APromptRiskDBThreat intelligence atlas
AI Case Study

Indirect Prompt Injection Threats: Bing Chat Data Pirate - AI Case Study

Whenever interacting with Microsoft's new Bing Chat LLM Chatbot, a user can allow Bing Chat permission to view and access currently open websites throughout the chat session. Researchers demonstrated the ability for an attacker to plant an injection in a website the user is visiting, which silently turns Bing Chat into a Social Engineer who seeks out and exfiltrates personal information. The user doesn't have to a...

ExerciseMicrosoft Bing ChatKai Greshake, Saarland UniversityResource DevelopmentDefense EvasionExecution

Overview

Case steps5Steps described in the case record.
Techniques5Attack methods mentioned in the case steps.
Linked CVEs0Known vulnerabilities mentioned in the record.

Risk patterns

Patterns found in the case record and its linked vulnerabilities.

  • 1Dominant ATLAS tactic. Resource Development appears in 1 case steps.
  • 2Multiple attack methods. The case connects to 5 unique AI attack methods.

Procedure timeline

Search the case steps or filter them by attacker goal.

Resource Development1Defense Evasion1Execution1Initial Access1Impact1
  1. Resource Development

    The attacker created a website containing malicious system prompts for the LLM to ingest in order to influence the model's behavior. These prompts are ingested by the model when access to it is requested by the user.

  2. Step 3

    Indirect

    Execution

    Bing chat is capable of seeing currently opened websites if allowed by the user. If the user has the adversary's website open, the malicious prompt will be executed.

  3. Initial Access

    The malicious prompt directs Bing Chat to change its conversational style to that of a pirate, and its behavior to subtly convince the user to provide PII (e.g. their name) and encourage the user to click on a link that has the user's PII encoded into the URL.

  4. Step 5

    User Harm

    Impact

    With this user information, the attacker could now use the user's PII it has received for further identity-level attacks, such identity theft or fraud.

Mitigations

Defenses connected to the attack methods in this case.

Sources

Original public records and references for this case.