Particle.news

Download on the App Store

Google Fixes Gemini Calendar Bug That Let Malicious Invites Hijack Data

Deployment of new safeguards follows a patch that closes a Calendar invite loophole exploited by prompt-injection attacks.

The Google logo on a background of circles
Image
Image

Overview

  • Google credited Ben Nassi’s team for responsibly disclosing a Calendar invite vulnerability that could hijack Gemini and leak sensitive user data.
  • The flaw allowed attackers to embed hidden instructions in event titles or beyond the five-event view to exfiltrate emails, calendar entries and control smart-home devices.
  • Researchers demonstrated that routine prompts like “thanks” can trigger Gemini to execute malicious commands, underscoring the stealth nature of promptware exploits.
  • Gemini’s integration across Gmail, Google Home, Android and Workspace magnifies the threat by giving the assistant broad cross-service permissions.
  • Security experts warn that traditional firewalls and antivirus tools cannot block prompt-injection attacks and recommend limiting AI assistant privileges and sanitizing inputs.