Gmail is at risk of immediate attacks on Gemini injection attacks, a researcher said. According to the researcher, artificial intelligence (AI) chatboat that offers features such as email summary generation and re -writing of email, can be manipulated in displaying fishing messages to users. This weakness poses a significant threat, as the invaders can potentially exploit it to hold online scams. Meanwhile, Mountain View -based Tech Dev has allegedly said that the technique of manipulation has not been used against consumers so far.
The researcher claims that Gemini in Gmail suffers a quick injection
The danger was seen and it was demonstrated by researcher Marco Fagero, Jenny Big Bonne Program Manager in Mozilla, Mozilla’s Big Bounty Program for AI tools, 0 Dean. Interestingly, the scammer does not need to remove any high profile cyber robbery. Instead, it can be performed immediately with a simple text command using a technique known as injection.
Injection AI Chat is a type of attack on AI chat boats where the attacker deliberately connects the input or indicator to treat the model in a unannounced or malicious method. In this particular scenario, the researcher indirectly used the injection, where malicious gestures are embedded within a document, email or web page.
According to the researcher, he easily wrote a long email and finally added some hidden text, which contained immediate injection. There were no URLs or attachments in the email, making it easier to reach the recipient’s basic inbox.
Adding a malicious malicious message to the email
Photo Credit: 0 Dan/Marco Figaro
As shown in the image, the attacker used a white font on the white page to write a malicious message. This text is usually hidden for an email recipient. Other ways to add hidden text include the use of zero font size, off -screen text plasment, and other HTML or CSS tricks.
Now, if the recipient uses Gemini’s “Summary Email” feature, the chat boot will take action on the hidden text and perform a command without ever finding the user. He also highlighted that the possibility of chat boot after command increases if the message is wrapped inside an admin tag, as it considers it a high priority application.
Gemini repeats a malicious message in the Varbetium summary
Photo Credit: 0 Dan/Marco Figaro
In another screenshot of the CyberScureti, the researcher showed that Gemini really conveyed a malicious message and revealed it as part of his email summary. Since this message is now coming from Gemini, instead of emailing a stranger, the affected person may be more likely to believe it and follow the falling instructions for the scam.
The bulping computer reached Google to ask about the danger, and a spokesman said the company had not yet seen any evidence of similar manipulation. In addition, it was also highlighted that Google is in the process of implementing some of the immediate injection -based anti -injection attacks.


