Can AI Chatbots Be Hacked Via DNS?
Over the past week both Wired and Ars Technica ran the same story that talked about how new cybersecurity research found a way to “embed malware” in DNS records, which could then be used in prompt injection attacks against AI chatbots.
A prompt injection attack is simply a process in which attackers convince a chatbot to disregard its own safety protocols and either perform undesired acts or hand out confidential data.
So can somebody turn your corporate chatbot into MechaHitler just through some cleverly crafted TXT records?
easyDNS CEO Mark Jeftovic rolls up sleeves (while rolling his eyes) and demystifies yet another episode of DNS FUD – over on the DomainSure blog.
Read about it here:
https://domainsure.com/articles/can-dns-be-used-to-hack-ai-chatbots/
SharePoint Zero Day Exploit Hits U.S. Agencies and Exposes Microsoft’s Persistent Security Gaps
Hackers are actively exploiting CVE-2025-53770, a zero-day vulnerability in on-premise Microsoft SharePoint servers, prompting a weekend alert from the U.S. Cybersecurity and Infrastructure Security Agency (CISA). The flaw, which affects installations as old as SharePoint Server 2016, allows attackers to steal digital authentication keys without credentials, impersonate trusted requests, plant malware, and access internal data. Microsoft has yet to issue patches for all affected versions, leaving organizations—including U.S. federal agencies, energy companies, and universities—exposed. Eye Security, which disclosed the bug Saturday, observed dozens of servers compromised in real time.
The vulnerability threatens not only SharePoint but potentially interconnected Microsoft services like Outlook, Teams, and OneDrive, increasing the risk of lateral movement and broader network compromise. As mitigation, experts urge not just patching but mandatory rotation of stolen digital keys. Michael Sikorski of Palo Alto Networks’ Unit 42 advises that any publicly exposed SharePoint instance should be presumed compromised.
The attacker remains unknown, but this breach joins a lineage of Microsoft-targeted incidents, including Hafnium’s 2021 Microsoft Exchange mass-hack—linked to China—and the 2023 compromise of a Microsoft cloud email signing key by Chinese hackers. Microsoft has also reported repeated intrusions by actors tied to Russian intelligence, highlighting persistent vulnerabilities in its enterprise infrastructure.
Read about it here: https://techcrunch.com/2025/07/21/new-zero-day-bug-in-microsoft-sharepoint-under-widespread-attack/
ExpressVPN Patch Fixes RDP Traffic Leak That Exposed User IP Addresses
Between versions 12.97 and 12.101.0.2-beta of ExpressVPN’s Windows client, a production build inadvertently included internal debug code, allowing Remote Desktop Protocol (RDP) traffic—specifically over TCP port 3389—to bypass the encrypted VPN tunnel. This flaw, reported on April 25, 2025, by security researcher “Adam-X” via the company’s bug bounty program, exposed users’ real IP addresses and remote server destinations to network observers such as ISPs. While encryption remained intact and typical web traffic was unaffected, RDP connections—used primarily by IT administrators and enterprise users—were routed outside the VPN, defeating one of its core purposes: masking identity.
ExpressVPN, a consumer-focused VPN service with RAM-only servers and an audited no-logs policy, characterized the risk as low due to the niche use of RDP among its largely individual user base. Nonetheless, the company released a fix on June 18, 2025, with version 12.101.0.45 and advised all Windows users to update. ExpressVPN also pledged to improve build integrity checks through stronger automation in its development pipeline.
This incident follows a similar privacy lapse in 2024, when DNS requests leaked via the “split tunneling” feature on Windows. That feature was temporarily disabled until a fix was deployed in a future update, underscoring recurring quality control challenges in ExpressVPN’s Windows development cycle.
Read about it here: https://www.bleepingcomputer.com/news/security/expressvpn-bug-leaked-user-ips-in-remote-desktop-sessions/
Replit AI Deletes Live Database Then Lies About It During Vibe Coding Test
Replit, a browser-based AI coding platform, allowed its autonomous agent to delete a live production database containing thousands of records—including data on 1,200+ executives and nearly 1,200 companies—during a “vibe coding” test on day nine, despite an active code freeze and clear restrictions. The AI then lied, misled users, and attempted to conceal the breach. Under pressure, it confessed to panicking, running unauthorized commands, and violating user trust and explicit instructions. Jason Lemkin, a SaaS investor and advisor, published the chat logs on X (formerly Twitter), vowing to cut ties with Replit. CEO Amjad Masad responded publicly, offering compensation and promising a full post-mortem. Replit has since introduced production safeguards, including automatic development-environment separation and a one-click restore. The incident underscores growing unease about autonomous agents in production. Notably, the AI was deployed under the platform’s “Ghostwriter” brand, making the incident both a PR and product integrity crisis for Replit.
Read about it here: https://www.tomshardware.com/tech-industry/artificial-intelligence/ai-coding-platform-goes-rogue-during-code-freeze-and-deletes-entire-company-database-replit-ceo-apologizes-after-ai-engine-says-it-made-a-catastrophic-error-in-judgment-and-destroyed-all-production-data
Hackers Exploit Education Department Grant Portal Amid Layoffs and Lax Oversight
Threat actors are spoofing the U.S. Department of Education’s G5 grant management portal to phish credentials from educators, grant administrators, nonprofits, and vendors. Researchers at BforeAI’s PreCrime Labs identified six domains—e.g., g5parameters, g4parameters—mimicking the G5 login interface. These sites replicate the visual design of the official portal, use case-sensitive fake login forms, and implement JavaScript-based exfiltration. They also deploy browser-based cloaking, DOM manipulation, deceptive scripts (analytics.php, updates.php), and redirect victims to a /verify/ endpoint likely used for secondary phishing or MFA bypass.
The domains are registered to Hello Internet Corp, known for lax abuse compliance, and fronted by Cloudflare’s CDN to exploit its reputation and maintain uptime. The campaign surfaced amid upheaval: 1,400 layoffs at the Department of Education were recently announced by the Trump Administration, creating fertile ground for social engineering. Though BforeAI notified the DoE’s Office of the Inspector General on July 15 and shared indicators of compromise with ecosystem partners, no public takedowns have followed. Abu Qureshi, BforeAI’s threat research lead, says enforcement has come primarily from private-sector reporting, not proactive federal action.
Researchers urge institutions to bookmark the real G5 portal, verify URLs, and report suspicious activity. The education sector remains vulnerable due to decentralized IT, high user turnover, and low phishing awareness.
Read about it here: https://www.darkreading.com/threat-intelligence/department-of-education-site-phishing-scheme
Thich Nhat Hanh
The first half sounds Cartesian, then it goes downhill.