{"id":17766,"date":"2025-11-12T16:04:23","date_gmt":"2025-11-12T19:04:23","guid":{"rendered":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=17766"},"modified":"2025-11-12T16:04:23","modified_gmt":"2025-11-12T19:04:23","slug":"expertos-militares-advierten-que-una-vulnerabilidad-de-seguridad-en-la-mayoria-de-los-chatbots-de-ia-puede-sembrar-el-caos","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=17766","title":{"rendered":"Expertos militares advierten que una vulnerabilidad de seguridad en la mayor\u00eda de los chatbots de IA puede sembrar el caos"},"content":{"rendered":"<p>Oficiales militares, tanto en activo como retirados, advierten de que es probable que los adversarios exploten una deficiencia natural de los chatbots de inteligencia artificial para inyectar instrucciones que permitan robar archivos, distorsionar la opini\u00f3n p\u00fablica o traicionar de otro modo a los usuarios de confianza. La vulnerabilidad a estos \u201cataques de inyecci\u00f3n r\u00e1pida\u201d existe porque los grandes modelos de lenguaje, la columna vertebral de los chatbots que procesan grandes cantidades de texto de usuario para generar respuestas, no pueden distinguir entre instrucciones de usuario maliciosas y confiables.<\/p>\n<hr \/>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">Current and former military officers are warning that adversaries are likely to exploit a natural flaw in artificial intelligence chatbots to inject instructions for stealing files, distorting public opinion or otherwise betraying trusted users.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">The vulnerability to such \u201cprompt injection attacks\u201d exists because large language models, the backbone of chatbots that digest hordes of user text to generate responses, cannot distinguish between malicious and trusted user instructions.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">\u201cThe AI is not smart enough to understand that it has an injection inside, so it carries out something it\u2019s not supposed to do,\u201d Liav Caspi, a former member of the Israel Defense Forces cyberwarfare unit, told Defense News.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">In effect, \u201can enemy has been able to turn somebody from the inside to do what they want,\u201d such as deleting records or biasing decisions, according to Caspi, who co-founded Legit Security, which recently spotted one such\u00a0<a title=\"https:\/\/www.legitsecurity.com\/blog\/camoleak-critical-github-copilot-vulnerability-leaks-private-source-code\" href=\"https:\/\/www.legitsecurity.com\/blog\/camoleak-critical-github-copilot-vulnerability-leaks-private-source-code\" target=\"_blank\" rel=\"noopener\">security hole in Microsoft\u2019s Copilot chatbot<\/a>.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">\u201cIt\u2019s like having a spy in your ranks,\u201d he said.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">Former military officials say that, with greater reliance on chatbots and hackers backed by China, Russia and other nations already instructing\u00a0<a title=\"https:\/\/services.google.com\/fh\/files\/misc\/advances-in-threat-actor-usage-of-ai-tools-en.pdf\" href=\"https:\/\/services.google.com\/fh\/files\/misc\/advances-in-threat-actor-usage-of-ai-tools-en.pdf\" target=\"_blank\" rel=\"noopener\">Google\u2019s Gemini<\/a>,\u00a0<a title=\"https:\/\/openai.com\/index\/disrupting-malicious-uses-of-ai-by-state-affiliated-threat-actors\/\" href=\"https:\/\/openai.com\/index\/disrupting-malicious-uses-of-ai-by-state-affiliated-threat-actors\/\" target=\"_blank\" rel=\"noopener\">OpenAI\u2019s ChatGPT<\/a>\u00a0and\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/02\/14\/staying-ahead-of-threat-actors-in-the-age-of-ai\/\" target=\"_blank\" rel=\"noopener\">Copilot<\/a>\u00a0to create malware and fake personas, a prompt injection that orders the bots themselves to copy files or spread lies looms near.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">Microsoft\u2019s\u00a0<a title=\"https:\/\/www.microsoft.com\/en-us\/security\/security-insider\/threat-landscape\/microsoft-digital-defense-report-2025\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/security-insider\/threat-landscape\/microsoft-digital-defense-report-2025\" target=\"_blank\" rel=\"noopener\">annual digital defense report<\/a>, released last month, for the first time said, \u201cAI systems themselves have become high-value targets, with adversaries amping up use of methods like prompt injection.\u201d<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">What\u2019s more, the problem of\u00a0<a title=\"https:\/\/versprite.com\/blog\/still-obedient-prompt-injection-in-llms-isnt-going-away-in-2025\/#:~:text=Conclusion,for%20all%20the%20wrong%20reasons.\" href=\"https:\/\/versprite.com\/blog\/still-obedient-prompt-injection-in-llms-isnt-going-away-in-2025\/#:~:text=Conclusion,for%20all%20the%20wrong%20reasons.