SANS NewsBites

M365 Copilot AI Prompt Injection Attack Patched; Salesforce Misconfigurations Risk Data Leaks; Patch Tuesday: Microsoft and Adobe

June 13, 2025  |  Volume XXVII - Issue #45

Top of the News


2025-06-12

Microsoft 365 Copilot Prompt Injection Attack Patched

Microsoft has addressed a "zero-click" attack chain in which Microsoft 365 (M365) Copilot's Retrieval-Augmented Generation (RAG) chatbot receives malicious instructions disguised as a typical email, causing it to "automatically exfiltrate sensitive and proprietary information from M365 Copilot context, without the user's awareness, or relying on any specific victim behavior." CVE-2025-32711, CVSS score 9.3, bypasses cross-prompt injection attack (XPIA) classifiers, external link redaction, Content-Security-Policy, and M365 Copilot's reference mentions. Aim Labs, who discovered this vulnerability (dubbed "EchoLeak"), state that while no exploitation in the wild has been observed, the relevant "general design flaws" of RAG-based AI may mean more applications are vulnerable. The researchers contend that "protecting AI applications requires introducing finer levels of granularity into current frameworks;" while the attack might be understood as Indirect Prompt Injection, Aim coins "LLM Scope Violation" to describe instructions that "make the LLM attend to trusted data in the model's context, without the user's explicit consent."

Editor's Note

Microsoft has patched the flaw, and no user action is required to address the issue. The flaw is leveraging Microsoft Graph to answer a query which is using data from their mailbox, OneDrive, SharePoint, Office Files and MS Teams. It's the Microsoft Graph interface which allows exfiltration of the otherwise organizationally private data.

Lee Neely
Lee Neely

These retrieval bugs are really fascinating, as any GenAI that uses any type of document ingestion or web scraping feature can be prone to having issues between what is designed to be data to be ingested versus new prompt commands. These confusion bugs are common in many traditional web bugs where the system cannot determine the difference between data and code.

Moses Frost
Moses Frost

This is another warning that AI applications are complex, immature and, from a security perspective, present serious risks to data security requiring remediation until those 'finer levels of granularity' are routinely built in.

John Pescatore
John Pescatore

One more instance in which features, functions, and 'early-to-market' trump secure by design. We can expect it to get worse as software becomes ever more complex.

William Hugh Murray
William Hugh Murray

2025-06-11

Salesforce Data at Risk from Misconfigurations

Salesforce has patched five zero-day flaws in OmniStudio before Spring '25/version 254, and has categorized 15 more flaws as risky "misconfigurations" that must be addressed by users, all of which were reported by Aaron Costello, Chief of Saas Security Research at AppOmni. Two zero days "require manual action to be taken by the customer in order to be remediated ... likely due to potential business impact:" CVE-2025-43967 exposes encrypted data in cleartext due to improper preservation of permissions in the DataMapper component; CVE-2025-43698 allows an attacker to bypass field level security controls for Salesforce objects due to improper preservation of permissions in the FlexCards component. The remaining three flaws have been patched via auto-update and are all improper preservation of permissions vulnerabilities affecting the FlexCards component: CVE-2025-43699 allows an attacker to bypass field level security controls for OmniUICard objects; CVE-2025-43700 exposes encrypted data in plaintext; and CVE-2025-43701 exposes Custom Settings data. Costello stresses the seriousness of risk from seemingly minor misconfigurations in Salesforce's low code platform, especially for organizations with compliance obligations such as HIPAA, GDPR, SOX, or PCI-DSS: "In industries where data sensitivity is high, [settings'] usability needs to be rebalanced with security rigor. [...] Apply the same scrutiny to industry cloud components that you would to any production code. Test, audit, and configure defensively."

Editor's Note

'Low Code' systems have been the rage for quite a bit of time, especially now with the advent of GenAI systems. These systems, however, do generate quite a bit of code, and as was disclosed in this disclosure, there was plenty of attack surface in these systems. If you're looking to use these, I suspect they have not been thoroughly audited, and you should probably give these a look.

Moses Frost
Moses Frost

Data safety, like physical safety, requires built-in 'interlocks' to prevent users/admins from selecting unsafe combinations of settings and parameters. Essentially, a form of setting 'fuzz testing' is needed before release for apps that will handle sensitive data.

