EchoLeak: Zero-Click Vulnerability in Microsoft 365 Copilot

EchoLeak: Zero-Click Vulnerability in Microsoft 365 Copilot

What is the EchoLeak vulnerability in Microsoft 365 Copilot

A serious security flaw known as EchoLeak has brought renewed attention to the risks embedded in AI-powered productivity tools. The vulnerability affects Microsoft 365 Copilot, the generative AI assistant integrated across Word, Outlook, Teams, and other Microsoft applications used daily by millions of businesses across Europe.

What makes EchoLeak particularly dangerous is its zero-click nature. Unlike traditional attacks that require a user to open a malicious attachment or click a suspicious link, this vulnerability can be triggered without any direct interaction from the victim. The attack exploits how Copilot processes and retrieves data, allowing a threat actor to extract sensitive business information silently.

For European SMBs that have rapidly adopted Microsoft 365 Copilot to boost productivity, this discovery is a wake-up call. AI assistants now sit at the intersection of emails, documents, calendars, and internal communications — making them a high-value target for attackers.

How EchoLeak works and why zero-click attacks matter

The EchoLeak vulnerability belongs to a growing class of attacks targeting large language model (LLM) integrations in enterprise software. At its core, the exploit leverages prompt injection techniques — a method where malicious instructions are hidden inside seemingly normal content such as emails, shared documents, or meeting notes.

When Microsoft 365 Copilot processes this content, it inadvertently follows the hidden instructions. The attacker can then force Copilot to leak confidential data — customer records, financial figures, internal strategy documents, authentication tokens — through covert channels. The victim never sees a warning, never clicks a link, and may never realise data has left the organisation.

Why this is different from traditional phishing

Traditional phishing campaigns rely on human error. An employee must actively fall for the bait. Zero-click vulnerabilities like EchoLeak remove the human element entirely. The attack surface shifts from the user to the AI system itself, which processes data automatically and at scale.

This represents a fundamental change in the threat landscape. Security awareness training, while still essential, cannot protect against an attack that never presents itself to the user. The vulnerability sits in the software layer, not in human behaviour.

The prompt injection problem

Security researchers have been warning about prompt injection risks in AI tools since 2023. Studies from organisations like OWASP have placed prompt injection at the top of their list of critical risks for LLM applications. Microsoft has acknowledged and patched several related vulnerabilities in Copilot throughout 2024 and into 2025, including attacks using ASCII smuggling and cross-plugin request forgery.

EchoLeak is the latest in this series, but its zero-click delivery mechanism makes it one of the most concerning to date.

What data is at risk for European businesses

Microsoft 365 Copilot has access to a remarkably broad range of business data by design. It reads emails in Outlook, documents in SharePoint and OneDrive, conversations in Teams, and calendar entries. For many organisations, this means Copilot can access virtually everything — from HR records and financial reports to client contracts and intellectual property.

A successful EchoLeak exploit could expose:

  • Client and customer personal data, triggering GDPR notification obligations under Articles 33 and 34
  • Financial records and forecasts that could be used for competitive advantage or extortion
  • Internal communications containing strategic decisions, legal discussions, or M&A activity
  • Authentication credentials and tokens that could enable further lateral movement within the network

For Italian and European SMBs, the GDPR implications alone are significant. Under current regulations, a data breach involving personal data must be reported to the relevant supervisory authority — in Italy, the Garante per la protezione dei dati personali — within 72 hours. Failure to comply can result in fines of up to 20 million euros or 4% of annual global turnover.

According to IBM’s Cost of a Data Breach Report 2024, the average cost of a data breach in the European Union reached approximately 4.3 million euros, with SMBs disproportionately affected relative to their revenue.

The EchoLeak vulnerability highlights that adopting AI productivity tools without updating your security posture creates blind spots. Here are concrete steps European SMBs should consider.

Review and restrict Copilot permissions

Not every employee needs Copilot access to every data source. Use Microsoft Purview and sensitivity labels to classify documents and restrict what Copilot can read. Apply the principle of least privilege: Copilot should only access the data each role genuinely requires.

Keep Microsoft 365 updated

Microsoft regularly releases patches for Copilot-related vulnerabilities. Ensure automatic updates are enabled and that your IT team or managed service provider monitors the Microsoft Security Response Center (MSRC) for advisories. Delayed patching remains one of the primary reasons SMBs are compromised — a 2024 Clusit report found that over 60% of successful attacks against Italian organisations exploited known, already-patched vulnerabilities.

Implement data loss prevention (DLP) policies

Configure DLP policies in Microsoft 365 to detect and block unusual data transfers. Monitor for anomalous Copilot activity, particularly large-scale data retrieval or external sharing patterns that deviate from normal business operations.

Assess your AI governance framework

The EU AI Act, which entered into force in August 2024, introduces new obligations for organisations using AI systems. While Microsoft 365 Copilot likely falls under the limited-risk category, businesses should document their AI usage, conduct risk assessments, and ensure transparency with employees about how AI tools process their data.

Work with a qualified security partner

Most SMBs lack the internal resources to monitor AI-specific threats continuously. Partnering with a managed security service provider (MSSP) that understands the European regulatory landscape — including GDPR, NIS2, and the AI Act — can bridge that gap effectively.

The bigger picture: AI adoption requires AI-aware security

EchoLeak is not an isolated incident. It is part of a broader pattern where the speed of AI adoption outpaces the development of adequate security controls. Gartner has projected that by 2026, AI-driven attacks will be involved in over 30% of all enterprise breaches, up from less than 5% in 2023.

For European SMBs, the message is clear. Microsoft 365 Copilot and similar AI tools deliver genuine productivity gains, but they also expand your attack surface in ways that traditional firewalls and antivirus solutions were never designed to address. The organisations that thrive will be those that treat AI security not as an afterthought, but as a core component of their digital strategy.

Staying informed, patching promptly, restricting access, and working with knowledgeable partners are not optional measures — they are the baseline for operating safely in an AI-augmented business environment.


Need support on this topic? Contact us for a free consultation — let’s assess your company’s situation together.

Stay updated every week on cybersecurity, AI and technology for SMBs: subscribe to our newsletter.

💬

Need support on this topic?

Let’s assess your company’s situation together. First consultation is free.

Contact us
📩

Stay updated every week

Cybersecurity, AI and technology for SMBs. No spam, only useful content.

Subscribe to newsletter