Copilot Exploit Shows How AI Agents Can Be Hijacked to Steal Corporate Data

June 12, 2025 A new vulnerability discovered in Microsoft Copilot has raised urgent concerns about the security of autonomous AI agents. In a recent proof-of-concept attack, a cybersecurity researcher demonstrated how the AI assistant could be manipulated to leak sensitive information — simply by visiting a malicious website.

The exploit, dubbed EchoLeak, was detailed by the researcher known as Alh4zr3d and reported by Fortune. It works by embedding invisible prompt instructions in a webpage. When Microsoft Copilot, acting as a browsing agent, visits that page, it reads the prompt and unknowingly follows its hidden instructions — which can include exposing internal corporate data.

“You can make Copilot take actions you control, then exfiltrate information from the organization it’s running in,” Alh4zr3d told Fortune.

The attack highlights a growing category of threats facing agent-style AI systems — models that can browse, analyze, and act autonomously in enterprise environments. Unlike traditional exploits that target software code, EchoLeak manipulates the AI’s behaviour using language — a class of attack known as prompt injection.

Microsoft confirmed the vulnerability and says it has applied mitigations. The company described it as a “research scenario” and stated that no customer data was compromised.

Still, security experts say the implications are serious. As AI agents become more integrated into business operations, their ability to take actions based on user inputs — or in this case, inputs from untrusted websites — creates a new kind of surface for cyberattacks.

EchoLeak underscores the need to apply the same rigour to AI system inputs as we do to traditional APIs and web endpoints. Left unchecked, these systems could become high-speed, automated insider threats.

Top Stories

Related Articles

February 11, 2026 In a sharp reversal that erased all gains made since Donald Trump’s 2025 election win, Bitcoin tumbled more...

February 10, 2026 Taiwan has flatly rejected U.S. efforts to shift a significant share of its semiconductor manufacturing to American more...

February 6, 2026 The competition between OpenAI and Anthropic intensified this week after both companies unveiled new artificial intelligence models more...

February 6, 2026 The Wikimedia Foundation announced in January that it is partnering with major AI companies, including Amazon, Meta, more...

Picture of Jim Love

Jim Love

Jim Love's career in technology spans more that four decades. He's been a CIO and headed a world wide Management Consulting practice. As an entrepreneur he built his own tech business. Today he is a podcast host with the popular tech podcasts Hashtag Trending and Cybersecurity Today with over 14 million downloads. As a novelist, his latest book "Elisa: A Tale of Quantum Kisses" is an Audible best seller. In addition, Jim is a songwriter and recording artist with a Juno nomination and a gold album to his credit. His music can be found at music.jimlove.com
Picture of Jim Love

Jim Love

Jim Love's career in technology spans more that four decades. He's been a CIO and headed a world wide Management Consulting practice. As an entrepreneur he built his own tech business. Today he is a podcast host with the popular tech podcasts Hashtag Trending and Cybersecurity Today with over 14 million downloads. As a novelist, his latest book "Elisa: A Tale of Quantum Kisses" is an Audible best seller. In addition, Jim is a songwriter and recording artist with a Juno nomination and a gold album to his credit. His music can be found at music.jimlove.com

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn