interact with a wide range of tools, services, and data sources, vulnerabilities in the MCP client-server architecture can pose serious security risks, such as manipulating agents to leak data or executing malicious code.

This is evidenced by a critical security flaw recently disclosed in the popular Github MCP integration. This allows an attacker to hijack the user’s agent via a malicious Github issue and leak data from the private repository when the user prompts the model to “see the problem” to the model.

“The issue includes a payload that is executed by the agent as soon as you queried the list of public repository issues,” Invariant Labs researchers Marco Milanta and Luca Beurer-Kellner said they would classify it as a case of toxic agent flow.

That said, the vulnerability is a “basic architecture issue” and cannot be addressed on GitHub alone via server-side patches. This is because users must implement detailed permission controls so that agents can access only the interactions and continuous interactions between the agent and the MCP system.

Give way to MCP rebind attacks

The rapid rise of MCP as a “connection organization for enterprise automation and agent applications” has launched new attacks such as domain name system (DNS) rebinding to access sensitive data by leveraging Server-Sent Events (SSE), a protocol used by MCP servers for real-time streaming communications to MCP clients.

Cybersecurity

DNS rebinding attacks require tricking to treat external domains as if the victim’s browser belongs to the internal network (i.e. LocalHost). Designed to bypass the same Aurisine Policy (SOP) restrictions, these attacks are triggered when users visit malicious sites set up by attackers via phishing or social engineering.

“There’s been a disconnect between the browser security mechanism and the networking protocol,” Github’s Jaroslav Lobacevski said in an explanator for DNS Rebind, published this week. “If a web page host’s resolved IP address changes, the browser does not take that into consideration and treats the web page as if its origin had not been changed. This could be abused by an attacker.”

This behavior essentially allows client-side JavaScript on malicious sites to bypass security controls and target other devices on the victim’s private network that are not exposed to the public internet.

MCP rebind attack

MCP rebind attacks leverage the adversary website’s ability to interact with MCP servers running on the local host via SSE, and ultimately access internal resources on the victim’s local network to remove sensitive data.

“By abusing SSE’s long-life connections, attackers can pivot from external phishing domains to target internal MCP servers,” the Straiker AI Research (Star) team said in an analysis released last month.

It is worth noting that the SSE was deprecated in November 2024 in favor of streamable HTTP, due to the risks that DNS poses from attack relocation. To mitigate the threat of such attacks, we recommend that you perform authentication of your MCP server and verify the “Origin” header of all incoming connections to your MCP server to ensure that your requests are from trusted sources.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleMGN Event announces new website and brand updates
Next Article Bien Venue strengthens leadership teams with strategic recruitment
user
  • Website

Related Posts

Ransomware gang exploits flaws in less than simple help to target victims with double fear tor

June 13, 2025

Apple Zero-Clock flaws in messages abused by journalist spies using Paragon Spyware

June 13, 2025

How Vextrio and Affiliates run a global fraud network

June 12, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Ransomware gang exploits flaws in less than simple help to target victims with double fear tor

New catalysts show significant advances in PFA degradation

How Agent AI is configured to change workplaces

Apple Zero-Clock flaws in messages abused by journalist spies using Paragon Spyware

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Top Startups and High-Tech Funding News – June 12, 2025

AI Internet is down: Google Cloud outage breaks Firebase, Supabase, Cursor, Lovable, etc.

Digital banking startup Chime pops with IPO debut, raising $700 million at a valuation of $11.6 billion

Spanish AI Startup Multiverse raises $227 million to reduce LLMS and reduce inference costs by 80%

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.