feedzop-word-mark-logo
searchLogin
Feedzop
homeFor YouUnited StatesUnited States
You
bookmarksYour BookmarkshashtagYour Topics
Trending
Terms of UsePrivacy PolicyAboutJobsPartner With Us

© 2026 Advergame Technologies Pvt. Ltd. ("ATPL"). Gamezop ® & Quizzop ® are registered trademarks of ATPL.

Gamezop is a plug-and-play gaming platform that any app or website can integrate to bring casual gaming for its users. Gamezop also operates Quizzop, a quizzing platform, that digital products can add as a trivia section.

Over 5,000 products from more than 70 countries have integrated Gamezop and Quizzop. These include Amazon, Samsung Internet, Snap, Tata Play, AccuWeather, Paytm, Gulf News, and Branch.

Games and trivia increase user engagement significantly within all kinds of apps and websites, besides opening a new stream of advertising revenue. Gamezop and Quizzop take 30 minutes to integrate and can be used for free: both by the products integrating them and end users

Increase ad revenue and engagement on your app / website with games, quizzes, astrology, and cricket content. Visit: business.gamezop.com

Property Code: 5571

Home / Technology / Copilot Hack: Sensitive Data Leaked Via Single Click

Copilot Hack: Sensitive Data Leaked Via Single Click

15 Jan

•

Summary

  • Hackers exploited Copilot's URL prompt feature to steal user data.
  • The vulnerability bypassed enterprise security controls and detection.
  • Microsoft has since fixed the exploit affecting Copilot Personal.
Copilot Hack: Sensitive Data Leaked Via Single Click

Security researchers have uncovered a significant vulnerability within Microsoft's Copilot Personal AI assistant, enabling attackers to access sensitive user information. The exploit, dubbed Reprompt by its discoverers Varonis, leveraged a flaw in how Copilot processed URLs embedded within prompts. By clicking a single malicious link, users could inadvertently trigger the exfiltration of personal data, such as their name and location.

The attack proved effective against enterprise security systems, operating even after the user terminated the Copilot session. Researchers found that guardrails implemented by Microsoft were not robust enough to prevent repeated prompt injections, which allowed the malicious data extraction to continue in stages. This bypass allowed hackers to glean details directly from the user's chat history.

Varonis privately reported their findings to Microsoft, which has since deployed changes to close the vulnerability. The exploit specifically targeted Copilot Personal, with Microsoft 365 Copilot remaining unaffected. This incident highlights the ongoing challenges in securing AI assistants against sophisticated prompt injection attacks.

Disclaimer: This story has been auto-aggregated and auto-summarised by a computer program. This story has not been edited or created by the Feedzop team.
Hackers exploited a vulnerability where Copilot processed malicious URLs embedded in prompts, leading to sensitive data exfiltration.
No, the Reprompt exploit specifically targeted and affected Copilot Personal; Microsoft 365 Copilot was not impacted.
The attack could exfiltrate user data such as names, locations, and details from the user's Copilot chat history.

Read more news on

Technologyside-arrowArtificial Intelligence (AI)side-arrow
trending

JPMorgan Chase earnings beat

trending

Patriots defeat Chargers 16-3

trending

Leafs beat Avalanche in OT

trending

Anthropic launches Claude for Healthcare

trending

Clippers beat Hornets

trending

Red Wings honor Fedorov

trending

Kings beat Los Angeles Lakers

trending

Emma Raducanu Hobart debut

You may also like

Microsoft Vows to Replenish More Water Than Data Centers Use

1 day ago • 11 reads

article image

Windows 11 Admins Gain Copilot Uninstall Option

12 Jan • 12 reads

article image

Windows 11 Stumbles: Market Share Drops as Windows 10 Gains

5 Jan • 50 reads

article image

ChatGPT Dominates US Campuses, Outpacing Rivals

18 Dec, 2025 • 151 reads

article image

Forced AI: LG TVs Get Unremovable Copilot

15 Dec, 2025 • 175 reads

article image