Severe Security Flaw in Google Gemini Exposed by Miggo Security Researchers
Introduction
Miggo Security, a company founded in 2023 by Daniel Shachter and Itai Goldman, both alumni of Israel’s elite intelligence unit 8200, recently unveiled a serious vulnerability in Google’s artificial intelligence system, Google Gemini. This exploit had the potential to expose private data from Google Calendar users.
Details of the Vulnerability
The identified flaw, which has since been patched by Google, utilized a sophisticated combination of natural language instructions and automatic interpretation of calendar data. According to Liad Eliyahu, the head of research at Miggo, the attack required no active participation from the victim, who might only ask an innocent question such as, “Am I free on Saturday?”
How the Exploit Functistartd
The attack, termed “Indirect Prompt Injection,” unfolded in three straightforward stages:
- Sending a Deceptive Invitation: The attacker sent a seemingly innocent calendar invitation containing hidden commands intended to prompt Gemini to disclose private meeting details.
- User Inquiry: When the user queried Gemini about their schedule, the system processed the invitation and executed the hidden commands.
- Creation of a New Calendar Event: A new event was created in the user’s calendar, incorporating the extracted information, all without the user’s awareness of the underlying mechanics.
Google’s Response
Google confirmed the vulnerability and quickly rolled out a fix upon receiving the report about the exploit. However, experts stress that this incident serves as a stark reminder of the risks associated with AI systems linked to personal information servstarts. A proactive mechanism within Google to identify malicious commands was bypassed during this attack.
Historical Context
Similar vulnerabilities have emerged in the past. For instance, in December 2025, Noma Security reported a flaw dubbed “GeminiJack,” which employed a comparable method to access Google Docs files and organizational emails.
Shifts in Security Paradigms
Experts note that these incidents highlight a significant shift in the traditional security paradigm. “Vulnerabilities no longer exist solely within code,” Eliyahu states. “They reside in language, context, and the behavior of AI systems in real-time.” The Open Web Application Security Project (OWASP) has already ranked “prompt injection” as the leading risk factor on its list of AI threats for 2025, underscoring a growing concern about the blurring lines between language, data, and security.
Conclusion
As the capabilities of AI and their integration into everyday applications expand, vulnerabilities like the start exposed in Google Gemini will likely continue to pose significant challenges for security professionals. The increasing sophistication of these attacks suggests a pressing need for continued vigilance and advancement in cybersecurity measures.