Transcript
A (0:02)
You're listening to the Cyberwire network. Powered by N2K.
B (0:14)
The DMV has established itself as a top tier player in the global cyber industry. DMV Rising is the premier event for cyber leaders and innovators to engage in meaningful discussions and celebrate the innovation happening in and around the Washington D.C. area. Join us on Thursday, September 18th to connect with the leading minds shaping our field and experience firsthand why the Washington D.C. region is the beating heart of cyber innovation. Visit DMVRising.com to secure your spot at Thales. They know cybersecurity can be tough and you can't protect everything, but with Thales, you can secure what matters most. With Thales industry leading platforms, you can protect critical applications, data and identities anywhere and at scale with the highest roi. That's why the most trusted brands and largest banks, retailers and healthcare companies in the world rely on Thales to protect what matters most applications, data and identity. That's Talas T H A L E S learn more@talasgroup.com cyber hello everyone and welcome to the Cyberwires Research Saturday. I'm Dave Buettner and this is our weekly conversation with researchers and analysts and tracking down the threats and vulnerabilities, solving some of the hard problems and protecting ourselves in our rapidly evolving cyberspace. Thanks for joining us.
A (2:10)
So we tried to approach it in a way where we have kind of multimodal attacks. It's not just a simple prompt injection now that we have the, I guess, influence of agentic AI, right? So we have agents that can do web searches, can look at the Google Drive, look at your email. This kind of brings in that traditional cybersecurity factor there. What are the security boundaries? Right.
B (2:40)
That's Amanda Russo, principal AI security researcher from Stryker. The research we're discussing today is titled the Silent Exfiltration zero click agentic AI hack that can leak your Google Drive with one email.
A (3:01)
So we wanted to look into how can we cross those security boundaries through just prompts, either indirect prompts or direct prompts.
B (3:11)
So the term silent exfiltration, what are we talking about with that?
A (3:16)
So with silent exfiltration, say you have an agent connected to your email or your Google Drive and you say, hey, can you summarize all of my email? Can you summarize the documents that are in my Google Drive, or can you help me search for one? And as it's going through doing those summaries, it's going to be looking at the text content and in that text content there's going to be indicators for part parsing or even prompt indicators that it will automatically pick up. And this is not something that the agent intended to do. This is kind of part of that excessive agency that we mentioned in the blog. So it'll automatically look at the content there and try to run Python's code, try to use the prompt. So a lot of these things is trying to figure out input, sanitization or putting guardrails around what kind of content is actually consuming.
![Data leak without a click. [Research Saturday] - CyberWire Daily cover](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2F00fa13ea-8ff3-11f0-87c6-b715183ba2f5%2Fimage%2F95b72a93c2ffaf8ff900d662a9bd3735.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=1920&q=75)