Cyber Affairs
No Result
View All Result
  • Login
  • Register
[gtranslate]
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
Social icon element need JNews Essential plugin to be activated.
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Researchers Hacked Google A.I: Earned $50k Bounty

admin by admin
Mar 12, 2024
in News
A A
0

At Google’s LLM bugSWAT event in Las Vegas, researchers uncovered and reported bugs in the company’s Bard AI (formerly known as Gemini) and received a $50,000 reward.

Roni Carta, Justin Gardner, and Joseph Thacker worked together to hack on Bard and Google Cloud Console.

In particular, the security flaws the researchers found might have allowed for DoS attacks, the exfiltration of user data, and access to uploaded images belonging to a specific user.

“The vision function is designed to process and describe any uploaded image.

We observed, however, a major flaw. When we exploited this flaw, it granted us access to another user’s images without any permissions or verification process”, Roni Carta wrote on his blog.

Hack on Bard

The researcher stated that by deceiving Bard into describing a photo published by a different user, an attacker could effectively obtain unauthorized visual access to any image uploaded by the target.

Document

Integrate ANY.RUN in your company for Effective Malware Analysis

Malware analysis can be fast and simple. Just let us show you the way to:

  • Interact with malware safely
  • Set up virtual machine in Linux and all Windows OS versions
  • Work in a team
  • Get detailed reports with maximum data
  • If you want to test all these features now with completely free access to the sandbox:

Additionally, considering Bard’s optical character recognition (OCR) skill, this can also result in the unwanted disclosure of confidential textual information—such as emails, notes, and revenue—in the victim’s photographs.

Bard can render the markdown during user conversations.

The researcher’s idea was straightforward:

What if we could get Bard to summarize our files on disk, emails, and other data, then use markdown to extract it? The researcher considered infiltrating through photos.

Working on the command to enable successful exfiltration
Working on the command to enable successful exfiltration

Content Security Policy (CSP) is designed here to prevent Cross-Site Scripting (XSS) and data injection threats by allowing the backend server to designate which domains a browser should accept as legitimate sources of executable scripts, pictures, styles, and so on.

All in all, anything that causes an origin to send an HTTP request.

Researchers successfully obtained their victims’ email accounts. After quickly alerting Google to this vulnerability, Justin and Roni were rewarded with a $20,000 bounty and an additional $1,337 for the third-coolest bug of the event!

Hacking the Google Cloud Console

Within the framework of the event, researchers also had access to recently released AI features on the Google Cloud Console, which they could attack.

Roni Carta launched his proxy right away and examined every contact that took place between the front end and the back end. GraphQL was one of the API endpoints, and it was operational on cloudconsole-pa.clients6.google.com.

When researchers discovered they were utilizing GraphQL, they right away checked for a Denial of Service (DoS). 

Directive overloading happens when a query is intentionally crafted with an excessive number of directives.

This can be done to exploit the server’s processing of each directive, leading to increased computational load.

The backend would take longer to reply to requests when researchers added more directives.

When taking advantage of DoS circumstances that can affect the target’s availability.

Testing with 1000000 directives 
Testing with 1000000 directives 

“A malicious actor could easily compute a request with millions of directives and send thousands of requests per minute to hang some part of Google’s Backend,” researchers said.

Researchers were awarded $1,000 by the Bug Bounty Team, with an extra $5,000 for the “Coolest Bug of the Event” incentive.

With AIs being used in their products, Google wants to create an effective Security Red Teaming procedure; for this reason, their Bug Bounty team organized the event.

Worldwide, researchers were challenged by them to look for flaws that they had not discovered.

You can block malware, including Trojans, ransomware, spyware, rootkits, worms, and zero-day exploits, with Perimeter81 malware protection. All are incredibly harmful, can wreak havoc, and damage your network.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter



Read the full article here

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[mc4wp_form id=”387″]

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

[mc4wp_form id=”387″]

Social icon element need JNews Essential plugin to be activated.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.