{"id":24711,"date":"2025-06-18T18:56:04","date_gmt":"2025-06-18T18:56:04","guid":{"rendered":"https:\/\/www.adminbyrequest.com\/?p=24711"},"modified":"2026-01-24T22:54:01","modified_gmt":"2026-01-24T22:54:01","slug":"echoleak-first-known-zero-click-ai-attack-targets-microsoft-copilot","status":"publish","type":"post","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/echoleak-first-known-zero-click-ai-attack-targets-microsoft-copilot","title":{"rendered":"EchoLeak: First Known Zero-Click AI Attack Targets Microsoft Copilot"},"content":{"rendered":"\n<p>A single email sitting in your inbox just became a data theft vector. No clicks required, no suspicious attachments, no warning signs. That&#8217;s EchoLeak, the first documented zero-click vulnerability targeting an AI assistant.<\/p>\n\n\n\n<p>Researchers at <a href=\"https:\/\/www.aim.security\/lp\/aim-labs-echoleak-blogpost\">Aim Security discovered<\/a> this critical flaw in Microsoft 365 Copilot earlier this year. Tracked as CVE-2025-32711 with a CVSS score of 9.3, the vulnerability allowed attackers to steal sensitive organizational data through carefully crafted email prompts.<br><br>Microsoft patched the issue in May, and there&#8217;s no evidence of real-world exploitation, but EchoLeak represents something bigger: the emergence of a new class of AI-specific security threats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How EchoLeak Turned Helpful AI Into a Silent Data Thief<\/h2>\n\n\n\n<p>The attack exploits what researchers call an &#8220;<a href=\"https:\/\/thehackernews.com\/2025\/06\/zero-click-ai-vulnerability-exposes.html\">LLM Scope Violation<\/a>&#8220;, essentially tricking an AI model into accessing and leaking data outside its intended boundaries. Here&#8217;s how it works:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The Setup<\/h3>\n\n\n\n<p>An attacker sends what appears to be a normal business email to their target. Hidden within the message are instructions designed to manipulate Copilot&#8217;s behavior. The email never mentions AI or Copilot directly, instead reading like typical corporate communication about employee onboarding, HR processes, or project management.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The Trigger<\/h3>\n\n\n\n<p>When the victim later asks Copilot a business-related question, the AI&#8217;s Retrieval-Augmented Generation (RAG) system automatically scans available content for relevant information. This includes that seemingly innocent email in the inbox.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The Exploitation<\/h3>\n\n\n\n<p>Once Copilot processes the malicious email, the embedded instructions activate. The AI begins extracting sensitive data from across the Microsoft 365 environment \u2013 chat histories, OneDrive files, SharePoint documents, Teams conversations \u2013 and packages it into specially crafted URLs that send the information to the attacker&#8217;s server.<\/p>\n\n\n\n<p>The victim never opens the malicious email or clicks any links. The attack happens entirely in the background while they&#8217;re using Copilot for legitimate work tasks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why Traditional Security Couldn&#8217;t Stop This Attack<\/h2>\n\n\n\n<p>EchoLeak succeeded because it exploited fundamental aspects of how AI assistants work. Microsoft 365 Copilot is designed to process both trusted internal data and external inputs without strict isolation, creating what researchers described as a &#8220;silent leak vector.&#8221;<\/p>\n\n\n\n<p>The attack bypassed multiple security mechanisms:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Cross-Prompt Injection Attack (XPIA) classifiers<\/strong> meant to detect malicious AI prompts<\/li>\n\n\n\n<li><strong>Content Security Policy (CSP)<\/strong> designed to prevent unauthorized data transmission<\/li>\n\n\n\n<li><strong>Link and image redaction systems<\/strong> that should block suspicious URLs<\/li>\n<\/ul>\n\n\n\n<p>As <a href=\"https:\/\/fortune.com\/2025\/06\/11\/microsoft-copilot-vulnerability-ai-agents-echoleak-hacking\/\">Adir Gruss from Aim Security explained<\/a>: &#8220;They tried to block it in multiple paths across the chain, but they just failed to do so because AI is so unpredictable and the attack surface is so big.