BPOI Banner
Slack AI Vulnerability Could Have Exposed Data From Private Channels: Report Slack AI Vulnerability Could Have Exposed Data From Private Channels: Report

Slack AI Vulnerability Could Have Exposed Data From Private Channels: Report

This article has been updated to note the vulnerability has been patched and to include a statement from Salesforce.

Slack’s AI assistant had a security flaw that could let attackers steal sensitive data from private channels in the popular workplace chat app, security researchers at PromptArmor revealed this week. The vulnerability exploited a weakness in how the AI processes instructions, potentially compromising sensitive data across countless organizations.

In response to the report, a spokesperson from Salesforce—which owns Slack—told Decrypt that the vulnerability had been fixed.

“We launched an investigation into the described scenario where, under very limited and specific circumstances, a malicious actor with an existing account in the same Slack workspace could phish users for certain data,” the spokesperson said. “We’ve deployed a patch to address the issue and have no evidence at this time of unauthorized access to customer data.”

Slack also posted an official update on the issue.

Here’s how the hack worked.

An attacker created a public Slack channel and posted a cryptic message that, in actuality, instructed the AI to leak sensitive info—basically replacing an error word with the private information.

Image: PromptArmor

When an unsuspecting user later queried Slack AI about their private data, the system pulled in both the user’s private messages and the attacker’s prompt. Following the injected commands, Slack AI provided the sensitive information as part of its output.

The hack took advantage of a known weakness in large language models called prompt injection. Slack AI wasn’t able to distinguish between legitimate system instructions and deceptive user input, allowing attackers to slip in malicious commands that the AI then followed.

This vulnerability was particularly concerning because it didn’t require direct access to private channels. An attacker only needed to create a public channel, which can be done with minimal permissions, to plant their trap.

“This attack is very difficult to trace,” PromptArmor noted, since Slack AI didn’t cite the attacker’s message as a source. The victim saw no red flags, just their requested information served up with a side of data theft.

The researchers demonstrated how the flaw could have been used to steal API keys from private conversations. However, they warned that any confidential data could have potentially been extracted using similar methods.

Image: PromptArmor

Beyond data theft, the vulnerability opened the door to sophisticated phishing attacks. Hackers could have crafted messages that appear to come from colleagues or managers, tricking users into clicking malicious links disguised as harmless “reauthentication” prompts.

Slack’s update on August 14 that expanded AI analysis to uploaded files and Google Drive documents widened the potential attack surface dramatically. Hackers may not have even needed direct Slack access: a booby-trapped PDF could have done the trick.

PromptArmor says its team responsibly disclosed their findings to Slack on August 14. After several days of discussion, Slack’s security team concluded on August 19 that the behavior was “intended,” as public channel messages are searchable across workspaces by design.

“Given the proliferation of Slack and the amount of confidential data within Slack, this attack has material implications on the state of AI security,” PromptArmor warned in its report. The firm chose to go public with its findings to alert companies to the risk and encourage them to review their Slack AI settings after learning about Slack’s apparent inaction.

Slack AI, introduced as a paid add-on for business customers, promises to boost productivity by summarizing conversations and answering natural language queries about workplace discussions and documents. It’s designed to analyze both public and private channels that a user has access to.

The system uses third-party large language models, though Slack emphasizes that these run on its secure infrastructure. It’s currently available in English, Spanish, and Japanese, with plans to support additional languages in the future.

Slack has consistently emphasized its focus on data security and privacy. “We take our commitment to protecting customer data seriously. Learn how we built Slack to be secure and private,” Slack’s official AI guide states.

While Slack provides settings to restrict file ingestion and control AI functionality, these options may not be widely known or properly configured by many users and administrators. This lack of awareness could leave many organizations unnecessarily exposed to potential future attacks.

Generally Intelligent Newsletter

A weekly AI journey narrated by Gen, a generative AI model.



Source link

Jose Antonio Lanz

https://decrypt.co/246002/slack-ai-flaw-exposes-private-information

2024-08-22 20:06:26

bitcoin
Bitcoin (BTC) $ 95,601.61 1.68%
ethereum
Ethereum (ETH) $ 3,303.26 1.32%
tether
Tether (USDT) $ 0.999767 0.02%
xrp
XRP (XRP) $ 2.22 0.81%
bnb
BNB (BNB) $ 651.25 1.54%
solana
Solana (SOL) $ 181.79 0.60%
dogecoin
Dogecoin (DOGE) $ 0.315102 1.92%
usd-coin
USDC (USDC) $ 1.00 0.02%
cardano
Cardano (ADA) $ 0.894784 1.07%
staked-ether
Lido Staked Ether (STETH) $ 3,295.06 1.42%
tron
TRON (TRX) $ 0.245017 0.03%
avalanche-2
Avalanche (AVAX) $ 36.80 2.09%
chainlink
Chainlink (LINK) $ 22.20 0.02%
wrapped-steth
Wrapped stETH (WSTETH) $ 3,910.59 1.53%
the-open-network
Toncoin (TON) $ 5.39 2.01%
wrapped-bitcoin
Wrapped Bitcoin (WBTC) $ 95,347.55 1.73%
shiba-inu
Shiba Inu (SHIB) $ 0.000022 0.32%
sui
Sui (SUI) $ 4.35 0.28%
stellar
Stellar (XLM) $ 0.358076 0.08%
polkadot
Polkadot (DOT) $ 6.88 1.27%
hedera-hashgraph
Hedera (HBAR) $ 0.266765 4.63%
hyperliquid
Hyperliquid (HYPE) $ 28.61 17.80%
weth
WETH (WETH) $ 3,301.08 1.14%
bitcoin-cash
Bitcoin Cash (BCH) $ 447.69 0.89%
leo-token
LEO Token (LEO) $ 9.33 0.26%
uniswap
Uniswap (UNI) $ 14.04 4.49%
litecoin
Litecoin (LTC) $ 100.54 0.32%
pepe
Pepe (PEPE) $ 0.000018 3.76%
wrapped-eeth
Wrapped eETH (WEETH) $ 3,485.60 1.21%
near
NEAR Protocol (NEAR) $ 5.04 0.72%
ethena-usde
Ethena USDe (USDE) $ 0.999118 0.12%
bitget-token
Bitget Token (BGB) $ 4.15 0.03%
usds
USDS (USDS) $ 0.996045 0.31%
aptos
Aptos (APT) $ 9.30 1.77%
internet-computer
Internet Computer (ICP) $ 10.06 0.63%
aave
Aave (AAVE) $ 318.23 5.77%
crypto-com-chain
Cronos (CRO) $ 0.155817 1.53%
polygon-ecosystem-token
POL (ex-MATIC) (POL) $ 0.477768 1.09%
mantle
Mantle (MNT) $ 1.18 1.05%
ethereum-classic
Ethereum Classic (ETC) $ 26.16 0.40%
vechain
VeChain (VET) $ 0.046088 1.98%
render-token
Render (RENDER) $ 7.10 0.07%
whitebit
WhiteBIT Coin (WBT) $ 24.43 0.02%
mantra-dao
MANTRA (OM) $ 3.69 0.44%
monero
Monero (XMR) $ 189.10 2.22%
dai
Dai (DAI) $ 1.00 0.01%
bittensor
Bittensor (TAO) $ 456.39 0.01%
fetch-ai
Artificial Superintelligence Alliance (FET) $ 1.26 0.80%
arbitrum
Arbitrum (ARB) $ 0.750512 0.69%
ethena
Ethena (ENA) $ 1.07 1.70%