Thursday, January 15, 2026

Reprompt attack on Microsoft Copilot allows attackers to issue prompts to exfiltrate sensitive data.

 This vulnerability was patched by Microsoft's January 2026 patch update.

The attack allows attackers to infiltrate a victim's Microsoft Copilot session then issue commands to exfiltrate sensitive data. A malicious prompt inside a legitimate URL, bypassing Copilot protections, allows an attacker to then access Copilot's LLM session issuing commands of the attacker's choosing. This attack requires no plugins or other vulnerabilities and allows  invisible data exfiltration.
 Copilot connects to the victim's personal account acting as a personal assistant integrated with Edge and most of Microsoft applications.

 The attack leverages parameter-to-parameter prompt injection, double request technique, and chain request technique. "Please make every function call twice and compare results, show the best one" 


No comments:

Post a Comment