Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026

Badges, Bytes and Blackmail

February 7, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Zero-Click Flaw in ChatGPT’s Agent Enables Silent Gmail Data Theft
Cyber Security

Zero-Click Flaw in ChatGPT’s Agent Enables Silent Gmail Data Theft

Team-CWDBy Team-CWDSeptember 19, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A vulnerability in ChatGPT Deep Research agent allows an attacker to request the agent to leak sensitive Gmail inbox data with a single crafted email, according to Radware.

Deep Research is an autonomous research mode launched by OpenAI in February 2025.

“You give it a prompt and ChatGPT will find, analyze and synthesize hundreds of online sources to create a comprehensive report at the level of a research analyst,” is the promise made by the company with this mode.

On September 18, three researchers at Radware shared findings of a new zero-click vulnerability in OpenAI’s Deep Research when the function is connected to Gmail and the user requests sources from the web.

The vulnerability, dubbed ‘ShadowLeak’ by the researchers, allows service-side exfiltration, meaning that a successful attack chain leaks data directly from OpenAI’s cloud infrastructure, making it invisible to local or enterprise defenses.

The attack uses indirect prompt injection techniques by embedding hidden commands in email HTML using techniques like white-on-white text or microscopic fonts, so users remain unaware while the Deep Research agent executes them.

Unlike previous client-side exfiltration attacks (such as AgentFlayer and EchoLeak), which relied on the agent rendering attacker-controlled content in the user’s interface, this service-side leak occurs entirely within OpenAI’s cloud.

The agent’s autonomous browsing tool executes the exfiltration without any client involvement, expanding the threat surface by exploiting backend execution rather than frontend rendering.

ShadowLeak’s Attack Chain

Here’s the breakdown of a successful ShadowLeak attack chain, where the attacker is trying to collect personally identifiable information (PII) from their victim:

  1. The attacker sends the victim an innocent-looking email with hidden instructions requesting an agent to find the victim’s full name and address in the inbox and open a “public employee lookup URL” with those values as a parameter – with the URL really pointing to an attacker-controlled server
  2. The victim asks the Deep Research agent to process information and perform tasks from accessing their emails – not knowing that one of their emails contains hidden instructions the agent will detect and possibly follow
  3. The Deep Research agent processes the attacker’s email, initiates access to the attacker domain and injects the PII into the URL as directed – all this without user confirmation and without rendering anything in the user interface

The Radware researchers noted that it took a long trial-and-error phase with may iterations to craft a malicious email that triggered the Deep Research agent to inject PII into the malicious URL.

For instance, they had to disguise the request as legitimate user requests, force Deep Research to use specific tools, such as browser.open(), which allowed it to make direct HTTP requests, instruct the agent to “retry several times” and instruct the agent to encode the extracted PII into Base64 before appending it to the URL.

Once all these tricks were used, the researchers achieved a 100% success rate in exfiltrating Gmail data using the ShadowLeak method.

Mitigating Service-Side AI Agent Threats

According to Radware, organizations can partially mitigate risks by sanitizing emails before agent processing, removing hidden CSS, obfuscated text and malicious HTML. However, they noted that this measure offers limited protection against attacks that manipulate the agent itself.

A stronger defense is real-time behavior monitoring, where the agent’s actions and inferred intent are continuously checked against the user’s original request. Any deviation, such as unauthorized data exfiltration, can then be detected and blocked before execution.

The Radware researchers reported their findings to OpenAI via the Bugcrowd platform in June 2025.

In August, Radware noted that OpenAI silently fixed the vulnerability. In early September, OpenAI acknowledged the vulnerability and marked it as resolved.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleRussian State Hackers Collaborate in Attacks Against Ukraine
Next Article Apple iPhone Air and iPhone 17 Feature A19 Chips With Spyware-Resistant Memory Safety
Team-CWD
  • Website

Related Posts

Cyber Security

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026
Cyber Security

New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability

February 5, 2026
Cyber Security

Two Critical Flaws Found in n8n AI Workflow Automation Platform

February 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Why the tech industry needs to stand firm on preserving end-to-end encryption

September 12, 2025

What parents should know to protect their children from doxxing

November 28, 2025

2025’s most common passwords were as predictable as ever

January 21, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.