&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"572\" src=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/06\/inline-1-3-1024x572.jpg\" alt=\"\" class=\"wp-image-24713\" srcset=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/06\/inline-1-3-1024x572.jpg 1024w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/06\/inline-1-3-300x167.jpg 300w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/06\/inline-1-3-768x429.jpg 768w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/06\/inline-1-3-1536x857.jpg 1536w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/06\/inline-1-3-2048x1143.jpg 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">The Real Problem: AI Systems Mixing Trusted and Untrusted Data<\/h2>\n\n\n\n<p>EchoLeak highlights a fundamental design challenge in modern AI assistants. These systems are built to be helpful by pulling information from everywhere they can access \u2013 your emails, documents, chat history, and external sources. But this same capability becomes dangerous when untrusted external input can manipulate the AI&#8217;s behavior.<\/p>\n\n\n\n<p>Traditional software vulnerabilities usually stem from improper input validation. With AI systems, the challenge is that inputs are inherently unstructured and difficult to validate. A perfectly formatted email containing natural language instructions can bypass security filters precisely because it looks legitimate.<\/p>\n\n\n\n<p>This isn&#8217;t just a Microsoft problem. Any AI system using Retrieval-Augmented Generation could be vulnerable if it processes external inputs alongside sensitive internal data. That includes customer service chatbots, enterprise AI assistants, and other AI-powered tools that organizations are rapidly adopting.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Growing AI Security Arms Race<\/h2>\n\n\n\n<p>EchoLeak is likely just the beginning. <\/p>\n\n\n\n<p>We&#8217;re entering an era where <a href=\"\/en\/blogs\/ai-in-cybersecurity-arms-both-sides-of-the-fight\" target=\"_blank\" rel=\"noopener\" title=\"\">the same technology that strengthens our defenses also empowers attackers<\/a>. AI tools that help security teams detect threats can be turned around to find new vulnerabilities. Systems designed to understand human language can be manipulated through carefully crafted instructions.<\/p>\n\n\n\n<p>Organizations need to prepare for a new category of threats that exploit AI&#8217;s core strengths (its ability to understand context, follow instructions, and access vast amounts of data) against the systems they&#8217;re meant to protect.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Organizations Can Learn From EchoLeak<\/h2>\n\n\n\n<p>While Microsoft fixed this specific vulnerability, the underlying security challenges aren&#8217;t going anywhere. Organizations deploying AI tools should consider several important lessons:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Rethink Trust Boundaries<\/h3>\n\n\n\n<p>Traditional security assumes clear boundaries between trusted and untrusted data. AI systems blur these lines by design, requiring new approaches to data isolation and access control.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Plan for AI-Specific Threats<\/h3>\n\n\n\n<p>Standard threat modeling may not account for prompt injection, scope violations, and other AI-specific attack vectors. Security teams need to expand their thinking about how these systems can be exploited.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Implement Comprehensive Monitoring<\/h3>\n\n\n\n<p>Organizations need <a href=\"https:\/\/docs.adminbyrequest.com\/portal\/auditlog.htm\" target=\"_blank\" rel=\"noopener\" title=\"\">detailed logging and monitoring<\/a> of AI interactions with sensitive data. Understanding what information AI systems access and how they use it becomes critical for detecting potential compromises.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Maintain Human Oversight<\/h3>\n\n\n\n<p>While AI systems can enhance productivity, they shouldn&#8217;t operate without appropriate oversight, especially when accessing sensitive organizational data.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"572\" src=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/06\/inline-2-3-1024x572.jpg\" alt=\"\" class=\"wp-image-24714\" srcset=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/06\/inline-2-3-1024x572.jpg 1024w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/06\/inline-2-3-300x167.jpg 300w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/06\/inline-2-3-768x429.jpg 768w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/06\/inline-2-3-1536x857.jpg 1536w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/06\/inline-2-3-2048x1143.jpg 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Microsoft&#8217;s Response and Industry Implications<\/h2>\n\n\n\n<p>Microsoft&#8217;s handling of EchoLeak demonstrates both the challenges and potential solutions for AI security. The company <a href=\"https:\/\/thehackernews.com\/2025\/06\/zero-click-ai-vulnerability-exposes.html\">implemented server-side fixes<\/a> without requiring customer action and has introduced additional controls like Data Loss Prevention (DLP) tags to restrict Copilot&#8217;s access to external emails.