LogoAgentHunter
  • Submit
  • Industries
  • Categories
  • Agency
Logo
LogoAgentHunter

Discover, Compare, and Leverage the Best AI Agents

Featured On

Featured on yo.directory
yo.directory
Featured on yo.directory
Featured on Startup Fame
Startup Fame
Featured on Startup Fame
AIStage
Listed on AIStage
Sprunkid
Featured on Sprunkid
Featured on Twelve Tools
Twelve Tools
Featured on Twelve Tools
Listed on Turbo0
Turbo0
Listed on Turbo0
Featured on Product Hunt
Product Hunt
Featured on Product Hunt
Game Sprunki
Featured on Game Sprunki
AI Toolz Dir
Featured on AI Toolz Dir
Featured on Microlaunch
Microlaunch
Featured on Microlaunch
Featured on Fazier
Fazier
Featured on Fazier
Copyright © 2025 All Rights Reserved.
Product
  • AI Agents Directory
  • AI Agent Glossary
  • Industries
  • Categories
Resources
  • AI Agentic Workflows
  • Blog
  • News
  • Submit
  • Coummunity
  • Ebooks
Company
  • About Us
  • Privacy Policy
  • Terms of Service
  • Sitemap
Back to News List

Echoleak Attack Exposes AI Assistant Vulnerabilities Without Malware

2025-06-14•Berry Zwets•Original Link•2 minutes
Cybersecurity
AI
Microsoft

Echoleak is a new attack vector targeting AI assistants like Microsoft 365 Copilot through prompt manipulation, bypassing traditional security measures without malware or phishing.

Researchers at Check Point have uncovered a new zero-click attack vector called Echoleak, which exploits AI assistants like Microsoft 365 Copilot through subtle prompt manipulation—no malware or phishing required. The attack marks a significant shift in cybersecurity threats, as it relies solely on language as a weapon.

How the Attack Works

  • The attack injects malicious prompts into seemingly innocent documents or emails.
  • Copilot interprets these prompts as commands, not data, leading to unauthorized disclosure of sensitive information (e.g., internal files, emails, or credentials).
  • No user interaction is needed; the attack executes automatically.

Obedience as a Weakness

Large Language Model (LLM)-based AI assistants are designed to follow instructions, even when ambiguous. Their deep integration with operating systems and productivity tools creates a dangerous combination: a highly obedient tool with access to critical data.

"The attack vector has shifted from code to conversation," says Check Point. "We’ve built systems that actively convert language into actions. That changes everything."

Limitations of Current Safeguards

Many companies rely on LLM "watchdogs" to filter harmful instructions, but these models are vulnerable to the same deception. Attackers can:

  • Spread malicious intent across multiple prompts.
  • Hide instructions in other languages.
  • Exploit contextual gaps in safeguards (as seen with Echoleak).

Tip: Microsoft turns GitHub Copilot into a full-fledged AI agent

This discovery underscores the urgent need for robust defenses against AI-driven social engineering attacks.

Related News

2025-06-16•Daniel Konstantinovic

Microsoft DSP closure reshapes programmatic ad buying landscape

Microsoft's decision to close its DSP Invest marks a shift in programmatic ad buying, reducing Big Tech's role in third-party ad inventory management and opening opportunities for smaller players.

Programmatic
AdTech
Microsoft
2025-06-16•Stephen Withers

Qualtrics AI Copilot Helps Companies Act Faster on Customer Feedback

Qualtrics' new AI tool, Assist for CX, enables organizations to quickly analyze and act on customer feedback, with an Australian airline already cutting insight times from months to hours.

AI
CustomerExperience
Qualtrics

Agent Newsletter

Get Agentic Newsletter Today

Subscribe to our newsletter for the latest news and updates