John Pescatore
John Pescatore

With cloud-based services we're reminded that security of the configuration is paramount. It's easy to be lulled into thinking the provider handles everything; they generally don't. Make sure that you know the consequence of loss and protection requirements for the data you're processing in that environment to ensure you implement the appropriate security controls. Then, make sure that you review the baseline regularly to ensure all previous and new protections are implemented. If you're a SalesForce shop, review your field level and components' permissions, verify you're applying regular updates, and make sure you are using private, not public, caching mechanisms to protect user data.

Lee Neely
Lee Neely

2025-06-11

Patch Tuesday: Microsoft and Adobe

On Tuesday, June 10, Microsoft released updates to address nearly 70 vulnerabilities in multiple products. One of the flaws (CVE-2025-33053), an important-severity remote code execution vulnerability in Web Distributed Authoring and Versioning (WEBDAV), is being actively exploited. A second flaw (CVE-2025-33073), a Windows SMB client privilege elevation vulnerability, was previously disclosed. Also on June 10, Adobe released updates to address more than 250 vulnerabilities, 225 of which affect Adobe Experience Manager (AEM). There are also updates for Adobe Acrobat Reader, Adobe Commerce, Adobe InDesign, Adobe InCopy, Adobe Substance 3D Sampler, and Adobe Substance 3D Painter.

Editor's Note

Make sure you're not forgetting to update your Adobe suite; CC users are likely being prompted, but you probably have standalone installs of reader you need to verify. Check for older Adobe products, like Reader 2020, to see if they can either be removed or upgraded to the current versions. Note that the AEM Cloud service is automatically updated; you're going to have to update your on-premises version yourself, for now. There are no reported exploits, but don't bank on that remaining unchanged.

Lee Neely
Lee Neely

We cannot patch our way to security. Patching is not timely or efficient. We need secure development tools and procedures that result in essential quality early.

William Hugh Murray
William Hugh Murray

WebDAV, a Critical SMB Vulnerability, and a Word RCE. What decade is this again?

Moses Frost
Moses Frost

The Rest of the Week's News


2025-06-11

Chrome and Firefox Patch High-Severity Flaws

Google and Mozilla have both published security advisories disclosing high-severity memory bugs in their browsers, two each, now patched in Chrome 137.0.7151.103/.104 for Windows and macOS, Chrome 137.0.7151.103 for Linux, and Firefox 139.0.4. CVE-2025-5958 allows a remote attacker to use a crafted HTML page to exploit heap corruption due to a use-after-free flaw in Media in Google Chrome; a researcher from the Ant Group Light-Year Security Lab reportedly received an $8,000 bounty for notifying Google of this flaw. CVE-2025-5959 allows a remote attacker to use a crafted HTML page to execute arbitrary code inside a sandbox due to a type confusion flaw in V8 in Google Chrome. CVE-2025-49709 could lead to memory corruption via certain canvas graphics rendering operations in Firefox. CVE-2025-49710 is an integer overflow in 'OrderedHashTable" used by Firefox's JavaScript engine. NVD CVSS scores have not been assigned, but all four flaws are judged by their respective companies to be high severity.

Editor's Note

CVE-2025-5958 and CVE-2025-5959 have CVSS scores of 8.8. I'm pretty sure we all saw the latest relaunch to update Chrome, released Tuesday, but did you check Firefox? CVE-2025-49709 and CVE-2025-49710 have CVSS scores of 9.8. Good news is the Firefox update was also released June 10th, and ESR 128.11 & 115.24 are not affected.

Lee Neely
Lee Neely

These vulnerabilities put all users and uses at risk. The use of browsers should be restricted to browsing. Prefer purpose built clients for sensitive applications.

William Hugh Murray
William Hugh Murray

First, kudos to Google for investing in a bug bounty program. It's proven itself repeatedly these past few years. Second, both Google and Mozilla make it easy to update to the latest version of their browser. Just close and restart your browser. In fact, get into the habit of restarting your browser daily, it's an excellent security best practice.

