Google Reports 32% Surge in Prompt Injection Attacks

Google Reports 32% Surge in Prompt Injection Attacks

Googleโ€™s latest research reveals a significant 32% increase in malicious prompt injection attempts over the past four months, moving this threat from theoretical discussions to real-world impact. โ€œCyber Updates - Asher Tamamโ€ highlights that the more insidious threat now is Indirect Prompt Injection, where attackers embed malicious commands within legitimate websites or emails. When an AI agent, such as Gemini or Copilot, accesses these compromised sources to summarize content, the hidden command activates, taking control of the AI session.

While some initial incidents involved pranks or SEO manipulation, Google has observed a rise in genuine exfiltration attempts, aiming to steal personal information from AI conversations. Even more concerning, โ€œCyber Updates - Asher Tamamโ€ notes instances where attackers successfully executed commands to delete files within systems. This signifies a dangerous evolution: as AI agents gain more browsing capabilities and operational permissions, the internet effectively becomes a minefield of invisible, weaponized text.

This isnโ€™t just a new attack vector; itโ€™s a fundamental backdoor built into seemingly innocuous data. The attackerโ€™s calculus is clear: leverage the AIโ€™s trust in its data sources to bypass traditional security controls and directly manipulate its actions or extract sensitive data.

What This Means For You

  • If your organization deploys AI agents for tasks like web summarization or email processing, you need to treat every data source as potentially hostile. Review the permissions granted to these agents. Any AI agent with write access or the ability to exfiltrate data from user sessions is a critical risk. Implement strict content filtering and input validation, even for 'trusted' external sources, as indirect prompt injection bypasses direct user interaction.

๐Ÿ›ก๏ธ Detection Rules

3 rules ยท 6 SIEM formats

3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free โ€” export to any SIEM format via the Intel Bot.

critical T1190 Initial Access

Indirect Prompt Injection via Malicious Website Content

Sigma YAML โ€” free preview

Source: Shimi's Cyber World ยท License & reuse

โœ“ Sigma ยท Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM โ†’
Take action on this incident
๐Ÿ“ก Monitor google.com Free ยท 1 watchlist slot ยท instant alerts on new breaches ๐Ÿ” Threat intel on Google All breaches, IOCs & vendor exposure

Related coverage on Google

OpenAI's GPT-5.4-Cyber: AI Offensive, Defensive Dual-Use Dilemma Intensifies

OpenAI has dropped GPT-5.4-Cyber, a specialized variant of its latest model, tailored for defensive cybersecurity missions. This move comes hot on the heels of Anthropic's...

israelai-security
/SCW Threat Desk /MEDIUM

LAPSUS$ Speaks: Inside the Minds of the Notorious Cyber Group

In an exclusive interview with 'ื—ื“ืฉื•ืช ืกื™ื™ื‘ืจ - ืืจื– ื“ืกื”', the notorious LAPSUS$ hacking collective offers a rare glimpse into their operations and motivations. Dispelling...

israelcloudmicrosoftai-security
/MEDIUM

ืกืœื™ื—ื” ืขืœ ื”ืฉืขื” ื•ื–ื” ืื‘ืœ ื ืจืื” ืฉื”ืกื™ืคื•ืจ ืขื TeamPCP ื”ื•ืœืš ื•ืžืกืชื‘ืš....

ืกืœื™ื—ื” ืขืœ ื”ืฉืขื” ื•ื–ื” ืื‘ืœ ื ืจืื” ืฉื”ืกื™ืคื•ืจ ืขื TeamPCP ื”ื•ืœืš ื•ืžืกืชื‘ืš.... ื›ื–ื›ื•ืจ ื”ืงื‘ื•ืฆื” ื”ืฆืœื™ื—ื” ืœืคืจื•ืฅ ืœ-Trivy ืฉืœ Aqua ืœืฆ'ืงืžืจืงืก, ืœ-LiteLLM ื•ืœ-Telnyx. ืื‘ืœ ื ืจืื” ืฉื–ืŸ ื”ื™ื™ืชื”...

israelcloud-securitydata-breachcloudai-security
/MEDIUM