<\/p>\n\n\n\n<p>However, enabling these protective controls can reduce Copilot&#8217;s functionality, highlighting the ongoing tension between security and usability in AI systems.<\/p>\n\n\n\n<p>The vulnerability has prompted broader discussions about AI security standards and the need for new defensive approaches. As more organizations adopt AI assistants for business-critical tasks, the industry will need to develop security frameworks specifically designed for these systems.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Preparing for the Next Wave of AI Vulnerabilities<\/h2>\n\n\n\n<p>EchoLeak almost certainly won&#8217;t be the last zero-click AI vulnerability we see. As these systems become more sophisticated and deeply integrated into business operations, they&#8217;ll present increasingly attractive targets for attackers.<\/p>\n\n\n\n<p>Organizations should start preparing now by establishing <a href=\"https:\/\/www.ibm.com\/think\/topics\/ai-governance\" target=\"_blank\" rel=\"noopener\" title=\"\">AI governance frameworks<\/a>, implementing appropriate monitoring and logging, and ensuring their security teams understand the unique risks that AI systems introduce.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>One email. No clicks. Full data breach. EchoLeak shows how AI assistants like Microsoft Copilot can become dangerous tools in the wrong hands.<\/p>\n","protected":false},"author":16,"featured_media":24712,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[44,473,472,148,223,471,62],"ppma_author":[428],"class_list":["post-24711","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs","tag-ai","tag-ai-exploit","tag-copilot","tag-cybersecurity","tag-data-breach","tag-echoleak","tag-microsoft","entry","has-media"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.5.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"One email. No clicks. Full data breach. EchoLeak shows how AI assistants like Microsoft Copilot can become dangerous tools in the wrong hands.\" \/>\n\t<meta name=\"robots\" content=\"max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n\t<meta name=\"author\" content=\"Pocholo Legaspi\"\/>\n\t<meta name=\"keywords\" content=\"echoleak,cybersecurity,ai exploit,llm scope violation,microsoft 365,copilot,data breach,ai,microsoft\" \/>\n\t<link rel=\"canonical\" href=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/echoleak-first-known-zero-click-ai-attack-targets-microsoft-copilot\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.5.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Admin By Request \u00bb Local Admin Rights, Managed.\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"EchoLeak: First Known Zero-Click AI Attack Targets Microsoft Copilot\" \/>\n\t\t<meta property=\"og:description\" content=\"One email. No clicks. Full data breach. EchoLeak shows how AI assistants like Microsoft Copilot can become dangerous tools in the wrong hands.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/echoleak-first-known-zero-click-ai-attack-targets-microsoft-copilot\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2025-06-18T18:56:04+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2026-01-24T22:54:01+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/adminbyrequest\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:title\" content=\"EchoLeak: First Known Zero-Click AI Attack Targets Microsoft Copilot\" \/>\n\t\t<meta name=\"twitter:description\" content=\"One email. No clicks. Full data breach. EchoLeak shows how AI assistants like Microsoft Copilot can become dangerous tools in the wrong hands.