Player FM 앱으로 오프라인으로 전환하세요!
ShadowLeak: Server-Side Data Theft Attack Discovered Against ChatGPT Deep Research
Manage episode 507480651 series 3645080
A groundbreaking new cyberattack dubbed ShadowLeak has been uncovered targeting ChatGPT’s Deep Research capability, marking a dangerous escalation in AI-related threats. Unlike prior exploits such as AgentFlayer and EchoLeak, which operated on the client side, ShadowLeak weaponized OpenAI’s own cloud infrastructure to silently exfiltrate sensitive data—without requiring any user interaction.
Discovered by researchers at Radware, the attack began with a specially crafted email containing hidden malicious instructions. When the AI agent processed the email as part of a legitimate research task, it was manipulated into sending stolen information directly from OpenAI’s servers to an attacker-controlled URL. Because the exfiltration request originated from a trusted server rather than the client, the malicious activity left no visible trace in the ChatGPT interface and could bypass traditional enterprise security monitoring.
The potential blast radius extended beyond Gmail, including services like Google Drive, Dropbox, Outlook, HubSpot, Notion, Microsoft Teams, and GitHub. Though OpenAI patched the vulnerability between June and August 2025, Radware cautions that the broader threat surface remains large and that more undiscovered vectors likely exist. The firm recommends continuous agent behavior monitoring as a more effective defense, focusing on aligning agent actions with user intent rather than relying solely on reactive patching.
This episode explores how ShadowLeak worked, why server-side AI vulnerabilities are uniquely dangerous, and what enterprises must do to prepare for the next wave of AI-targeted cyberattacks.
#ShadowLeak #ChatGPT #DeepResearch #OpenAI #Radware #AIsecurity #DataExfiltration #PromptInjection #AgentFlayer #EchoLeak #CyberSecurity #ServerSideAttack #AIThreats
373 에피소드
Manage episode 507480651 series 3645080
A groundbreaking new cyberattack dubbed ShadowLeak has been uncovered targeting ChatGPT’s Deep Research capability, marking a dangerous escalation in AI-related threats. Unlike prior exploits such as AgentFlayer and EchoLeak, which operated on the client side, ShadowLeak weaponized OpenAI’s own cloud infrastructure to silently exfiltrate sensitive data—without requiring any user interaction.
Discovered by researchers at Radware, the attack began with a specially crafted email containing hidden malicious instructions. When the AI agent processed the email as part of a legitimate research task, it was manipulated into sending stolen information directly from OpenAI’s servers to an attacker-controlled URL. Because the exfiltration request originated from a trusted server rather than the client, the malicious activity left no visible trace in the ChatGPT interface and could bypass traditional enterprise security monitoring.
The potential blast radius extended beyond Gmail, including services like Google Drive, Dropbox, Outlook, HubSpot, Notion, Microsoft Teams, and GitHub. Though OpenAI patched the vulnerability between June and August 2025, Radware cautions that the broader threat surface remains large and that more undiscovered vectors likely exist. The firm recommends continuous agent behavior monitoring as a more effective defense, focusing on aligning agent actions with user intent rather than relying solely on reactive patching.
This episode explores how ShadowLeak worked, why server-side AI vulnerabilities are uniquely dangerous, and what enterprises must do to prepare for the next wave of AI-targeted cyberattacks.
#ShadowLeak #ChatGPT #DeepResearch #OpenAI #Radware #AIsecurity #DataExfiltration #PromptInjection #AgentFlayer #EchoLeak #CyberSecurity #ServerSideAttack #AIThreats
373 에피소드
모든 에피소드
×플레이어 FM에 오신것을 환영합니다!
플레이어 FM은 웹에서 고품질 팟캐스트를 검색하여 지금 바로 즐길 수 있도록 합니다. 최고의 팟캐스트 앱이며 Android, iPhone 및 웹에서도 작동합니다. 장치 간 구독 동기화를 위해 가입하세요.