Researcher Reveals Microsoft Can Act As An Automated Phishing Machine

The details of this news may unlock new fears around AI usage.

MobileAppDaily

Aug 09, 2024

Michael Bargury, CTO Of Zenity Cybersecurity, Was The Man Behind These Findings.

Bargury found 5 Proof-Of-Concept ways of manipulating Copilot to execute malicious attacks.

LOLCopilot - A Spear-Phishing Machine

With access to a work email, hackers can easily mimic their writing style, track data of regular interactions, and blast a personalized email with malicious links or malware on their behalf.

Malicious Manipulation

Attackers can manipulate Copilot by using it to provide false references to files, exfiltrate some private data, and dodge Microsoft’s security protections.

These attack tests by Bargury Were Not Even As Sophisticated As Top Hackers Are

You talk to Copilot, and it’s a limited conversation because Microsoft has put a lot of controls. But once you use a few magic words, it opens up, and you can do whatever you want,” he concluded.

To read more about the newfound risks of using Copilot, Swipe Up!

 

Read More