innocent emails malicious code

Hackers are turning Google’s AI tools against users through a deceptive new attack vector. The culprit? Gemini’s email summarization feature, which now serves as an unwitting accomplice to cybercriminals.

These attackers have discovered that by embedding invisible instructions within ordinary-looking emails, they can manipulate Gemini into generating dangerous summaries. Pretty clever, right? Well, not for the victims.

Hackers hijack Gemini with hidden commands, turning Google’s helpful AI into an unwitting accomplice for their deceptive schemes.

The attack operates through what experts call “indirect prompt injection.” Hackers hide their malicious directives using zero-sized fonts or white-on-white text in email HTML—stuff no human would notice. But Gemini sees it all. The AI faithfully processes these hidden commands and spits out summaries containing whatever warnings or alerts the attacker specified. No attachments needed. No suspicious links. Just pure psychological manipulation.

These weaponized summaries often masquerade as urgent security notices. “Your account has been compromised! Call this number immediately!” Sound familiar? The twist is that the original email shows nothing suspicious, making traditional security filters useless. Users trust these summaries because, hey, they came from Google’s AI, not some random phishing attempt.

The technical side is almost elegant. Certain HTML elements get treated as priority instructions by Gemini. The AI doesn’t discriminate between visible text and the invisible garbage hidden in the email’s code. It just follows orders. Like an obedient digital puppy with no sense of danger.

This vulnerability has persisted despite Google’s attempts at fixing it. Security researchers keep finding new ways to sneak past defenses. Google is actively conducting red team exercises to identify and patch these vulnerabilities before they cause widespread damage. The problem isn’t going away.

Organizations with widespread AI summarization features face the highest risk. Traditional security measures don’t catch these attacks because there’s nothing technically malicious to detect. It’s just text telling an AI what to say.

The defense? AI systems must learn to ignore hidden text. This attack was first uncovered by security researcher Marco Figueroa who demonstrated its effectiveness. But until then, maybe think twice before trusting that helpful little summary. Your AI assistant might be speaking with someone else’s voice.

References

You May Also Like

Outdated Airports Still Force Travelers to Dump Drinks Despite Explosive-Detecting Technology

While airports secretly possess liquid-detecting technology, millions still dump drinks at security—and won’t stop until 2043.

Star Wars Fan Site Masked CIA’s Global Spy Network

CIA agents secretly used StarWarsWeb.net to exchange intelligence worldwide until sloppy coding exposed the entire spy network.

Anonymous Hackers Infiltrate ICE’s $65 Million Deportation Flight Contractor

Anonymous hackers seized ICE contractor’s private data in $65M operation, halting deportations nationwide. The digital raid questions whether government contractors protect your information at all.

Silent Invasion: 9,000 ASUS Routers Weaponized Through ‘Invisible’ Backdoors

9,000 ASUS routers turned into silent weapons through invisible backdoors that survive reboots—your home network might be compromised right now.