Google Gemini flaw hijacks email summaries for phishing
Google Gemini工具被用于生成看似合法的邮件摘要,但其中可能包含恶意指令或警告,引导用户访问钓鱼网站。攻击者通过隐藏在邮件中的间接提示注入指令,即使没有附件或链接也能生效。尽管已有安全措施阻止误导性响应,此类攻击仍成功。 2025-7-13 14:45:26 Author: www.bleepingcomputer.com(查看原文) 阅读量:17 收藏

Gmail

Google Gemini for Workspace can be exploited to generate email summaries that appear legitimate but include malicious instructions or warnings that direct users to phishing sites without using attachments or direct links.

Such an attack leverages indirect prompt injections that are hidden inside an email and obeyed by Gemini when generating the message summary. 

Despite similar prompt attacks being reported since 2024 and safeguards being implemented to block misleading responses, the technique remains successful.

Attack through Gemini

A prompt-injection attack on Google's Gemini model was disclosed through 0din, Mozilla's bug bounty program for generative AI tools, by researcher Marco Figueroa, GenAI Bug Bounty Programs Manager at Mozilla.

The process involves creating an email with an invisible directive for Gemini. An attacker can hide the malicious instruction in the body text at the end of the message using HTML and CSS that sets the font size to zero and its color to white.

Crafting the malicious email
Crafting the malicious email
Source: 0DIN

The malicious instruction will not be rendered in Gmail, and because there are no attachments or links present, the message is highly likely to reach the potential target's inbox.

If the recipient opens the email and asks Gemini to generate a summary of the email, Google's AI tool will parse the invisible directive and obey it.

An example provided by Figueroa shows Gemini following the hidden instruction and includes a security warning about the user's Gmail password being compromised, along with a support phone number.

Gemini summary result served to the user
Gemini summary result served to the user
Source: 0DIN

As many users are likely to trust Gemini's output as part of Google Workspace functionality, chances are high for this alert to be considered a legitimate warning instead of a malicious injection.

Figueroa offers a few detections and mitigation methods that security teams can apply to prevent such attacks. One way is to remove, neutralize, or ignore content that is styled to be hidden in the body text.

Another approach is to implement a post-processing filter that scans Gemini output for urgent messages, URLs, or phone numbers, flagging the message for further review.

Users should also be aware that Gemini summaries should not be considered authoritative when it comes to security alerts.

BleepingComputer has contacted Google to ask about defenses that prevent or mitigate such attacks, and a spokesperson directed us to a Google blog post on security measures against prompt injection attacks.

"We are constantly hardening our already robust defenses through red-teaming exercises that train our models to defend against these types of adversarial attacks," a Google spokesperson told BleepingComputer.

The company representative clarified to BleepingComputer that some of the mitigations are in the process of being implemented or are about to be deployed.

Google has seen no evidence of incidents manipulating Gemini in the way demonstrated in Figueroa's report, the spokesperson said.

Tines Needle

8 Common Threats in 2025

While cloud attacks may be growing more sophisticated, attackers still succeed with surprisingly simple techniques.

Drawing from Wiz's detections across thousands of organizations, this report reveals 8 key techniques used by cloud-fluent threat actors.


文章来源: https://www.bleepingcomputer.com/news/security/google-gemini-flaw-hijacks-email-summaries-for-phishing/
如有侵权请联系:admin#unsafe.sh