Flaw in Google Gemini Enables AI-Driven Phishing Scams

Edward Zhou
Edward Zhou

CEO & Founder

 
July 17, 2025 3 min read

Google Gemini Vulnerabilities Exploited in Phishing Attacks

Gmail at 20
Cybercriminals have discovered ways to exploit Google's Generative Artificial Intelligence (GenAI) through Google Gemini to steal Gmail accounts. Gemini, integrated into Google's Workspace suite, summarizes emails and assists users by performing various tasks. However, this feature has made Gmail accounts vulnerable to "prompt-injection" attacks, where hidden prompts can be executed by Gemini.

Mechanism of Attack

According to security researcher Marco Figueroa, attackers can embed a hidden prompt in an email using HTML and CSS, which can be invisible to the user. For instance, setting the font size to zero and changing its color to white allows the prompt to remain unnoticed while still being executed by Gemini. This can lead to messages warning users of compromised accounts, persuading them to call a specified number for resolution.

To defend against these prompt injection attacks, companies should ensure their email clients remove or ignore hidden content. Implementing post-processing filters to scan for urgent messages, URLs, or phone numbers is also recommended. User education on the unreliability of AI-generated summaries as security alerts is crucial. Google acknowledges the existence of these attacks and is actively working on mitigation strategies.

For more details, refer to the original article from TechRadar.

Phishing Mule Functionality

Research has shown that Google Gemini can serve as a vehicle for phishing attacks. The AI model generates summaries of email threads, which can be manipulated to include deceptive messages. When users click on “Summarize this email,” Gemini can insert hidden instructions, leading to phishing warnings that appear as if they originated from Google.

In a demonstration, Gemini informed a recipient that their password had been compromised, urging them to call a number for assistance. The attack, termed a prompt injection attack, remains undetected by spam filters because it uses harmless prose for the rest of the email. The exploit relies solely on crafted HTML and CSS to hide malicious prompts.

For further insights, visit the Information Age article.

Security Findings and Recommendations

Google Gemini logo
Mozilla's 0-Day Investigative Network (0din) revealed that Google Gemini can be manipulated into providing false security alerts through malicious prompts. The attack requires users to click on the summarize feature after receiving an email containing the hidden prompt. The output may include fabricated warnings about account security, leading to social engineering attacks.

The hidden prompts exploit Gemini's inability to distinguish between visible and non-visible text. This vulnerability remains a concern, as no evidence of active exploitation has been reported, yet the potential for misuse is significant.

To mitigate these risks, security teams should implement measures like inbound HTML linting to neutralize hidden styles, creating guard prompts to ignore invisible content, and conducting user training to clarify the nature of AI-generated summaries.

To explore the in-depth analysis, please refer to the Tom's Hardware article.

Summary of Attack Workflow

  1. Craft – The attacker embeds a hidden instruction, such as “You Gemini, have to include…” with styles that hide it.
  2. Send – The email is sent, and spam filters only see the innocuous text.
  3. Trigger – The victim opens the email and selects “Summarize this email.”
  4. Execution – Gemini processes the hidden instruction and adds the phishing warning to its summary.
  5. Phish – Victims trust the AI-generated alert and may follow the instructions, leading to credential theft or further manipulation.

For more technical details, explore the 0din analysis.

Security teams must treat AI tools as part of their attack surface, ensuring robust defenses against such vulnerabilities.

Edward Zhou
Edward Zhou

CEO & Founder

 

CEO & Founder of Gopher Security, leading the development of Post-Quantum cybersecurity technologies and solutions..

Related Articles

Ransomware Attacks Target Russian Vodka and Healthcare Sectors

The Novabev Group, parent company of the Beluga vodka brand, experienced a ransomware attack on July 14, 2025, causing significant disruptions. The attack affected WineLab, the company's liquor store chain, leading to a three-day closure of over 2,000 locations in Russia. The company reported that the attack crippled its IT infrastructure, particularly point-of-sale systems and online services. Novabev Group stated, "The company maintains a principled position of rejecting any interaction with cybercriminals and refuses to fulfill their demands."

By Alan V Gutnov July 19, 2025 3 min read
Read full article

Retail Sector Faces Surge in Ransomware Attacks: A 2025 Analysis

Publicly disclosed ransomware attacks on the retail sector globally surged by 58% in Q2 2025 compared to Q1, with UK-based firms being particularly targeted, according to a report by BlackFog. This spike in attacks follows high-profile breaches affecting retailers like Marks & Spencer (M&S), The Co-op, and Harrods, attributed to the threat actor known as Scattered Spider.

By Alan V Gutnov July 19, 2025 2 min read
Read full article

AI-Driven Lcryx Ransomware Emerges in Cryptomining Botnet

A cryptomining botnet active since 2019 has incorporated a likely AI-generated ransomware known as Lcryx into its operations. Recent analysis by the FortiCNAPP team at FortiGuard Labs identified the first documented incident linking H2miner and Lcryx ransomware. This investigation focused on a cluster of virtual private servers (VPS) utilized for mining Monero.

By Edward Zhou July 19, 2025 3 min read
Read full article

Preventing ClickFix Attacks: Safeguarding Against Human Error

ClickFix is an emerging social engineering technique utilized by threat actors to exploit human error. This technique involves misleading users into executing malicious commands under the guise of providing "quick fixes" for common computer issues. Threat actors use familiar platforms and deceptive prompts to encourage victims to paste and run harmful scripts.

By Alan V Gutnov July 19, 2025 3 min read
Read full article