Microsoft 365 Copilot Vulnerable to Zero-Click EchoLeak Exploit, Cybersecurity Researchers Say

Microsoft eportedly said that it has fixed the Copilot vulnerability and no users were affected by it.

Advertisement
Written by Akash Dutta, Edited by Siddharth Suvarna | Updated: 12 June 2025 19:33 IST
Highlights
  • The exploit uses agentic capabilities of Copilot
  • This is said to be the first zero-click exploit on a major AI chatbot
  • First stage of this exploit uses a plain language email

The exploit could have been used by bad actors to steal sensitive data from users’ devices

Photo Credit: Reuters

Microsoft 365 Copilot, the enterprise-focused artificial intelligence (AI) chatbot that works across Office apps, was reportedly vulnerable to a zero-click vulnerability. As per a cybersecurity firm, a flaw existed in the chatbot that could be triggered via a simple text email to hack into it. Once the chatbot was hacked, it could then be made to retrieve sensitive information from the user's device and share it with the attacker. Notably, the Redmond-based tech giant said that it has fixed the vulnerability, and that no users were affected by it.

Researchers Find Zero-Click Vulnerability in Copilot

In a blog post, AI security startup Aim Security detailed the zero-click exploit and how the researchers were able to execute it. Notably, a zero-click attack refers to hacking attempts where the victim does not have to download a file or click on a URL for the attack to be triggered. A simple act such as opening an email can initiate the hacking attempt.

Advertisement

The findings by the cybersecurity firm highlights the risks that AI chatbots pose, especially if they have agentic capability, which refers to the ability of an AI chatbot to access tools to execute actions. For example, Copilot being able to connect to OneDrive and retrieving data from a file stored there to answer a user query would be considered an agentic action.

As per the researchers, the attack was initiated using cross-prompt injection attack (XPIA) classifiers. These is a form of prompt injection, where an attacker manipulates the input across multiple prompts, sessions, or messages to influence or control the behaviour of an AI system. The malicious message is often added via attached files, hidden or invisible text, or embedded instructions.

Advertisement

The researchers shared the XPIA bypass via email. However, they also showed the same could be done via an image (embedding the malicious instruction in the alt text), and even via Microsoft Team by excuting a GET request for a malicious URL. While the first two methods still require the user to ask a query about the email or the image, the latter does not require users to take any particular action for the hacking attempt to begin.

“The attack results in allowing the attacker to exfiltrate the most sensitive data from the current LLM context - and the LLM is being used against itself in making sure that the MOST sensitive data from the LLM context is being leaked, does not rely on specific user behavior, and can be executed both in single-turn conversations and multi-turn conversations,” the post added.

Advertisement

Notably, a Microsoft spokesperson acknowledged the vulnerability and thanked Aim for identifying and reporting the issue, according to a Fortune report. The issue has now been fixed, and no users were affected by it, the spokesperson told the publication.

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement

Related Stories

Popular Mobile Brands
  1. Vivo T5 Pro 5G With 9,020mAh Battery Arrives in India at This Price
  2. Motorola Edge 70 Pro Will Debut in India in Three Colourways on This Date
  3. Realme Buds T500 Pro Debut in India With Up to 56 Hours Total Battery Life
  4. Lumio Introduces Vision 9 (2026) and Vision 7 (2026) TVs in India
  5. Motorola Hikes Prices of These Tablets in India
  6. These Samsung Galaxy S25 Models Just Received a Price Cut in India
  7. God of War Spinoff Will Reportedly Feature Tyr, Explore Several Mythologies
  8. Motorola Razr 70 Ultra Specifications Surface via Certification Site
  9. Oppo Find X9 Ultra Will Go on Sale in These Storage Variants
  10. Apple's OLED Push Could Extend to This iPad Model in 2027
  1. Toaster Now Streaming Online: Where to Watch Rajkummar Rao and Sanya Malhotra’s Comedy Drama?
  2. Lumio Vision 9 (2026) Launched in India With 144Hz 4K Screen, Lumio Vision 7 (2026) Tags Along: Price, Features
  3. Realme Buds T500 Pro Launched in India With Up to 50dB ANC, Up to 56 Hours Total Battery Life: Price, Features
  4. Honor's Upcoming Smartphone Said to Feature a Larger 11,000mAh Battery
  5. Google Introduces Gemini App to macOS, to Rival ChatGPT and Claude
  6. Xiaomi 18 Pro Leak Hints at Dedicated AI Button, Subtle Design Changes
  7. Apple's OLED iPad Air to Launch in 2027, Samsung Display to Begin Production Soon: Report
  8. Poco C81 Pro Unexpectedly Turns Up on Xiaomi's Global Website Along With Key Specifications, Features
  9. Moto Pad 60 Pro and Moto Pad 60 Neo Receive Price Hike in India, Tipster Claims
  10. Nothing Introduces Warp App Enabling File-Sharing Between Android Phones and Mac
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.