Phone : +91 95 8290 7788 | Email : sales@itmonteur.net

Register & Request Quote | Submit Support Ticket

Home » Cyber Security News » Vulnerabilities & Exploits » Tenable exposes AI flaws in Google gemini that could have let hackers steal data from millions

Tenable exposes AI flaws in Google gemini that could have let hackers steal data from millions

Tenable exposes AI flaws in Google gemini that could have let hackers steal data from millions

https://etimg.etb2bimg.com/thumb/msid-124284799,imgsize-39892,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/google-gemini-ai-vulnerabilities-exposed-by-tenable.jpg


Tenable, the exposure management company, has identified three vulnerabilities in Google’s Gemini suite, collectively dubbed the Gemini Trifecta. These flaws, now remediated, exposed users to significant privacy risks that could have enabled attackers to manipulate Gemini’s behavior and silently steal sensitive data such as location information and saved user memories.

The Gemini Trifecta worked across three core parts of the Gemini suite, each exposing users in different but equally dangerous ways. In Gemini Cloud Assist, poisoned log entries could be planted so that when users later interacted with Gemini, the system would unknowingly follow malicious instructions. In the Gemini Search Personalization Model, attackers could silently inject queries into a victim’s browser history, which Gemini then treated as trusted context, allowing sensitive data like saved information and location to be siphoned off. And in the Gemini Browsing Tool, attackers could trick Gemini into making hidden outbound requests that embedded private user data, effectively delivering it straight to an attacker-controlled server.

Together, these three flaws created invisible doors into Gemini, allowing attackers to hijack its behavior and steal valuable data without a user ever realizing it. Put simply, the Gemini Trifecta showed that attackers didn’t need direct access, malware, or even phishing emails to succeed, as Gemini itself became the attack vehicle, raising the stakes for every user and organization depending on AI-driven tools.

According to Tenable Research, the main problem was that Gemini’s integrations didn’t properly distinguish between safe user input and attacker-supplied content. This meant poisoned logs, injected search history entries, or hidden web content could all be treated as trusted context by Gemini, effectively turning routine features into hidden attack channels.

“Gemini draws its strength from pulling context across logs, searches, and browsing. That same capability can become a liability if attackers poison those inputs,” said Liv Matan, Senior Security Researcher at Tenable.

“The Gemini Trifecta shows how AI platforms can be manipulated in ways users never see, making data theft invisible and redefining the security challenges enterprises must prepare for. Like any powerful technology, large language models (LLMs) such as Gemini bring enormous value, but they remain susceptible to vulnerabilities. Security professionals must move decisively, locking down weaknesses before attackers can exploit them and building AI environments that are resilient by design, not by reaction. This isn’t just about patching flaws; it’s about redefining security for an AI-driven era where the platform itself can become the attack vehicle.”

Potential Impact of Exploiting the Gemini Trifecta

If exploited before remediation, the Gemini Trifecta could have allowed attackers to:

  • Silently insert malicious instructions into logs or search history.
  • Exfiltrate sensitive user information such as saved data and location history.
  • Abuse cloud integrations to pivot into wider cloud resources.
  • Trick Gemini into sending users data to attacker-controlled servers through its browsing tool.

Google has remediated all three vulnerabilities, and no additional action is required from users.

Recommendations for Security Teams

While no user action is required, Tenable advises security professionals to:

  • Treat AI-driven features as active attack surfaces, not passive tools.
  • Audit logs, search histories, and integrations regularly to detect poisoning or manipulation attempts.
  • Monitor for unusual tool executions or outbound requests that could indicate exfiltration.
  • Test AI-enabled services for resilience against prompt injection and strengthen defenses proactively.

“This vulnerability disclosure underscores that securing AI isn’t just about fixing individual flaws,” Matan emphasized. “It’s about anticipating how attackers could exploit the unique mechanics of AI systems and building layered defenses that prevent small cracks from becoming systemic exposures.”

Note: The themes explored here align with the mission of the Making AI Work Summit & Awards. As India’s flagship AI summit and event, it brings together leaders, developers, and enterprises pushing AI into action. The AI Awards India, part of this platform, recognise those showcased at the Summit who are turning innovation into measurable, responsible impact—making this a unified celebration of applied AI.

  • Published On Oct 4, 2025 at 09:00 AM IST

Join the community of 2M+ industry professionals.

Subscribe to Newsletter to get latest insights & analysis in your inbox.

All about ETCISO industry right on your smartphone!




Information Security - InfoSec - Cyber Security - Firewall Providers Company in India

 

 

 

 

 

 

 

 

 

 

 

 

What is Firewall? A Firewall is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies. At its most basic, a firewall is essentially the barrier that sits between a private internal network and the public Internet.

 

Secure your network at the gateway against threats such as intrusions, Viruses, Spyware, Worms, Trojans, Adware, Keyloggers, Malicious Mobile Code (MMC), and other dangerous applications for total protection in a convenient, affordable subscription-based service. Modern threats like web-based malware attacks, targeted attacks, application-layer attacks, and more have had a significantly negative effect on the threat landscape. In fact, more than 80% of all new malware and intrusion attempts are exploiting weaknesses in applications, as opposed to weaknesses in networking components and services. Stateful firewalls with simple packet filtering capabilities were efficient blocking unwanted applications as most applications met the port-protocol expectations. Administrators could promptly prevent an unsafe application from being accessed by users by blocking the associated ports and protocols.

 

Firewall Firm is an IT Monteur Firewall Company provides Managed Firewall Support, Firewall providers , Firewall Security Service Provider, Network Security Services, Firewall Solutions India , New Delhi - India's capital territory , Mumbai - Bombay , Kolkata - Calcutta , Chennai - Madras , Bangaluru - Bangalore , Bhubaneswar, Ahmedabad, Hyderabad, Pune, Surat, Jaipur, Firewall Service Providers in India

Sales Number : +91 95 8290 7788 | Support Number : +91 94 8585 7788
Sales Email : sales@itmonteur.net | Support Email : support@itmonteur.net

Register & Request Quote | Submit Support Ticket