\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/echoleak-first-known-zero-click-ai-attack-targets-microsoft-copilot#blogposting\",\"name\":\"EchoLeak: First Known Zero-Click AI Attack Targets Microsoft Copilot\",\"headline\":\"EchoLeak: First Known Zero-Click AI Attack Targets Microsoft Copilot\",\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/pocholo-editor#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/main-3-scaled.jpg\",\"width\":2560,\"height\":1429,\"caption\":\"Admin By Request blog post on EchoLeak\"},\"datePublished\":\"2025-06-18T18:56:04+00:00\",\"dateModified\":\"2026-01-24T22:54:01+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/echoleak-first-known-zero-click-ai-attack-targets-microsoft-copilot#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/echoleak-first-known-zero-click-ai-attack-targets-microsoft-copilot#webpage\"},\"articleSection\":\"Blogs, AI, AI Exploit, Copilot, Cybersecurity, Data Breach, EchoLeak, Microsoft, Pocholo Legaspi\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/echoleak-first-known-zero-click-ai-attack-targets-microsoft-copilot#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/echoleak-first-known-zero-click-ai-attack-targets-microsoft-copilot#listItem\",\"name\":\"EchoLeak: First Known Zero-Click AI Attack Targets Microsoft Copilot\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/echoleak-first-known-zero-click-ai-attack-targets-microsoft-copilot#listItem\",\"position\":3,\"name\":\"EchoLeak: First Known Zero-Click AI Attack Targets Microsoft Copilot\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\",\"name\":\"Admin By Request\",\"description\":\"Local Admin Rights, Managed.\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"telephone\":\"+12622994600\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Circle-Tick-24.svg\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/echoleak-first-known-zero-click-ai-attack-targets-microsoft-copilot\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/echoleak-first-known-zero-click-ai-attack-targets-microsoft-copilot\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/adminbyrequest\",\"https:\\\/\\\/twitter.com\\\/AdminByRequest\",\"https:\\\/\\\/www.instagram.com\\\/AdminByRequest\\\/\",\"https:\\\/\\\/www.tiktok.com\\\/@adminbyrequest\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCwq1wlbT9m_z3YH-EPaZqKw\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/adminbyrequest\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/pocholo-editor#author\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/pocholo-editor\",\"name\":\"Pocholo Legaspi\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/echoleak-first-known-zero-click-ai-attack-targets-microsoft-copilot#webpage\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/echoleak-first-known-zero-click-ai-attack-targets-microsoft-copilot\",\"name\":\"EchoLeak: First Known Zero-Click AI Attack Targets Microsoft Copilot\",\"description\":\"One email. No clicks. Full data breach. EchoLeak shows how AI assistants like Microsoft Copilot can become dangerous tools in the wrong hands.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/echoleak-first-known-zero-click-ai-attack-targets-microsoft-copilot#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/pocholo-editor#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/pocholo-editor#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/main-3-scaled.jpg\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/echoleak-first-known-zero-click-ai-attack-targets-microsoft-copilot\\\/#mainImage\",\"width\":2560,\"height\":1429,\"caption\":\"Admin By Request blog post on EchoLeak\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/echoleak-first-known-zero-click-ai-attack-targets-microsoft-copilot#mainImage\"},\"datePublished\":\"2025-06-18T18:56:04+00:00\",\"dateModified\":\"2026-01-24T22:54:01+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"name\":\"Admin By Request\",\"alternateName\":\"ABR\",\"description\":\"Local Admin Rights, Managed.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<script type=\"text\/javascript\">\n\t\t\t(function(c,l,a,r,i,t,y){\n\t\t\tc[a]=c[a]||function(){(c[a].q=c[a].q||[]).push(arguments)};t=l.createElement(r);t.async=1;\n\t\t\tt.src=\"https:\/\/www.clarity.ms\/tag\/\"+i+\"?ref=aioseo\";y=l.getElementsByTagName(r)[0];y.parentNode.insertBefore(t,y);\n\t\t})(window, document, \"clarity\", \"script\", \"n4woz8og40\");\n\t\t<\/script>\n\t\t<script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src='https:\/\/www.googletagmanager.com\/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);})(window,document,'script','dataLayer',\"GTM-PGQ6572W\");<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>EchoLeak: First Known Zero-Click AI Attack Targets Microsoft Copilot<\/title>\n\n","aioseo_head_json":{"title":"EchoLeak: First Known Zero-Click AI Attack Targets Microsoft Copilot","description":"One email. No clicks. Full data breach. EchoLeak shows how AI assistants like Microsoft Copilot can become dangerous tools in the wrong