Curtis Dukes
Curtis Dukes

2025-06-13

ConnectWise is Rotating Code Signing Certificates

ConnectWise is rotating the code signing certificates for ScreenConnect, ConnectWise Automate, and ConnectWise RMM "due to concerns raised by a third-party researcher about how ScreenConnect handled certain configuration data in earlier versions." The company is also releasing an update "to improve how this configuration data is managed in ScreenConnect." The on-premises builds for both Automate and ScreenConnect are available; on-premises customers are advised to ensure that they've updated to the latest build by Friday, June 13, 2025, at 8:00 p.m. ET (June 14, 12:00 a.m. UTC) "to avoid disruptions or degraded experience." ConnectWise is in the process of updating certificates and agents for cloud instances. The certificate rotation is unrelated to the nation-state cyberattack ConnectWise experienced in May of this year.

Editor's Note

The issue was that the installer configuration could be abused by a user with system level access. This handling is fixed in the updated ScreenConnect. The code signing certificates were used by all three products, so updates are needed. If you're using the cloud versions of ConnectWise Automate or RMM, the updates will be automatically applied. The updates for the on-premises versions of ScreenConnect and Automate are available now and need to be applied to avoid user impact.

Lee Neely
Lee Neely

I would say if ConnectWise is being proactive by rotating certificates based on a disclosure, that would be a great move. If you're a ConnectWise customer, you will probably need to update to get the new certificates.

Moses Frost
Moses Frost

2025-06-12

Interpol Coordinated Operation to Take Down Infostealer Malware Infrastructure

During the first four months of 2025, INTERPOL coordinated Operation Secure, which took down more than 20,000 malicious IP addresses and domains related to information stealers. Law enforcement agencies from 26 countries in Asia and Oceania worked to locate servers, map physical networks and execute targeted takedowns." Private sector firms Group-IB, Kaspersky, and Trend Micro also contributed by helping compile Cyber Activity Reports. In all, authorities seized 41 servers and 100 GB of data, making 32 arrests. They also notified more than 216,000 people that their data were compromised, urging them to change passwords, freeze accounts, and remove unauthorized access to accounts.

Editor's Note

Operation Secure discovered 69 infostealer variants including Lumma, Risepro, and Meta Stealer. The identified infrastructure included 117 C2 servers spread across 89 internet service providers. The information stolen included credentials, cookies, credit card details and cryptocurrency account data. Make sure you know how to update those credentials, that you've enabled MFA where available, and that you know who (and what) has access to your online accounts, particularly financial/banking services.

Lee Neely
Lee Neely

I think our industry downplays InfoStealers, as quite honestly these things are probably just as bad if not worse than other types of malware. With 100GB of InfoStealer logs being reported, that is a lot of data.

Moses Frost
Moses Frost

Some eye-popping figures posted as part of Operation Secure, and it only took four months. Kudos to team Law Enforcement. That said, cyber-crime still pays handsomely, so expect the infrastructure to be rebuilt and operational soon. Until then, hopefully everyone can enjoy the slowdown in phishing, smishing, and vishing attacks delivered daily to their inbox.

Curtis Dukes
Curtis Dukes

We may never get the cost of attack greater than the value of success but this is a big step in the right direction.

William Hugh Murray
William Hugh Murray

2025-06-10

Texas DOT Crash Records Stolen

The Texas Department of Transportation (TxDOT) has published a press release and sample notification letter disclosing a data breach of the state's Crash Records Information System (CRIS) that took place on May 12, 2025. TxDOT disabled access to the compromised system account employed in the attack, but discovered that an unauthorized user had downloaded nearly 300,000 crash reports, containing personal information including "first and last name, mailing and/or physical address, driver's license number, license plate number, vehicle make and model, car insurance policy number," as well as information about injuries sustained and narratives of crashes. TxDOT says they are implementing preventative security measures to protect against future attacks. The notice does not specify the nature or scope of the attack, and notes that TxDOT is sending letters to notify affected individuals despite not being required by law to do so. The letters urge wariness with communications mentioning crash information or requesting personal information, recommending that those affected monitor and/or freeze credit and request a credit report fraud alert.

Editor's Note

The annus horribilis for Texas continues. Seems like a serious review is in order by the TX CIO and CISO on how systems are secured within the state. Sure, credentials get can be compromised. That's why we have multi-factor authentication (MFA). Another interesting tidbit is that a user (TX employee) can download all records (300K). Seems like a bit more granularity in protecting citizens data would be in order as well.

