Posted in

Promptware Attack: Hackers Can Use Google Calendar to Spy via Zoom

Imagine this: you check your Google Calendar, and a seemingly harmless meeting invite appears. You ask your AI assistant, “What’s on my calendar today?”—and unbeknownst to you, your device begins streaming your camera and audio to a hacker via Zoom.

This scenario isn’t science fiction. Researchers from Ben-Gurion University, Tel Aviv University, and Harvard have discovered a new class of cyberattack called Promptware, capable of hijacking AI assistants through indirect prompt injection. Over the next few minutes, you’ll learn how this attack works, why it’s dangerous, and what security teams and users can do to mitigate it.


What Is Promptware?

Promptware is a malicious AI exploit that leverages the growing autonomy of personal assistants like Google Gemini. Unlike traditional malware, Promptware:

  • Requires no software installation
  • Exploits AI systems via text instructions hidden in normal-looking inputs
  • Can control applications, smart devices, and connected hardware

Bruce Schneier and Ben Nassi coined the term “Promptware” to describe this evolution of AI exploitation, where the AI itself becomes a “sleeper agent” for hackers.

Key Threat Characteristics:

  • Persistence: Runs silently in memory, awaiting triggers.
  • Lateral movement: Can open apps like Zoom or interact with IoT devices.
  • Physical actions: Can unlock doors, open windows, or trigger connected devices.

How the Promptware Calendar Attack Works

The researchers described a four-step kill chain in their paper “Invitation Is All You Need”:

StageDescription
TrapHacker sends a Google Calendar invite containing a hidden malicious command (Promptware) in the event description.
InfectionVictim’s AI assistant reads the calendar event when asked, unintentionally executing the hidden command.
TriggerThe malicious command waits for an innocent user phrase such as “Thank you” or “Great.”
SpyOnce triggered, the assistant opens Zoom and joins a hacker-controlled meeting, streaming video and audio.

Visualization: Imagine your AI assistant as a trusted intermediary. You give it a routine command, but hidden instructions covertly hijack your device.


Real-World Risks

Promptware attacks demonstrate that AI assistants can be weaponized like malware:

  • Video and audio espionage: Hackers can watch victims without installing software.
  • Smart home compromise: Calendar invites could open doors, windows, or manipulate connected appliances.
  • Email and data theft: Assistants can be coerced to forward sensitive information.
  • Stealth operation: Victims are unaware, as the attack is triggered by mundane phrases.

The implications for CISOs, SOC teams, and IT managers are profound. As AI integrates into workplaces and homes, the attack surface expands exponentially.


Common Misconceptions

1. AI assistants are just chat tools.
False. They can execute commands, control apps, and access hardware, making them a potential attack vector.

2. You need malware to be hacked.
False. Promptware exploits text-based AI commands—no virus or install is required.

3. Calendar invites are harmless.
False. Even unaccepted invites can contain hidden commands that AI may process.


Best Practices to Mitigate Promptware Threats

  • Verify sender legitimacy: Avoid interacting with calendar invites from unknown sources.
  • Limit AI assistant permissions: Restrict AI access to sensitive apps, IoT devices, and camera/microphone functions.
  • Monitor unusual app activity: Detect unexpected Zoom sessions, smart device actions, or background processes.
  • User education: Train teams to be aware of AI-powered attacks and indirect prompt injection risks.
  • Patch and update AI software: Ensure AI assistants receive security updates promptly.

Pro Tip: Apply zero trust principles to AI assistants—never allow automatic execution of actions without user verification.


Tools, Frameworks, and Standards

Tool / FrameworkUse Case
Microsoft Defender / Google Safe BrowsingDetect suspicious calendar links and phishing attempts
MITRE ATT&CKMap tactics like Initial Access (T1566) and Command and Control (T1071)
NIST Cybersecurity Framework (CSF)Guide policies for emerging AI-assisted threat vectors
ISO/IEC 27001Implement security management for AI-connected devices and enterprise IoT

Expert Insights

  1. Risk Analysis: Promptware bypasses traditional endpoint defenses because the attack is mediated by AI logic, not malicious code.
  2. Compliance: Organizations with sensitive data must consider AI exploits under GDPR, HIPAA, and PCI DSS, particularly if video or audio streams are captured without consent.
  3. Strategic Recommendation: Security teams should integrate AI behavior monitoring into incident response plans and update policies for AI-enabled endpoints.

FAQs

Q1: Can Promptware attacks occur on any AI assistant?
A: Any AI assistant that processes calendar events, emails, or text instructions could potentially be exploited, depending on the system’s capabilities.

Q2: Does the victim need to click the invite?
A: No. The AI reads event content automatically, so merely processing the calendar can trigger the attack.

Q3: How can organizations prevent this?
A: Limit AI permissions, monitor unusual device activity, educate users, and enforce zero trust policies for AI apps.

Q4: Are only Zoom meetings at risk?
A: No. Any app controlled by the AI assistant, including smart home devices, could be compromised.

Q5: Has Google mitigated this vulnerability?
A: Yes. Google deployed mitigations after researchers reported the findings, but vigilance remains critical.


Conclusion

Promptware represents a new frontier in cybersecurity: AI-powered attacks that bypass traditional malware detection, exploit calendar invites, and control devices silently.

Key Takeaways:

  • Treat AI assistants like endpoints; apply least privilege and zero trust principles.
  • Educate users on calendar invite risks and indirect prompt injection.
  • Continuously monitor AI-driven apps and smart devices for anomalous activity.

Next Step: Conduct an AI risk assessment for your organization’s endpoints and smart devices to prevent Promptware-style attacks.

Leave a Reply

Your email address will not be published. Required fields are marked *