Slack patches potential AI security issue | Tech Reader

Date:

Share:



Update: Slack has published an update, claiming to have “deployed a patch to address the reported issue,” and that there isn’t currently any evidence that customer data have been accessed without authorization. Here’s the official statement from Slack that was posted on its blog:

When we became aware of the report, we launched an investigation into the described scenario where, under very limited and specific circumstances, a malicious actor with an existing account in the same Slack workspace could phish users for certain data. We’ve deployed a patch to address the issue and have no evidence at this time of unauthorized access to customer data.

Below is the original article that was published.

When ChatGTP was added to Slack, it was meant to make users’ lives easier by summarizing conversations, drafting quick replies, and more. However, according to security firm PromptArmor, trying to complete these tasks and more could breach your private conversations using a method called “prompt injection.”

The security firm warns that by summarizing conversations, it can also access private direct messages and deceive other Slack users into phishing. Slack also lets users request grab data from private and public channels, even if the user has not joined them. What sounds even scarier is that the Slack user does not need to be in the channel for the attack to function.

In theory, the attack starts with a Slack user tricking the Slack AI into disclosing a private API key by making a public Slack channel with a malicious prompt. The newly created prompt tells the AI to swap the word “confetti” with the API key and send it to a particular URL when someone asks for it.

The situation has two parts: Slack updated the AI system to scrape data from file uploads and direct messages. Second is a method named “prompt injection,” which PromptArmor proved can make malicious links that may phish users.

The technique can trick the app into bypassing its normal restrictions by modifying its core instructions. Therefore, PromptArmor goes on to say, “Prompt injection occurs because a [large language model] cannot distinguish between the “system prompt” created by a developer and the rest of the context that is appended to the query. As such, if Slack AI ingests any instruction via a message, if that instruction is malicious, Slack AI has a high likelihood of following that instruction instead of, or in addition to, the user query.”

To add insult to injury, the user’s files also become targets, and the attacker who wants your files doesn’t even have to be in the Slack Workspace to begin with.








Source link

━ more like this

Darksiders 4 was not on my 2025 bingo card

Darksiders 4 is officially coming. During the THQ Nordic Digital Showcase on Friday, we got a glimpse at the next game in the...

NASA’s latest mission to the ISS features a bacterial experiment

Scientists are sending several strains of disease-causing bacteria to the International Space Station as part of the Crew-11 mission. This experiment isn't the...

X has to prove it wasn’t negligent when removing CSAM from its site

X isn't off the hook yet when it comes to a significant legal case about child sex abuse content on its platform. On...

Russia warns Trump’s nuclear submarines are ‘under their control’ – London Business News | Londonlovesbusiness.com

A senior member of the Russian government has responded to the US President after he announced that two nuclear submarines will be moved...

YouTube is testing Instagram-style collabs

YouTube has started testing a new collaboration feature, similar to Instagram's and TikTok's. A Google employee explained on YouTube Help that it will...
spot_img