hands.","canonical_url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/echoleak-first-known-zero-click-ai-attack-targets-microsoft-copilot","robots":"max-snippet:-1, max-image-preview:large, max-video-preview:-1","keywords":"echoleak,cybersecurity,ai exploit,llm scope violation,microsoft 365,copilot,data breach,ai,microsoft","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/echoleak-first-known-zero-click-ai-attack-targets-microsoft-copilot#blogposting","name":"EchoLeak: First Known Zero-Click AI Attack Targets Microsoft Copilot","headline":"EchoLeak: First Known Zero-Click AI Attack Targets Microsoft Copilot","author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/pocholo-editor#author"},"publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/06\/main-3-scaled.jpg","width":2560,"height":1429,"caption":"Admin By Request blog post on EchoLeak"},"datePublished":"2025-06-18T18:56:04+00:00","dateModified":"2026-01-24T22:54:01+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/echoleak-first-known-zero-click-ai-attack-targets-microsoft-copilot#webpage"},"isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/echoleak-first-known-zero-click-ai-attack-targets-microsoft-copilot#webpage"},"articleSection":"Blogs, AI, AI Exploit, Copilot, Cybersecurity, Data Breach, EchoLeak, Microsoft, Pocholo Legaspi"},{"@type":"BreadcrumbList","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/echoleak-first-known-zero-click-ai-attack-targets-microsoft-copilot#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","position":1,"name":"Home","item":"https:\/\/www.adminbyrequest.com\/en","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","position":2,"name":"Blogs","item":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/echoleak-first-known-zero-click-ai-attack-targets-microsoft-copilot#listItem","name":"EchoLeak: First Known Zero-Click AI Attack Targets Microsoft Copilot"},"previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/echoleak-first-known-zero-click-ai-attack-targets-microsoft-copilot#listItem","position":3,"name":"EchoLeak: First Known Zero-Click AI Attack Targets Microsoft Copilot","previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}}]},{"@type":"Organization","@id":"https:\/\/www.adminbyrequest.com\/en\/#organization","name":"Admin By Request","description":"Local Admin Rights, Managed.","url":"https:\/\/www.adminbyrequest.com\/en\/","telephone":"+12622994600","logo":{"@type":"ImageObject","url":"\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/echoleak-first-known-zero-click-ai-attack-targets-microsoft-copilot\/#organizationLogo"},"image":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/echoleak-first-known-zero-click-ai-attack-targets-microsoft-copilot\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/adminbyrequest","https:\/\/twitter.com\/AdminByRequest","https:\/\/www.instagram.com\/AdminByRequest\/","https:\/\/www.tiktok.com\/@adminbyrequest","https:\/\/www.youtube.com\/channel\/UCwq1wlbT9m_z3YH-EPaZqKw","https:\/\/www.linkedin.com\/company\/adminbyrequest\/"]},{"@type":"Person","@id":"https:\/\/www.adminbyrequest.com\/en\/author\/pocholo-editor#author","url":"https:\/\/www.adminbyrequest.com\/en\/author\/pocholo-editor","name":"Pocholo Legaspi"},{"@type":"WebPage","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/echoleak-first-known-zero-click-ai-attack-targets-microsoft-copilot#webpage","url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/echoleak-first-known-zero-click-ai-attack-targets-microsoft-copilot","name":"EchoLeak: First Known Zero-Click AI Attack Targets Microsoft Copilot","description":"One email. No clicks. Full data breach. EchoLeak shows how AI assistants like Microsoft Copilot can become dangerous tools in the wrong hands.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#website"},"breadcrumb":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/echoleak-first-known-zero-click-ai-attack-targets-microsoft-copilot#breadcrumblist"},"author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/pocholo-editor#author"},"creator":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/pocholo-editor#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/06\/main-3-scaled.jpg","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/echoleak-first-known-zero-click-ai-attack-targets-microsoft-copilot\/#mainImage","width":2560,"height":1429,"caption":"Admin By Request blog post on EchoLeak"},"primaryImageOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/echoleak-first-known-zero-click-ai-attack-targets-microsoft-copilot#mainImage"},"datePublished":"2025-06-18T18:56:04+00:00","dateModified":"2026-01-24T22:54:01+00:00"},{"@type":"WebSite","@id":"https:\/\/www.adminbyrequest.com\/en\/#website","url":"https:\/\/www.adminbyrequest.com\/en\/","name":"Admin By Request","alternateName":"ABR","description":"Local Admin Rights, Managed.