APromptRiskDBThreat intelligence atlas
AI Case Study

Data Exfiltration via Agent Tools in Copilot Studio - AI Case Study

Researchers from Zenity demonstrated how an organization’s data can be exfiltrated via prompt injections that target an AI-powered customer service agent. The target system is a customer service agent built by Zenity in Copilot Studio. It is modeled after an agent built by McKinsey to streamline its customer service needs. The AI agent listens to a customer service email inbox where customers send their engagement...

ExerciseCopilot Studio Customer Service AgentZenityDiscoveryResource DevelopmentExecution

Overview

Case steps14Steps described in the case record.
Techniques12Attack methods mentioned in the case steps.
Linked CVEs0Known vulnerabilities mentioned in the record.

Risk patterns

Patterns found in the case record and its linked vulnerabilities.

  • 1Dominant ATLAS tactic. Discovery appears in 4 case steps.
  • 2Multiple attack methods. The case connects to 12 unique AI attack methods.

Procedure timeline

Search the case steps or filter them by attacker goal.

Discovery4Resource Development2Execution2Collection2Reconnaissance1Initial Access1AI Model Access1Exfiltration1
  1. Reconnaissance

    The researchers look for support email addresses on the target organization’s website which may be managed by an AI agent. Then, they probe the system by sending emails and looking for indications of agentic AI in automatic replies.

  2. Resource Development

    Once a target has been identified, the researchers craft prompts designed to probe for a potential AI agent monitoring the inbox. The prompt instructs the agent to send an email reply to an address of the researchers’ choosing.

  3. Step 4

    Triggered

    Execution

    The researchers receive a reply at the address they specified, indicating that there is an AI agent present, and that the triggered prompt injection was successful.

  4. AI Model Access

    From here, the researchers repeat the same steps to interact with the AI agent, sending malicious prompts to the agent via email and receiving responses at their desired address.

  5. Execution

    The researchers modify the original prompt to discover other knowledge sources and tools that may have data they are after.

  6. Discovery

    The researchers discover the AI agent has access to a “Customer Support Account Owners.csv” data source.

  7. Discovery

    The researchers discover the AI agent has access to the Salesforce get-records tool, which can be used to retrieve CRM records.

  8. Resource Development

    The researchers put their knowledge of the AI agent’s tools and knowledge sources together to craft a prompt that will collect and exfiltrate the customer data they are after.

  9. Collection

    The prompt asks the agent to retrieve all of the fields and rows from “Customer Support Account Owners.csv”. The agent retrieves the entire file.

  10. Collection

    The prompt asks the agent to retrieve all Salesforce records using its get-records tool. The agent retrieves all records from the victim’s CRM.

Mitigations

Defenses connected to the attack methods in this case.

Sources

Original public records and references for this case.

Original source

Original source links

Open the MITRE ATLAS data and public references used for this case study.