Supply chains, AI, and the cloud: The biggest failures (and one success) of 2025

Third, related to AI proof of concept attack which gained attention used a quick injection that tricked the GitLab Duo chatbot into adding malicious strings to a perfectly legitimate package of code. The attack variant successfully stole confidential user data.

Another noteworthy attack target Gemini CLI coding tool. This allowed attackers to execute malicious commands, such as wiping a hard drive, on the computers of developers using the artificial intelligence tool.

Using AI as bait and assistants for hacking

Other hackers associated with LLM have used chatbots to make attacks more effective or stealthy. Previously this monthTwo men have been charged with theft and destruction of sensitive government data. Prosecutors said one of the men tried to cover his tracks by asking the artificial intelligence tool, “How do I clear the system logs from the SQL servers after deleting the databases.” Shortly after, he allegedly asked the tool, “How to clear all event and application logs from Microsoft Windows Server 2012.” Investigators were still able to track the actions of the defendants.

IN MaybeA man has pleaded guilty to hacking a Walt Disney Company employee by tricking him into running a malicious version of a widely used open-source artificial intelligence image generation tool.

And in August, Google researchers warned users of the Salesloft Drift AI chat agent consider all security tokens connected to the platform to be compromised after discovering that unknown attackers used some credentials to access email from Google Workspace accounts. The attackers used the tokens to gain access to individual Salesforce accounts and from there to steal data, including credentials that could be used in other hacks.

There have also been several cases of LLM vulnerabilities that have again harmed people using them. IN one caseCoPilot was caught exposing the contents of more than 20,000 private GitHub repositories from companies such as Google, Intel, Huawei, PayPal, IBM, Tencent and, ironically, Microsoft. Initially, the repositories were also available through Bing. Microsoft eventually removed the repositories from search, but CoPilot continued to reveal them anyway.

Leave a Comment