Google Refuses to Fix Gemini Security Flaw That Could Leak Sensitive User Data

Administrator

Administrator
Staff member
Apr 20, 2025
976
215
43

Google Refuses to Fix Gemini Security Flaw That Could Leak Sensitive User Data

68e7a6243b0de.jpg


Internet Giant Declines to Address Security Gap in Gemini that Potentially Exposes Users' Data

An alarm has been raised about a potential security flaw in the Gemini system, which could result in sensitive user information being sent to unintended recipients. However, the company behind Gemini appears to be brushing off the issue.

Uncovering a Hidden Threat

A cybersecurity expert has detected that Gemini is vulnerable to a specific kind of cyber assault known as ASCII smuggling attacks. This form of attack involves burying harmful prompts in innocuous-looking communication like emails or calendar invites. This becomes a problem when a language learning model (LLM) like Gemini is asked to summarize a text containing these hidden prompts.

While the company that owns Gemini is known for its stringent security measures and a proactive approach to user safety, it seems to be downplaying this particular issue. This dismissive stance is raising eyebrows, given the potential risks this vulnerability poses.

Understanding ASCII Smuggling Attacks

If you're not in the know about ASCII smuggling, it works on the principle of 'hiding in plain sight'. The attacker injects a clandestine instruction into a regular communication, such as an email. This could be written in the smallest font size to escape the victim's notice.

When the victim uses an AI tool like Gemini to summarize the text, the AI unknowingly reads out this hidden prompt too. This opens up a Pandora's Box of problems. For instance, the prompt might instruct the AI to dig up confidential information from your inbox or share your contact details. With Gemini's recent integration into a popular productivity suite, this vulnerability takes on greater significance due to the increased risk.

Testing the Waters

The cybersecurity expert who discovered this vulnerability decided to put some of the most widely used LLMs to the test. His findings were eye-opening. Alongside Gemini, two other LLMs were found to be susceptible to ASCII smuggling attacks. However, three other LLMs had safeguards in place to ward off such attacks, proving their security mettle.

The Company's Response

The expert reached out to the company behind Gemini, even providing a live demo where he fed Gemini a concealed instruction. The AI was duped into promoting a malicious website offering a high-quality phone at a discounted price.

Despite this demonstration, the company responded by downplaying the issue. They classified it not as a security bug, but as a social engineering tactic. In essence, they shifted the responsibility onto the user, implying that it's the user's job to identify and avoid such threats.

This response indicates that the company has no immediate plans to rectify this security loophole in Gemini, leaving users to fend for themselves in the face of this hidden threat.

 
Really troubling to see a company this big just shrug off a serious flaw like that. Are there any workarounds for regular folks until (if) they actually fix it?