How selecting the incorrect Copilot link might jeopardize your information.
Fox News
Artificial intelligence assistants are designed to simplify daily activities. Applications like Microsoft Copilot can assist with composing emails, summarizing texts, and providing answers based on the information in your account. However, security experts are now cautioning that a single malicious link may turn that ease of use into a privacy issue.
A recently identified method of attack illustrates how hackers could seize control of a Copilot session and extract data without displaying any red flags on your screen.
Sign up for my FREE CyberGuy Report
Receive my top technology tips, crucial security notifications, and exclusive offers directly to your inbox. Additionally, you’ll gain immediate access to my Ultimate Scam Survival Guide – free upon subscribing to my CYBERGUY.COM newsletter.
Since Copilot remains connected to your signed-in Microsoft account, hackers can discreetly utilize your ongoing session to access information in the background.
ILLINOIS DHS DATA BREACH EXPOSES 700K RESIDENTS' RECORDS
Researchers at Varonis discovered a tactic they've named "Reprompt." Essentially, it demonstrates how criminals could insert commands into an ordinary-looking Copilot link, causing the AI to act according to their demands.
Here's the key point. Microsoft Copilot is linked to your Microsoft account. Depending on its usage, Copilot can access your previous conversations, queries you've posed, and specific personal information associated with your account. Usually, Copilot includes safeguards to avert sensitive data exposure. Reprompt has revealed a way to bypass certain of these defenses.
The assault commences with just a click. If you engage a specially designed Copilot link shared via email or messaging, Copilot can immediately interpret concealed instructions embedded within that link. You don't need to download anything, and there are no pop-ups or alerts. After that initial click, Copilot can continue to follow commands in the background using your already active session. Even closing the Copilot tab does not instantly halt the attack, as the session remains open for a time.
Varonis discovered that Copilot accepts queries through a parameter within its web URL. Attackers can conceal commands within that URL and prompt Copilot to execute them as soon as the page is accessed.
This alone wouldn't suffice, since Copilot makes attempts to restrict information leaks. The researchers amalgamated multiple techniques to bypass these safeguards. Initially, they directly fed commands into Copilot through the link itself. This permitted Copilot to obtain data it typically should not disclose.
Secondly, they utilized a "try twice" strategy. Copilot enforces stricter scrutiny on its first response to a request. By instructing Copilot to repeat the action and verify itself again, the researchers found those safeguards could fail with the second request.
Thirdly, they demonstrated that Copilot could persist in receiving subsequent commands from a remote server managed by the attacker. Each reply from Copilot facilitated the creation of the next request, allowing data to be discreetly transmitted piece by piece. The outcome is an imperceptible exchange where Copilot continues operating for the attacker using your session. From your viewpoint, nothing appears amiss.
MICROSOFT SOUNDS ALARM AS HACKERS TURN TEAMS PLATFORM INTO 'REAL-WORLD DANGERS' FOR USERS
Varonis responsibly informed Microsoft about the vulnerability, and the company addressed it during the January 2026 Patch Tuesday updates. No evidence suggests that Reprompt was leveraged in actual attacks prior to the resolution. Nevertheless, this investigation is notable as it highlights a more significant issue. AI assistants possess access, memory, and the capability to act on your instruction. This combination enhances their effectiveness but also poses a risk if safeguards falter. As researchers noted, the peril amplifies when autonomy and access intertwine.
It’s also crucial to mention that this flaw only impacted Copilot Personal. Microsoft 365 Copilot, utilized by businesses, provides additional security measures like auditing, data loss prevention, and administrative controls.
"We appreciate Varonis Threat Labs for responsibly reporting this issue," a Microsoft spokesperson relayed to CyberGuy. "We have deployed protections addressing the described scenario and are implementing further steps to enhance defenses against similar methods as part of our multi-layered security strategy."
Even with the remedy in place, these practices will aid in safeguarding your data as AI applications become increasingly prevalent.
Security updates only shield you if they are applied. Attacks like Reprompt exploit vulnerabilities for which patches are already available. Ensure automatic updates are enabled for Windows, Edge, and other browsers to avoid delaying essential fixes. Procrastinating for weeks or months opens a window where attackers can exploit known vulnerabilities.
If you wouldn't click on a random password reset link, avoid clicking unexpected Copilot links as well. Even links that appear legitimate can be manipulated. If someone sends you a Copilot link, pause and consider whether you were anticipating that. When in doubt, access Copilot manually.
Even after Microsoft's resolution, the findings underscore the significance of limiting data exposure and monitoring account actions as AI tools develop.
A password manager generates and securely stores strong, unique passwords for every service you utilize. If hackers manage to obtain session details or indirectly steal credentials, unique passwords prevent one breach from compromising your entire online presence. Many password managers also notify you if a site seems suspicious or counterfeit.
Next, verify if your email has been compromised in previous breaches. Our top-rated password manager offers a built-in breach scanner that checks if your email address or passwords have appeared in recognized leaks. If you find a match, promptly change any reused passwords and secure those accounts with new, unique credentials.
Explore the best expert-reviewed password managers of 2026 at Cyberguy.com.
Two-factor authentication (2FA) introduces an additional layer of security, even if attackers achieve partial access to your session. It mandates an extra verification step, typically through an app or device, making it significantly more challenging for someone else to impersonate you within Copilot or other Microsoft services.
Reduce the amount of personal information available online
Data broker websites collect and resell personal information such as your email, phone number, home address, and even employment history. If an AI tool or account session is exploited, that publicly accessible data can exacerbate the impact. Utilizing a data-removal service aids in deleting this information from broker databases, minimizing your digital footprint and restricting what attackers can collect.
Check out my best recommendations for data removal services and receive a free scan to see if your personal data is already available on the internet at Cyberguy.com.
Obtain a free scan to find out if your personal information is already accessible online: Cyberguy.com.
Modern antivirus solutions do more than examine files. They assist in identifying phishing links, harmful scripts, and suspicious browser behavior. Since Reprompt-style attacks begin with a mere click, having real-time protection can prevent harm before it occurs, especially when assaults appear genuine.
The most effective means to shield yourself from malicious links that install malware, potentially compromising your private details, is to ensure robust antivirus software is set up on all your devices. This protection can also alert you to phishing emails and ransomware scams, safeguarding your personal data and digital assets.
Discover my selections for the best 2026 antivirus protection winners for your Windows, Mac, Android, and iOS devices at Cyberguy.com.
Examine your Microsoft account activity for unfamiliar logins, locations, or actions. Review which services Copilot can access and revoke any permissions you no longer require. These checks are quick but can expose issues early, before attackers have a chance to cause significant harm. Here's how:
Visit account.microsoft.com and log in to your Microsoft account.
Select Security, then click View my sign-in activity and confirm your identity if prompted.
Inspect each login for unfamiliar locations, devices, or failed sign-in attempts.
If anything seems out of the ordinary, choose This wasn't me or Secure your account, then immediately change your password and activate two-step verification.
Visit account.microsoft.com/devices and remove any devices you no longer recognize or use.
In Microsoft Edge, navigate to Settings > Appearance > Copilot and Sidebar > Copilot and disable Allow Microsoft to access page content if you wish to restrict Copilot's access.
Review applications linked to your Microsoft account and revoke permissions that are no longer necessary.
A single Copilot link can harbor concealed instructions that activate at the moment of clicking, without any notifications or alerts.
Avoid granting AI assistants extensive permissions like "manage whatever is necessary." Broad permissions facilitate the influence of hidden commands on outcomes. Keep requests specific and task-oriented. The less autonomy an AI has, the more challenging it is for malicious commands to direct it quietly.
Reprompt does not imply Copilot is unsafe to use, but it illustrates the level of trust these tools necessitate. When an AI assistant has the capability to think, remember, and take action for you, even one bad click can be significant. Maintaining your system updates and being discerning about what you click remains just as crucial in the AI era as it was in the past.
Do you feel at ease allowing AI assistants to access your personal information, or does this make you more cautious? Share your thoughts with us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Receive my top technology tips, urgent security notifications, and exclusive offers directly to your inbox. Additionally, you’ll gain immediate access to my Ultimate Scam Survival Guide – free upon subscribing to my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
Kurt "CyberGuy" Knutsson is an award-winning tech journalist who deeply appreciates technology, equipment, and gadgets that enhance life through his contributions for Fox News & FOX Business starting mornings on "FOX & Friends." Have a tech question? Sign up for Kurt’s free CyberGuy Newsletter, share your insights, a story idea, or feedback at CyberGuy.com.