Curtis Dukes
Curtis Dukes

TxDOT's notice to affected users advises them to be careful of emails, texts or calls related to past crashes, and they have established a dedicated call line for victims with questions. Not a bad time to remind users to verify contact from law enforcement as many phishing scams rely on people accepting that contact as genuine.

Lee Neely
Lee Neely

Crash reports also contain known associates of people in the vehicle you're in.

Moses Frost
Moses Frost

2025-06-12

South Korean Ticketing Bookselling Platform Suffers Outage Due to Ransomware Attack

South Korea's Yes24, a platform that sells books as well as tickets to concerts, plays, and other events, has been experiencing an outage due to a ransomware attack since Monday, June 9. There are reports of events being postponed or cancelled. The company hopes to have service restored by Sunday, June 15. The incident is being investigated by the Personal Information Protection Commission, South Korea's data privacy watchdog. Yes24 was not immediately forthcoming with information in the wake of the attack. While they notified the Korea Internet & Security Agency on Monday afternoon, they initially publicly described the platform's outage as being due to system maintenance; the disclosure that it was because of a ransomware attack was made on Tuesday, June 10. On Thursday, June 12, Yes24 said it would notify people if their personal data were compromised in the attack.

Editor's Note

Ticketholders are being asked to present paper or emailed tickets and are being turned away if they don't have verifiable tickets. When's the last time you thought about a low-tech backup for your digital ticket? Yes24 is reporting they have regained access to their administrator account and are restoring services. When's the last time you walked through the scenario of losing access to your administrator accounts? Don't just think about OS/AD admin; consider your applications, local and hosted. Make sure those break-glass processes work.

Lee Neely
Lee Neely

Companies find interesting and sometimes unique ways to hide the fact of a security incident. Most likely they're guided by their legal team. In this case the use of the term 'system maintenance.' Yes, they are likely performing system maintenance but is that maintenance routine or the result of a security incident? We now know it's the latter.

Curtis Dukes
Curtis Dukes

2025-06-10

Marks & Spencer Resumes Domestic Online Ordering

After major operational disruptions and a data breach from a cyberattack in late April 2025, suspected but not confirmed to have been ransomware, UK retailer Marks & Spencer (M&S) has announced that customers in England, Scotland and Wales may now place online delivery orders for certain "best selling" items, with service to Northern Ireland still forthcoming. Only standard shipping is available, and shipping times have increased from before the attack. "Click & Collect" service remains unavailable. In May 2025, M&S estimated in a statement to the London Stock Exchange that profit losses as a result of the attack could amount to £300M (US$400M).

Editor's Note

M&S is closing in on full-service restoration. If you're a M&S online user, be aware of the limits in both selection and delivery for online shopping: it's clothing and footwear right now, beauty and homeware targeted next week. Even so, many items are still reporting out of stock, so be patient.

Lee Neely
Lee Neely

2025-06-12

Denmark Intends to Move from Office 365 to LibreOffice

Denmark's Minister of Digitization has announced that the Ministry will move from Windows to Linux, switching their systems from Microsoft Office 365 to LibreOffice. Half the Ministry's employees will make the shift this summer; if all goes well, the remaining half will follow by this autumn. The shift is driven by the country's "digital sovereignty" digitization strategy, which calls for taking control of their own digital infrastructure, in part through a reduction in dependence on foreign tech providers. Two Danish cities -- Copenhagen, the country's capital, and Aarhus, the country's second-largest municipality -- recently announced their intentions to move away from Microsoft software and cloud services.

Editor's Note

By now LibreOffice is probably good enough for standard office documents. If someone in the ministry is an Excel power user, you may find LibreOffice lacking. We have seen a few governments attempt this, specifically in Germany, it's not been generally successful. To be frank it has less to do with Linux itself and more to do with the Desktop Environments provided. Another one to watch for sure.

Moses Frost
Moses Frost

This is really about the EUÕs desire to reduce dependence on foreign technology providers, and assert greater control over its digital infrastructure, data, and technological future. While the idea of switching both the operating system and office productivity suite sounds simple, user and process impact may not be so simple. Additionally, the switch requires a change in security and support processes, skills, training, and products. The Ministry is being careful with the transition, acknowledging the transition will have impacts and may require returning to the old system to develop alternatives.

