Gemini in Gmail Vulnerable to Prompt Injection-Based Phishing Attacks, Researcher Finds

Bad actors are said to be able to use hidden text to send invisible prompts to Gemini in Gmail, which the chatbot obeys.

Advertisement
Written by Akash Dutta, Edited by Siddharth Suvarna | Updated: 15 July 2025 18:21 IST
Highlights
  • Such phishing emails do not use links or attachments to appear credible
  • Gemini is said to treat admin commands with a higher priority
  • Email summaries can be manipulated to trick victims

Google reportedly said that it has not witnessed Gemini being manipulated using this method

Photo Credit: Google

Gemini in Gmail is vulnerable to prompt injection-based phishing attacks, a researcher demonstrated. As per the researcher, the artificial intelligence (AI) chatbot that offers features such as email summary generation and email rewriting can be manipulated into displaying phishing messages to users. This vulnerability poses a significant risk, as attackers could potentially exploit it to conduct online scams. Meanwhile, the Mountain View-based tech giant has reportedly said that it has so far not seen this manipulation technique used against users.

Researcher Claims Gemini in Gmail Is Vulnerable to Prompt Injection

The vulnerability was spotted and demonstrated by researcher Marco Figueroa, GenAI Bug Bounty Programmes Manager at Mozilla, via Mozilla's bug bounty programme for AI tools, 0din. Interestingly, to trigger this vulnerability, the scammer does not have to pull off any high-profile cyber heist. Instead, it can be carried out with a simple text command using a technique known as prompt injection.

Prompt injection is a type of attack on AI chatbots where an attacker deliberately manipulates the input or prompt to make the model behave in unintended or malicious ways. In this particular scenario, the researcher used indirect prompt injection, where the malicious prompt is embedded inside a document, email, or a web page.

Advertisement

As per the researcher, he simply wrote a long email and added some hidden text at the end, which contained the prompt injection. The email did not contain any URLs or attachments, which made it easier to reach the receiver's primary inbox.

Advertisement

Adding a hidden malicious message in email
Photo Credit: 0din/Marco Figueroa

Advertisement

 

As shown in the image, the attacker used a white colour font on a white page to write the malicious message. This text is normally invisible to the receiver of the email. Other ways to add hidden text include using a zero font size, off-screen text placement, and other HTML or CSS tricks.

Advertisement

Now, if the receiver uses Gemini's “summarise email” feature, the chatbot will process the hidden text and carry out the command, without the user ever finding out, Figueroa said. He also highlighted that the probability of the chatbot following the command increases if the message is wrapped inside an admin tag, as it considers it a high-priority request.

Gemini verbatim repeats the malicious message in the summary
Photo Credit: 0din/Marco Figueroa

 

The cybersecurity researcher showed in another screenshot that Gemini indeed carried out the malicious message and displayed it as part of its email summary. Since the message is now coming from Gemini, instead of an email from a likely stranger, the victim could be more likely to believe it and follow the instructions, falling for the scam.

BleepingComputer reached out to Google to ask about the vulnerability, and a spokesperson said that the company has seen no evidence of similar manipulation so far. Additionally, it was also highlighted that Google is in the process of implementing some mitigations for prompt injection-based adversarial attacks.

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement

Related Stories

Popular Mobile Brands
  1. Poco X8 Pro, Poco X8 Pro Max to Launch on This Date
  2. SanDisk Extreme Fit USB Type-C Flash Drive Launched in India at This Price
  3. Samsung Galaxy M17e 5G India Launch Set for March 17: Features
  4. Vivo V70 FE Arrives With a 7,000mAh Battery: See Price, Specifications
  5. Vivo X300s Expected to Launch Soon as Company Executive Reveals Key Features
  6. OnePlus 15T Official Images Confirm 'Squircle' Camera, Two Colourways
  7. Poco C85x 5G Key Features Revealed a Day Ahead of Launch in India
  1. NASA’s Webb Telescope Confirms Asteroid 2024 YR4 Will Safely Pass the Moon in 2032
  2. ChatGPT Adult Mode Delayed Again as OpenAI's 'Code Red' Reportedly Ends
  3. Lava Bold 2 5G India Launch Date Announced; Confirmed to Feature Under-Display Fingerprint Scanner
  4. Realme Note 80 Launched With 6,300mAh Battery, 6.74-Inch Display: Price, Specifications
  5. Anthropic’s Claude Finds 22 Vulnerabilities in Mozilla Firefox in Just Two Weeks
  6. Samsung Galaxy Smartphones Get Inactivity Restart Security Feature With Latest Update: Report
  7. Poco C85x 5G Key Specifications, Features Revealed a Day Ahead of Launch in India
  8. Rooster Now Available for Streaming Online: What You Need to Know About its Plot, Cast, and More
  9. Bhartha Mahasayulaku Wignyapthi OTT Release Date Reportedly Revealed: When and Where to Watch Ravi Teja’s Romantic Drama Online?
  10. Ghost Elephants Out on OTT: Know Where to Watch This Biographical Film Online
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.