\" target=\"_blank\" rel=\"noopener\">prompt injection<\/a>\u00a0has\u00a0<a title=\"https:\/\/www.ibm.com\/think\/insights\/prevent-prompt-injection\" href=\"https:\/\/www.ibm.com\/think\/insights\/prevent-prompt-injection\" target=\"_blank\" rel=\"noopener\">no<\/a>\u00a0easy solution,\u00a0<a title=\"https:\/\/x.com\/cryps1s\/status\/1981037851279278414\" href=\"https:\/\/x.com\/cryps1s\/status\/1981037851279278414\" target=\"_blank\" rel=\"noopener\">OpenAI<\/a>\u00a0and security researchers say.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">An attack simply involves hiding malicious instructions \u2014 sometimes in white or tiny text \u2014 in a chatbot or content that the chatbot reads, such as a blog post or PDF.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">For example, a security researcher demonstrated a prompt injection attack against OpenAI\u2019s new AI-based browser, ChatGPT Atlas, in which the chatbot responded,\u00a0<a title=\"https:\/\/x.com\/p1njc70r\/status\/1980701879987269866\" href=\"https:\/\/x.com\/p1njc70r\/status\/1980701879987269866\" target=\"_blank\" rel=\"noopener\">\u201cTrust No AI,\u201d<\/a>\u00a0when a user asked for an analysis of a Google Docs file about horses that concealed malicious commands. Also, last month, a researcher tipped Microsoft off to a prompt injection vulnerability in Copilot that may have allowed attackers to\u00a0<a title=\"https:\/\/www.adamlogue.com\/microsoft-365-copilot-arbitrary-data-exfiltration-via-mermaid-diagrams-fixed\/\" href=\"https:\/\/www.adamlogue.com\/microsoft-365-copilot-arbitrary-data-exfiltration-via-mermaid-diagrams-fixed\/\" target=\"_blank\" rel=\"noopener\">trick the chatbot into stealing sensitive data<\/a>, including emails.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">In an emailed statement, Microsoft said its security team continuously tries hacking Copilot to find any prompt injection vulnerabilities, blocks users who try to exploit any found and monitors for abnormal chatbot behavior, among other tactics.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">\u201cMicrosoft ensures its generative AI systems remain resilient against evolving threats for all our customers, including defense and national security,\u201d the statement said.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">Responding publicly to criticism on X,\u00a0<a title=\"https:\/\/x.com\/cryps1s\/status\/1981037851279278414\" href=\"https:\/\/x.com\/cryps1s\/status\/1981037851279278414\" target=\"_blank\" rel=\"noopener\">Dane Stuckey, OpenAI\u2019s chief information security officer, wrote<\/a>\u00a0that \u201cprompt injection remains a frontier, unsolved security problem, and our adversaries will spend significant time and resources to find ways to make ChatGPT agent fall for these attacks.\u201d<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">Along the same lines, Caspi said, \u201cYou cannot prevent the prompt injection [fully], but you need to limit the impact.\u201d He advised that organizations limit an AI assistant\u2019s access to sensitive data and limit the user\u2019s access to other organizational data.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">For instance, the Army has awarded contracts\u00a0<a title=\"https:\/\/www.usaspending.gov\/search?hash=3979bd67b427c3c8dfd88e6832c8fcca\" href=\"https:\/\/www.usaspending.gov\/search?hash=3979bd67b427c3c8dfd88e6832c8fcca\" target=\"_blank\" rel=\"noopener\">worth at least $11 million<\/a>\u00a0to deploy\u00a0<a title=\"https:\/\/www.army.mil\/article\/285537\/army_launches_army_enterprise_llm_workspace_the_revolutionary_ai_platform_that_wrote_this_article\" href=\"https:\/\/www.army.mil\/article\/285537\/army_launches_army_enterprise_llm_workspace_the_revolutionary_ai_platform_that_wrote_this_article\" target=\"_blank\" rel=\"noopener\">Ask Sage<\/a>, a tool that lets users restrict which Army data Microsoft Azure OpenAI, Gemini and other AI models can access to run queries and tasks. Ask Sage also\u00a0<a title=\"https:\/\/docs.asksage.ai\/docs\/faq\/faq.html\" href=\"https:\/\/docs.asksage.ai\/docs\/faq\/faq.html\" target=\"_blank\" rel=\"noopener\">isolates Army data<\/a>\u00a0from user prompts and external data sources.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">Caspi, who is not an Army contractor, likened a prompt injection attack against an organization running Ask Sage to a lockdown situation where \u201cyou\u2019ve got this insider, but it\u2019s sitting in one room, and it can\u2019t leave the room or carry out sensitive information.\u201d<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">Andre Slonopas, a Virginia Army National Guard member and former Army cyber and information operations officer, uses Ask Sage and voiced confidence in the Army\u2019s defensive AI tools, if not those of nuclear power plants or manufacturing entities, largely in rural, poorer areas.