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"}}]},"og:locale":"en_US","og:site_name":"Admin By Request \u00bb Local Admin Rights, Managed.","og:type":"article","og:title":"EchoLeak: First Known Zero-Click AI Attack Targets Microsoft Copilot","og:description":"One email. No clicks. Full data breach. EchoLeak shows how AI assistants like Microsoft Copilot can become dangerous tools in the wrong hands.","og:url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/echoleak-first-known-zero-click-ai-attack-targets-microsoft-copilot","og:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","og:image:secure_url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","article:published_time":"2025-06-18T18:56:04+00:00","article:modified_time":"2026-01-24T22:54:01+00:00","article:publisher":"https:\/\/www.facebook.com\/adminbyrequest","twitter:card":"summary_large_image","twitter:site":"@AdminByRequest","twitter:title":"EchoLeak: First Known Zero-Click AI Attack Targets Microsoft Copilot","twitter:description":"One email. No clicks. Full data breach. EchoLeak shows how AI assistants like Microsoft Copilot can become dangerous tools in the wrong hands.","twitter:creator":"@AdminByRequest","twitter:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg"},"aioseo_meta_data":{"post_id":"24711","title":"#post_title","description":"#post_excerpt","keywords":[{"label":"EchoLeak","value":"EchoLeak"},{"label":"Cybersecurity","value":"Cybersecurity"},{"label":"AI exploit","value":"AI exploit"},{"label":"LLM scope violation","value":"LLM scope violation"},{"label":"Microsoft 365","value":"Microsoft 365"},{"label":"Copilot","value":"Copilot"},{"label":"Data Breach","value":"Data Breach"}],"keyphrases":{"focus":{"keyphrase":"","score":0,"analysis":{"keyphraseInTitle":{"score":0,"maxScore":9,"error":1}}},"additional":[]},"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"BlogPosting","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2026-01-24 23:40:33","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":"{\"title\":{\"suggestions\":[],\"usage\":0},\"description\":{\"suggestions\":[],\"usage\":0}}","ai":null,"created":"2025-06-19 18:56:05","updated":"2026-01-24 23:40:33"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\/category\/blogs\" title=\"Blogs\">Blogs<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tEchoLeak: First Known Zero-Click AI Attack Targets Microsoft Copilot\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.adminbyrequest.com\/en"},{"label":"Blogs","link":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs"},{"label":"EchoLeak: First Known Zero-Click AI Attack Targets Microsoft Copilot","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/echoleak-first-known-zero-click-ai-attack-targets-microsoft-copilot"}],"authors":[{"term_id":428,"user_id":16,"is_guest":0,"slug":"pocholo-editor","display_name":"Pocholo Legaspi","avatar_url":{"url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/04\/Pocholo-Headshot.jpg","url2x":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/04\/Pocholo-Headshot.jpg"},"author_category":"1","user_url":"","last_name":"Legaspi","first_name":"Pocholo","job_title":"","description":"Pocholo Legaspi is a seasoned content marketer and SEO specialist with over nine years of experience crafting digital content that drives engagement and growth. With a background in tech and a Master\u2019s in Business Informatics, he brings a data-driven approach to content strategy and storytelling."}],"_links":{"self":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/24711","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/comments?post=24711"}],"version-history":[{"count":1,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/24711\/revisions"}],"predecessor-version":[{"id":24715,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/24711\/revisions\/24715"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media\/24712"}],"wp:attachment":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media?parent=24711"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/categories?post=24711"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/tags?post=24711"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/ppma_author?post=24711"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}