Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

ChatGPT Calendar Flaw Lets Email Theft

September 17, 2025
Reading Time: 3 mins read
in Alerts
DHS Data Hub Leaked Sensitive Intel

EdisonWatch, an AI security firm, has identified a critical vulnerability in ChatGPT’s new Model Context Protocol (MCP) tool support. This tool allows the AI to interact with third-party services like calendars, emails, and payment systems. EdisonWatch founder Eito Miyamura demonstrated how an attacker could leverage this integration to steal a user’s emails just by knowing their email address. The vulnerability lies in how ChatGPT processes information from a user’s calendar, opening a path for data exfiltration.

The attack begins when a user receives a specially crafted calendar invitation from an attacker. This invite doesn’t need to be accepted. It contains a “jailbreak prompt”—a set of instructions that tells ChatGPT to search for sensitive information in the victim’s inbox and send it to an email address controlled by the attacker. The malicious command is triggered when the victim asks ChatGPT to help them prepare for their day, such as by checking their calendar. Unbeknownst to the user, this action initiates the malicious prompt, which then carries out the data theft.

This type of vulnerability is not unique to ChatGPT. Similar calendar invite attacks have previously been demonstrated against other AI assistants like Google’s Gemini and Microsoft’s Copilot. Security firms have shown how these attacks can be used for a variety of malicious purposes, including conducting spam campaigns, phishing, deleting calendar events, and even remotely controlling smart home devices. Another firm, Zenity, has also shown how AI assistants and enterprise tools can be exploited for a variety of purposes.

The EdisonWatch demonstration is the first to specifically target ChatGPT’s new calendar integration, but the findings have not been reported to OpenAI. Because it’s a known class of vulnerabilities related to LLM integration and isn’t specific to ChatGPT, AI companies are generally aware that these types of attacks are possible. The abused feature is currently only available in developer mode and requires the user to manually approve the chatbot’s actions. However, Miyamura pointed out that “decision fatigue” could still make the attack useful for threat actors, as users may just click “approve” without understanding the implications.

To help mitigate this risk, EdisonWatch has released an open-source solution designed to secure integrations and reduce the risk of data exfiltration. The company, founded by Oxford computer science alumni, focuses on helping organizations safely scale their AI implementations by enforcing “policy-as-code” for AI interactions with company systems. Their solution aims to address the most common types of AI attacks, helping to make the use of AI assistants more secure for everyone.

Reference:

  • Hackers Could Exploit ChatGPT Calendar Integration to Access User Emails
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecuritySeptember 2025
ADVERTISEMENT

Related Posts

CISA Highlights Ongoing Spyware Campaign

Formatters Leak Thousands Of Secrets

November 25, 2025
CISA Highlights Ongoing Spyware Campaign

Second Wave Hits Thousands Of Repos

November 25, 2025
CISA Highlights Ongoing Spyware Campaign

CISA Highlights Ongoing Spyware Campaign

November 25, 2025
ShadowPad Exploits WSUS Flaw For Access

Windows 11 24H2 Explorer And Start Crash

November 24, 2025
ShadowPad Exploits WSUS Flaw For Access

Matrix Push C2 Uses Browser Alerts To Phish

November 24, 2025
ShadowPad Exploits WSUS Flaw For Access

ShadowPad Exploits WSUS Flaw For Access

November 24, 2025

Latest Alerts

Formatters Leak Thousands Of Secrets

Second Wave Hits Thousands Of Repos

CISA Highlights Ongoing Spyware Campaign

Windows 11 24H2 Explorer And Start Crash

Matrix Push C2 Uses Browser Alerts To Phish

ShadowPad Exploits WSUS Flaw For Access

Subscribe to our newsletter

    Latest Incidents

    Canon Subsidiary Hit By Oracle Hack

    Harvard Reports Significant Data Breach

    Dartmouth Confirms Major Data Breach

    Delta Dental Virginia Breach Hits 146000

    Iberia Alerts Customers To Data Breach

    Cox Confirms Oracle Hack As Victims Named

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial