Microsoft 365 Copilot Vulnerable to Zero-Click EchoLeak Exploit, Cybersecurity Researchers Say

Microsoft eportedly said that it has fixed the Copilot vulnerability and no users were affected by it.

Advertisement
Written by Akash Dutta, Edited by Siddharth Suvarna | Updated: 12 June 2025 19:33 IST
Highlights
  • The exploit uses agentic capabilities of Copilot
  • This is said to be the first zero-click exploit on a major AI chatbot
  • First stage of this exploit uses a plain language email

The exploit could have been used by bad actors to steal sensitive data from users’ devices

Photo Credit: Reuters

Microsoft 365 Copilot, the enterprise-focused artificial intelligence (AI) chatbot that works across Office apps, was reportedly vulnerable to a zero-click vulnerability. As per a cybersecurity firm, a flaw existed in the chatbot that could be triggered via a simple text email to hack into it. Once the chatbot was hacked, it could then be made to retrieve sensitive information from the user's device and share it with the attacker. Notably, the Redmond-based tech giant said that it has fixed the vulnerability, and that no users were affected by it.

Researchers Find Zero-Click Vulnerability in Copilot

In a blog post, AI security startup Aim Security detailed the zero-click exploit and how the researchers were able to execute it. Notably, a zero-click attack refers to hacking attempts where the victim does not have to download a file or click on a URL for the attack to be triggered. A simple act such as opening an email can initiate the hacking attempt.

The findings by the cybersecurity firm highlights the risks that AI chatbots pose, especially if they have agentic capability, which refers to the ability of an AI chatbot to access tools to execute actions. For example, Copilot being able to connect to OneDrive and retrieving data from a file stored there to answer a user query would be considered an agentic action.

Advertisement

As per the researchers, the attack was initiated using cross-prompt injection attack (XPIA) classifiers. These is a form of prompt injection, where an attacker manipulates the input across multiple prompts, sessions, or messages to influence or control the behaviour of an AI system. The malicious message is often added via attached files, hidden or invisible text, or embedded instructions.

The researchers shared the XPIA bypass via email. However, they also showed the same could be done via an image (embedding the malicious instruction in the alt text), and even via Microsoft Team by excuting a GET request for a malicious URL. While the first two methods still require the user to ask a query about the email or the image, the latter does not require users to take any particular action for the hacking attempt to begin.

“The attack results in allowing the attacker to exfiltrate the most sensitive data from the current LLM context - and the LLM is being used against itself in making sure that the MOST sensitive data from the LLM context is being leaked, does not rely on specific user behavior, and can be executed both in single-turn conversations and multi-turn conversations,” the post added.

Advertisement

Notably, a Microsoft spokesperson acknowledged the vulnerability and thanked Aim for identifying and reporting the issue, according to a Fortune report. The issue has now been fixed, and no users were affected by it, the spokesperson told the publication.

 

For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.

Advertisement

Related Stories

Popular Mobile Brands
  1. Nothing Brings Call Recording to Its Smartphones, But There's a Catch
  2. Vivo X300 Series Confirmed to Debut With OriginOS 6, Thickness Revealed
  3. Lava Shark 2 Confirmed to Come With AI-Backed 50-Megapixel Triple Cameras
  4. HMD Touch 4G Launched in India With 3.2-Inch Display: Price, Features
  5. Apple Releases iOS 26.1 Beta 2 for iPhone With These New Features
  6. Vivo V60e With 200-Megapixel Rear Camera Launched in India at This Price
  7. Google DeepMind's CodeMender Can Now Fix Security Bugs Automatically
  8. Jolly LLB 3 (2025) OTT Release Date Reportedly Revealed Online
  1. RBI to Introduce Pilot for Deposit Tokenisation Using CBDC Layer: Report
  2. Call of Duty: Black Ops 7 Open Beta Extended by a Day Till October 9
  3. MeitY's IndiaAI Mission Taps Five Projects to Drive Safe, Trusted AI in the Country
  4. FIFA World Cup Ticket NFTs Face Swiss Gambling Supervisory Authority’s Scrutiny
  5. Navi UPI Unveils Biometric-Based Payments for iOS, Android at Global Fintech Festival 2025
  6. WhatsApp's Message Translation Feature Is Rolling on iOS With Support for 21 Languages
  7. OpenAI DevDay 2025: From ChatGPT Apps to AgentKit for Developers, Here's Everything You Need to Know
  8. Google Messages Can Now Alert You Before You Open Potentially Explicit Videos
  9. Elon Musk Says xAI Game Studio Will Release an AI-Generated Game in 2026
  10. Vivo X300 Series to Be 7.95mm Thick, Will Run Android 16-Based OriginOS 6 Out of the Box
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.