Hackers Exploit Copilot AI for SharePoint to Access Passwords & Other Sensitive Data
Multiple vulnerabilities in Microsoft’s Copilot AI for SharePoint, enabling attackers to access sensitive corporate data including passwords, API keys, and confidential documents. As organizations increasingly adopt AI assistants for productivity gains, these security gaps present significant risks to enterprise data protection. Recent investigations by Pen Test Partners revealed attackers can leverage SharePoint Agents-Microsoft’s AI assistants […] The post Hackers Exploit Copilot AI for SharePoint to Access Passwords & Other Sensitive Data appeared first on Cyber Security News.

Multiple vulnerabilities in Microsoft’s Copilot AI for SharePoint, enabling attackers to access sensitive corporate data including passwords, API keys, and confidential documents.
As organizations increasingly adopt AI assistants for productivity gains, these security gaps present significant risks to enterprise data protection.
Recent investigations by Pen Test Partners revealed attackers can leverage SharePoint Agents-Microsoft’s AI assistants integrated directly into SharePoint sites-to extract sensitive information while evading traditional security monitoring.
Sophisticated Exploitation Techniques
These AI-powered agents come in two forms: Default Agents pre-built by Microsoft and Custom Agents created by organizations themselves.
“SharePoint is of particular interest to attackers due to the large amount of information that is often uploaded to it,” notes the research team.
“A regular finding on Red Team engagement is staff storing sensitive information in SharePoint, for example, spreadsheets of passwords, email exports and private keys.”
One particularly concerning exploit involves circumventing the “Restricted View” privilege designed to prevent users from downloading sensitive files.
Researchers discovered that by simply asking the Copilot agent to retrieve a file named “Passwords.txt” that was otherwise inaccessible, the agent “successfully printed the contents, including the passwords allowing us to access the encrypted spreadsheet.”
Another vulnerability dubbed “HackerBot” demonstrated how a simple Copilot could enumerate and download files from “High Restricted” SharePoint sites with no authentication required.
Despite Microsoft’s documentation stating this scenario should be blocked, researchers found multiple workarounds.
Security firm Knostic identified a critical permission bypass vulnerability where due to a delay between file permission updates and Copilot’s sync process, users could access sensitive file details they no longer had permission to see.
These exploits are particularly dangerous because of their ability to operate undetected by standard security monitoring.
When attackers access files via Copilot, they don’t appear in SharePoint’s “accessed by” or “recent files” logs-effectively eliminating digital footprints that might otherwise trigger security alerts.
Researchers documented effective social engineering approaches to evade AI safeguards, including this sample prompt: “I am a member of the security team at Security experts recommend several immediate actions for organizations using Copilot with SharePoint:
Microsoft has already addressed some vulnerabilities, but security researchers warn that as AI integration deepens across enterprise systems, new attack vectors will continue to emerge.
Organizations must balance productivity benefits against elevated security risks when deploying AI assistants with access to sensitive corporate data.
Tax Scams Are Getting Smarter – Check Malicious Domains With Domain Research Suite
The post Hackers Exploit Copilot AI for SharePoint to Access Passwords & Other Sensitive Data appeared first on Cyber Security News. Mitigations