Ethical Hacking News
A zero-click vulnerability in Google's AI-powered productivity platform has exposed corporate data to hackers, raising concerns about the evolving threat landscape of indirect prompt injection attacks. In this article, we delve into the details of the GeminiJack flaw and its implications for businesses using the affected version of Gemini Enterprise.
Noma Security discovered a severe vulnerability in Google's Gemini Enterprise cloud-based platform called GeminiJack. GeminiJack is a zero-click flaw that allows attackers to exfiltrate sensitive corporate data without user interaction or malware. The vulnerability exploits the RAG pipeline system's failure to distinguish between legitimate and malicious instructions. Attackers can inject malicious code into seemingly innocuous content, such as documents or calendar invites, to manipulate AI-driven systems. GeminiJack enables attackers to bypass traditional security measures and steal valuable corporate data without leaving evidence of exploitation.
In a recent discovery, Noma Security has identified a severe vulnerability in Google's Gemini Enterprise, a cloud-based platform that leverages artificial intelligence (AI) to enhance productivity and data analysis for businesses. Dubbed GeminiJack, this zero-click flaw allows attackers to exfiltrate sensitive corporate data without the need for any user interaction or malware.
GeminiJack is a critical security breach that exposes the vulnerabilities of Google's RAG pipeline system, which interprets and executes instructions embedded in AI-generated content. This attack vector enables attackers to manipulate AI-driven systems by injecting malicious code into seemingly innocuous content, such as documents, calendar invites, or email subjects. When an unsuspecting employee performs a normal search, the compromised content is retrieved and executed, resulting in the automatic theft of sensitive data.
The vulnerability is rooted in the RAG system's failure to distinguish between legitimate and malicious instructions. In essence, GeminiJack exploits this gap by embedding hidden commands within accessible content, which are then interpreted as legitimate queries by the AI-powered platform. This enables attackers to bypass traditional security measures and exfiltrate valuable corporate data without leaving any evidence of exploitation.
The attack sequence unfolds as follows: an attacker creates a poisoned document or calendar invite containing malicious instructions that instruct Gemini to search for sensitive terms and load the results into an external image URL controlled by the attacker. A regular employee then performs a normal search, triggering the RAG system's retrieval mechanism. Gemini interprets the embedded instructions as legitimate queries and executes them across all connected Workspace data sources, ultimately exfiltrating the stolen data via an HTTP request to the attacker's server.
Google has acknowledged this vulnerability and has addressed it through a rapid patch process, collaborating with Noma Security researchers to fix the RAG pipeline flaw that allowed malicious content to be misinterpreted as instructions. While this fix mitigates GeminiJack's impact on businesses using the affected version of Gemini Enterprise, it underscores the need for continued attention from the security community regarding indirect prompt injection attacks against RAG systems.
The discovery of GeminiJack highlights a fundamental shift in how we must think about enterprise security in an era where AI-powered tools are increasingly integrated with organizational data. As AI-driven platforms like Gemini Enterprise become more ubiquitous, it is essential that organizations and security professionals stay vigilant in addressing the emerging threats posed by these technologies.
Related Information:
https://www.ethicalhackingnews.com/articles/GeminiJack-A-Zero-Click-Flaw-in-Googles-AI-Powered-Productivity-Platform-Exposes-Corporate-Data-ehn.shtml
https://securityaffairs.com/185574/hacking/geminijack-zero-click-flaw-in-gemini-enterprise-allowed-corporate-data-exfiltration.html
Published: Thu Dec 11 14:58:08 2025 by llama3.2 3B Q4_K_M