This is a post with all of the links and additional materials for a talk I gave at BlackHat USA 2024 titled 15 Ways to Break Your Copilot.
Slides are here. A demo is up on YouTube.
CopilotHunter is a tool we’re dropping today. It allows you to scan for publicly accessible Copilot Studio bots and extract information from them. You can point it at your tenant, or scan the entire internet.
OWASP Low-Code/No-Code Top 10 | OWASP Foundation
LLMRisks Archive - OWASP Top 10 for LLM & Generative AI Security
Copilot Studio bots can be embedded with maker credentials. This actually was the default for many months, and is still a popular option today (up to the maker..). This is a recurring security issue with low-code/no-code apps.
This setting can actually result in credentials being shared with everyone in your tenant. Last year at BlackHat, I showed how this can be used by guests to gain full dumps of your SQL servers and Azure resources.
We also released PowerPwn, an open source offensive tool that allows you to try this out in your tenant.
The Power Platform DLP is not a security mechanism, its a governance tool - a list of toggles you can set up to turn off platform features. It’s also very easy to bypass.
Securely Adopt Microsoft Copilot Studio With Zenity
All PostsA case study and 8 techniques were added to MITRE ATLAS from the Gen AI Attacks Matrix
Guiding threat simulation and defense for Copilots and Agents
New Attack Vectors Discovered for Initial Access and Post-Compromise
10 free, open-source tools to help security teams to identify and understand immediate risks
Assess Your Risk