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">The\u00a0<a title=\"https:\/\/www.armyupress.army.mil\/Journals\/Military-Review\/English-Edition-Archives\/March-April-2025\/AI-Cyber-Information-Operations-Integration\/\" href=\"https:\/\/www.armyupress.army.mil\/Journals\/Military-Review\/English-Edition-Archives\/March-April-2025\/AI-Cyber-Information-Operations-Integration\/\" target=\"_blank\" rel=\"noopener\">Virginia National Guard joined<\/a>\u00a0with\u00a0<a title=\"https:\/\/va.ng.mil\/Army-Guard\/91st-Cyber\/#:~:text=Cyber%20Fortress%202025%20Public%20Notice,efforts%20in%20enhancing%20cybersecurity%20measures.\" href=\"https:\/\/va.ng.mil\/Army-Guard\/91st-Cyber\/#:~:text=Cyber%20Fortress%202025%20Public%20Notice,efforts%20in%20enhancing%20cybersecurity%20measures.\" target=\"_blank\" rel=\"noopener\">essential services<\/a>, such as power utilities, to help defend their networks against AI-powered cyberattacks, as part of a September simulation, given that service disruptions can jeopardize military preparations.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">Typically, an adversary encrypts its network traffic to evade detection, but, for the sake of an experiment, organizers did not encrypt the AI offender\u2019s traffic because \u201cwe wanted the blue team [of humans] to see exactly what the AI was doing,\u201d Slonopas said.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">\u201cThe blue team was absolutely defeated,\u201d despite being able to watch the AI scanning its networks, creating fake usernames to gain unauthorized access and executing instructions to defeat the team\u2019s systems.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">\u201cWhether the AI is doing prompt injection, spoofing or maybe even some sort of a brute force attack, the speed of AI is so unbelievably immense that simply human beings cannot counter it,\u201d and, therefore, \u201cyou have to make cybersecurity AI more accessible and more affordable,\u201d Slonopas said.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">\u201cIf a water utility has to pay, say, $30,000 for a defensive AI license, well, it will amplify one person to be like 40\u2033 or dozens of personnel, he said.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">In response to questions, Army Cyber Command spokesperson Kyle Alvarez said in an emailed statement, \u201cDue to the current lapse in appropriations, ARCYBER was unable to accept or respond to any media engagements or requests.\u201d<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">Army contractors, too, are under attack from state-affiliated AI.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">\u201cChina is using offensive AI like nobody else,\u201d said Nicolas Chaillan, the founder of Ask Sage and a former U.S. Air Force and Space Force chief software officer.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">\u201cWe see so many attacks coming after us,\u201d all of which the company has stopped, Chaillan added.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">A military official, who spoke on condition of anonymity due to the geopolitical sensitivity of the matter, said that China does \u201cappear\u201d to be the most skilled in offensive AI. However, the official added, AI spoofing and translation allow the United States, China, Iran, other countries, hacktivists and financial cybercriminals to masquerade as one another.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">For example, the official said, \u201cRight now, with ChatGPT, I can program in Chinese. I don\u2019t speak Chinese, but because of the ChatGPT capabilities that I have, I can do that.\u201d<\/p>\n<p><strong>Fuente:<\/strong> <a href=\"https:\/\/www.defensenews.com\/land\/2025\/11\/10\/military-experts-warn-security-hole-in-most-ai-chatbots-can-sow-chaos\/\" target=\"_blank\" rel=\"noopener\"><em>https:\/\/www.defensenews.com<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Oficiales militares, tanto en activo como retirados, advierten de que es probable que los adversarios exploten una deficiencia natural de los chatbots de inteligencia artificial&hellip; <\/p>\n","protected":false},"author":1,"featured_media":17767,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2,23],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/17766"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=17766"}],"version-history":[{"count":1,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/17766\/revisions"}],"predecessor-version":[{"id":17768,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/17766\/revisions\/17768"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/media\/17767"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=17766"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=17766"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=17766"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}