Close Menu
GeekBlog

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    I was planning to get the Galaxy S26 Ultra, but these downgrades made me rethink

    March 5, 2026

    The New United Airlines Policy That Could Get You Kicked Off a Flight

    March 4, 2026

    I tried Tecno’s modular phone concept at MWC – and it quickly got weird

    March 4, 2026
    Facebook X (Twitter) Instagram Threads
    GeekBlog
    • Home
    • Mobile
    • Tech News
    • Blog
    • How-To Guides
    • AI & Software
    Facebook
    GeekBlog
    Home»Tech News»How a simple link allowed hackers to bypass Copilot’s security guardrails – and what Microsoft did about it
    Tech News

    How a simple link allowed hackers to bypass Copilot’s security guardrails – and what Microsoft did about it

    Michael ComaousBy Michael ComaousJanuary 19, 20264 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
    How a simple link allowed hackers to bypass Copilot's security guardrails - and what Microsoft did about it
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link

    Ernesto r. Ageitos/Moment/Getty Images

    Follow ZDNET: Add us as a preferred source on Google.


    ZDNET’s key takeaways

    • Dubbed “Reprompt,” the attack used a URL parameter to steal user data.
    • A single click was enough to trigger the entire attack chain.
    • Attackers could pull sensitive Copilot data, even after the window closed.

    Researchers have revealed a new attack that required only one click to execute, bypassing Microsoft Copilot security controls and enabling the theft of user data.

    Also: How to remove Copilot AI from Windows 11 today

    Meet Reprompt

    On Wednesday, Varonis Threat Labs published new research documenting Reprompt, a new attack method that affected Microsoft’s Copilot AI assistant.

    Reprompt impacted Microsoft Copilot Personal and, according to the team, gave “threat actors an invisible entry point to perform a data‑exfiltration chain that bypasses enterprise security controls entirely and accesses sensitive data without detection — all from one click.”

    Also: AI PCs aren’t selling, and Microsoft’s PC partners are scrambling

    No user interaction with Copilot or plugins was required for this attack to trigger. Instead, victims had to click a link. 

    After this single click, Reprompt could circumvent security controls by abusing the ‘q’ URL parameter to feed a prompt and malicious actions through to Copilot, potentially allowing an attacker to ask for data previously submitted by the user — including personally identifiable information (PII).

    “The attacker maintains control even when the Copilot chat is closed, allowing the victim’s session to be silently exfiltrated with no interaction beyond that first click,” the researchers said.

    How did Reprompt work?

    Reprompt chained three techniques together:

    • Parameter 2 Prompt (P2P injection): By exploiting the ‘q’ URL parameter, an attacker could fill a prompt from a URL and inject crafted, malicious instructions that forced Copilot to perform actions, including data exfiltration.
    • Double-request: While Copilot had safeguards that prevented direct data exfiltration or leaks, the team found that repeating a request for an action twice would force it to be performed.
    • Chain-request: Once the initial prompt (repeated twice) was executed, the Reprompt attack chain server issued follow-up instructions and requests, such as demands for additional information.

    According to Varonis, this method was difficult to detect because user- and client-side monitoring tools could not see it, and it bypassed built-in security mechanisms while disguising the data being exfiltrated.

    “Copilot leaks the data little by little, allowing the threat to use each answer to generate the next malicious instruction,” the team added.

    A proof-of-concept (PoC) video demonstration is available.

    Microsoft’s response

    Reprompt was quietly disclosed to Microsoft on Aug 31, 2025. Microsoft patched the vulnerability prior to public disclosure and confirmed that enterprise users of Microsoft 365 Copilot were not affected.

    Also: Want Microsoft 365? Just don’t choose Premium – here’s why

    “We appreciate Varonis Threat Labs for responsibly reporting this issue,” a Microsoft spokesperson told ZDNET. “We rolled out protections that addressed the scenario described and are implementing additional measures to strengthen safeguards against similar techniques as part of our defense-in-depth approach.”

    How to stay safe

    AI assistants — and browsers — are relatively new technologies, so hardly a week went by without a security issue, design flaw, or vulnerability being discovered.

    Phishing is one of the most common vectors for cyberattacks, and this particular attack required a user to click a malicious link. So, your first line of defense was to be cautious when it comes to links, especially if you did not trust the source.

    Also: Gemini vs. Copilot: I compared the AI tools on 7 everyday tasks, and there’s a clear winner

    As with any digital service, you should be careful about sharing sensitive or personal information. For AI assistants like Copilot, you should also check for any unusual behavior, such as suspicious data requests or strange prompts that may appear.

    Varonis recommended that AI vendors and users remember that trust in new technologies could be exploited and said that “Reprompt represents a broader class of critical AI assistant vulnerabilities driven by external input.”

    As such, the team suggested that URL and external inputs should be treated as untrusted, and so validation and safety controls should be implemented throughout the full process chain. In addition, safeguards should be imposed that reduce the risk of prompt chaining and repeated actions, and this should not stop at just the initial prompt.



    Source: www.zdnet.com

    allowed bypass Copilots guardrails Hackers link Microsoft Security simple
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email Copy Link
    Previous Article5 Best Water Leak Detectors (2026), Tested and Reviewed
    Next Article Threads Is Now Clearly More Popular Than X (in Mobile App Form), Report Says
    Michael Comaous
    • Website

    Michael Comaous is a dedicated professional with a passion for technology, innovation, and creative problem-solving. Over the years, he has built experience across multiple industries, combining strategic thinking with hands-on expertise to deliver meaningful results. Michael is known for his curiosity, attention to detail, and ability to explain complex topics in a clear and approachable way. Whether he’s working on new projects, writing, or collaborating with others, he brings energy and a forward-thinking mindset to everything he does.

    Related Posts

    6 Mins Read

    I was planning to get the Galaxy S26 Ultra, but these downgrades made me rethink

    2 Mins Read

    The New United Airlines Policy That Could Get You Kicked Off a Flight

    4 Mins Read

    I tried Tecno’s modular phone concept at MWC – and it quickly got weird

    3 Mins Read

    USB Hubs Can Save You Lots of Hassles—Here Are 5 We Like Best in 2026

    2 Mins Read

    Google and Epic look to bury the hatchet with new app store settlement

    1 Min Read

    His house burned down. He used the insurance money to build PopSockets.

    Top Posts

    Discord will require a face scan or ID for full access next month

    February 9, 2026761 Views

    The Mesh Router Placement Strategy That Finally Gave Me Full Home Coverage

    August 4, 2025564 Views

    Past Wordle answers – all solutions so far, alphabetical and by date

    August 1, 2025230 Views
    Stay In Touch
    • Facebook

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Discord will require a face scan or ID for full access next month

    February 9, 2026761 Views

    The Mesh Router Placement Strategy That Finally Gave Me Full Home Coverage

    August 4, 2025564 Views

    Past Wordle answers – all solutions so far, alphabetical and by date

    August 1, 2025230 Views
    Our Picks

    I was planning to get the Galaxy S26 Ultra, but these downgrades made me rethink

    March 5, 2026

    The New United Airlines Policy That Could Get You Kicked Off a Flight

    March 4, 2026

    I tried Tecno’s modular phone concept at MWC – and it quickly got weird

    March 4, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook
    • About Us
    • Contact us
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    © 2026 GeekBlog

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.