A patched vulnerability in Microsoft 365 Copilot could expose sensitive data by running a novel AI-enabled technique known as "ASCII Smuggling" that uses special Unicode characters that mirror ASCII text, but are actually not visible to the user interface.Researcher Johann Rehberger, who spent many years at Microsoft, explained in an Aug. 26 blog post that ASCII Smuggling would let an attacker make the large language model (LLM) render the data invisible to the user interface and embed it with clickable hyperlinks with malicious code — setting the stage for data exfiltration.Jason Soroko, senior fellow at Sectigo, said that the ASCII Smuggling flaw in Microsoft 365 Copilot lets attackers hide the malicious code within seemingly harmless text using special Unicode characters. These characters resemble ASCII, said Soroko, but are invisible in the user interface, allowing the attacker to embed hidden data within clickable hyperlinks.“When a user interacts with these links, the hidden data can be exfiltrated to a third-party server, potentially compromising sensitive information, such as MFA one-time-password codes,” said Soroko. Soroko said the attack works by stringing together multiple methods: First, a prompt injection gets triggered by sharing a malicious document in a chat. Then, Copilot is manipulated to search for more sensitive data, and finally, ASCII Smuggling is used to trick the user into clicking on an exfiltration link.“To mitigate this risk, users should ensure their Microsoft 365 software is updated, as Microsoft has patched the vulnerability,” said Soroko. “Additionally, they should exercise caution when interacting with links in documents and emails, especially those received from unknown or untrusted sources. Regular monitoring of AI tools like Copilot for unusual behavior is also essential to catch and respond to any suspicious activity quickly.”Researcher Rehberger added that while it’s unclear how exactly Microsoft fixed the vulnerability and what mitigation recommendations were implemented, the exploits Rehberger built and shared with Microsoft in January and February do not work anymore, so it appeared that links are not rendered anymore since a few months ago.“I asked MSRC if the team would be willing to share the details around the fix, so others in the industry could learn from their expertise, but did not get a response for that inquiry,” said Rehberger. "Just in case you are wondering, prompt injection, of course, is still possible.“
AI/ML, AI benefits/risks
‘ASCII Smuggling’ attack exposes sensitive Microsoft Copilot data

(Adobe Stock)
An In-Depth Guide to AI
Get essential knowledge and practical strategies to use AI to better your security program.
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds