• Support
  • (+84) 246.276.3566 | contact@eastgate-software.com
  • Request a Demo
  • Privacy Policy
English
English 日本語 Deutsch
Eastgate Software A Global Fortune 500 Company's Strategic Partner
  • Home
  • Company
  • Services
    • Business Process Optimization
    • Custom Software Development
    • Systems Integration
    • Technology Consulting
    • Cloud Services
    • Data Analytics
    • Cybersecurity
    • Automation & AI Solutions
  • Case Studies
  • Blog
  • Resources
    • Life
    • Ebook
    • Tech Enthusiast
  • Careers
CONTACT US
Eastgate Software
  • Home
  • Company
  • Services
    • Business Process Optimization
    • Custom Software Development
    • Systems Integration
    • Technology Consulting
    • Cloud Services
    • Data Analytics
    • Cybersecurity
    • Automation & AI Solutions
  • Case Studies
  • Blog
  • Resources
    • Life
    • Ebook
    • Tech Enthusiast
  • Careers
CONTACT US
Eastgate Software
Home Tech Enthusiast
August 28, 2025

AI Attack Uses Image Downscaling to Steal User Data

AI

AI Attack Uses Image Downscaling to Steal User Data

Security researchers at Trail of Bits have uncovered a new vulnerability in AI systems. This vulnerability exploits image downscaling to hide malicious prompts capable of stealing user data. The method demonstrates how attackers can embed invisible instructions into high-resolution images. These instructions only become visible when the image is resampled — a common preprocessing step in AI pipelines. 

The attack builds on a concept first proposed in a 2020 USENIX paper by TU Braunschweig researchers. It extends the theory into a practical exploit against large language model (LLM) applications. Trail of Bits researchers Kikimora Morozova and Suha Sabi Hussain showed that hidden patterns emerge when images are automatically downscaled. Algorithms such as nearest neighbor, bilinear, or bicubic interpolation can create these patterns, which AI models interpret as text. 

In one proof-of-concept, the team used bicubic downscaling to make specific dark regions of an image reveal hidden instructions. These instructions were then executed by Google’s Gemini CLI through Zapier MCP. This enabled the exfiltration of Google Calendar data to an arbitrary email address without explicit user approval. 

Key systems confirmed vulnerable to the attack include: 

  • Google Gemini CLI and Vertex AI Studio 
  • Gemini web interface and API 
  • Google Assistant on Android 
  • Third-party tools such as Genspark 

To support testing, Trail of Bits released Anamorpher, an open-source tool that generates malicious images tailored for different downscaling methods. 

As mitigation, researchers recommend restricting image dimensions, providing users with previews of downscaled images, and requiring explicit confirmation for sensitive tool calls. They further emphasize adopting secure design patterns to defend against multimodal prompt injection. 

This discovery highlights the growing complexity of safeguarding AI systems, particularly as attackers find new ways to manipulate inputs across text and image modalities. 

 

Source: 

https://www.bleepingcomputer.com/news/security/new-ai-attack-hides-data-theft-prompts-in-downscaled-images/  

Tags: Aicybersecurity
Something went wrong. Please try again.
Thank you for subscribing! You'll start receiving Eastgate Software's weekly insights on AI and enterprise tech soon.
ShareTweet

Categories

  • AI (202)
  • Application Modernization (9)
  • Case study (34)
  • Cloud Migration (46)
  • Cybersecurity (29)
  • Digital Transformation (7)
  • DX (17)
  • Ebook (11)
  • ERP (39)
  • Fintech (27)
  • Fintech & Trading (1)
  • Intelligent Traffic System (1)
  • ITS (5)
  • Life (23)
  • Logistics (1)
  • Low-Code/No-Code (32)
  • Manufacturing Industry (1)
  • Microservice (17)
  • Product Development (36)
  • Tech Enthusiast (314)
  • Technology Consulting (68)
  • Uncategorized (2)

Tell us about your project idea!

Sign up for our weekly newsletter

Stay ahead with Eastgate Software, subscribe for the latest articles and strategies on AI and enterprise tech.

Something went wrong. Please try again.
Thank you for subscribing! You'll start receiving Eastgate Software's weekly insights on AI and enterprise tech soon.

Eastgate Software

We Drive Digital Transformation

Eastgate Software 

We Drive Digital Transformation.

  • Services
  • Company
  • Resources
  • Case Studies
  • Contact
Services

Case Studies

Company

Contact

Resources
  • Youtube
  • Facebook
  • Linkedin
  • Outlook
  • Twitter
DMCA.com Protection Status

Copyright © 2024.  All rights reserved.

  • Home
  • Company
  • Services
    • Business Process Optimization
    • Custom Software Development
    • Systems Integration
    • Technology Consulting
    • Cloud Services
    • Data Analytics
    • Cybersecurity
    • Automation & AI Solutions
  • Case Studies
  • Blog
  • Resources
    • Life
    • Ebook
    • Tech Enthusiast
  • Careers

Support
(+84) 246.276.35661 contact@eastgate-software.com

  • Request a Demo
  • Privacy Policy
Book a Free Consultation!