Lee Neely
Lee Neely

Protection of a country's data (aka, digital sovereignty) is an important mandate in Europe and will continue to be. That said, there are some serious technical and fiscal challenges in getting off a private sector cloud and use of commercial IT applications. When it comes to cloud infrastructure, there arenÕt a lot of options without a lot of fiscal investment. Even open-source software comes at a cost that tends to grow over time. And what's next, the building of chip fab's and manufacturing of endpoint devices? Perhaps it's time to move away from the political soundbite and entertain other strategies to enforce the EU mandate.

Curtis Dukes
Curtis Dukes

Internet Storm Center Tech Corner

SANS Internet Storm Center StormCast Friday, June 13, 2025

Honeypot Scripts; EchoLeak MSFT Copilot Vuln; Thunderbolt mailbox URL Vuln

https://isc.sans.edu/podcastdetail/9492

Automated Tools to Assist with DShield Honeypot Investigations

https://isc.sans.edu/diary/Automated+Tools+to+Assist+with+DShield+Honeypot+Investigations+Guest+Diary/32038

EchoLeak: Zero-Click Microsoft 365 Copilot Data Leak

Microsoft fixed a vulnerability in Copilot that could have been abused to exfiltrate data from Copilot users. Copilot mishandled instructions an attacker included in documents inspected by Copilot and executed them.

https://www.aim.security/lp/aim-labs-echoleak-blogpost

Thunderbolt Vulnerability

Thunderbolt users may be tricked into downloading arbitrary files if an email includes a mailbox:/// URL.

https://www.mozilla.org/en-US/security/advisories/mfsa2025-49/

SANS Internet Storm Center StormCast Thursday, June 12, 2025

Quasar RAT; Windows 11 24H2 Delay; SMB Client Vuln PoC; ConnectWise Signing Keys; KDE Telnet code exec

https://isc.sans.edu/podcastdetail/9490

Quasar RAT Delivered Through Bat Files

Xavier is walking you through a quick reverse analysis of a script that will injection code extracted from a PNG image to implement a Quasar RAT.

https://isc.sans.edu/diary/Quasar+RAT+Delivered+Through+Bat+Files/32036

Delayed Windows 11 24H2 Rollout

Microsoft slightly throttled the rollout of windows 11 24H2 due to issues stemming from the patch Tuesday fixes.

https://learn.microsoft.com/en-us/windows/release-health/windows-message-center#3570

An In-Depth Analysis of CVE-2025-33073

Patch Tuesday fixed an already exploited SMB client vulnerability. A blog by Synacktiv explains the nature of the issue and how to exploit it.

https://www.synacktiv.com/en/publications/ntlm-reflection-is-dead-long-live-ntlm-reflection-an-in-depth-analysis-of-cve-2025

ConnectWise Rotating Signing Certificates

ConnectWise is rotating signing certificates after a recent compromise, and will release a new version of its Screen share software soon to harden its configuration.

https://www.connectwise.com/company/trust/advisories

KDE Telnet URL Vulnerability

The Konsole delivered as part of KDE may be abused to execute arbitrary code via ÒtelnetÓ URLs.

https://kde.org/info/security/advisory-20250609-1.txt

SANS Internet Storm Center StormCast Wednesday, June 11, 2025

Microsoft Patch Tuesday; Acrobat Patches

https://isc.sans.edu/podcastdetail/9488

Microsoft Patch Tuesday

Microsoft today released patches for 67 vulnerabilities. 10 of these vulnerabilities are rated critical. One vulnerability has already been exploited and another vulnerability has been publicly disclosed before today.

https://isc.sans.edu/diary/Microsoft+Patch+Tuesday+June+2025/32032

Adobe Vulnerabilities

Adobe released patches for 7 different applications. Two significant ones are Adobe Commerce and Adobe Acrobat Reader. All vulnerabilities patched for Adobe Commerce can only be exploited by an authenticated user. The Adobe Acrobat Reader vulnerabilities are exploited by a user opening a crafted PDF, and the exploit may execute arbitrary code.

https://helpx.adobe.com/security/Home.html