
Cables2Clouds
Join Chris and Tim as they delve into the Cloud Networking world! The goal of this podcast is to help Network Engineers with their Cloud journey. Follow us on Twitter @Cables2Clouds | Co-Hosts Twitter Handles: Chris - @bgp_mane | Tim - @juangolbez
Cables2Clouds
Google Takes a 7-Hour Coffee Break (And Takes Half the Internet With Them)
When automation fails, it fails spectacularly—and at scale. The recent Google Cloud outage that took down over 54 global services for more than seven hours demonstrates this perfectly. A simple error—blank fields in automated policy updates—cascaded into widespread failures affecting millions of users worldwide. This episode dives deep into what went wrong, how it happened, and what it means for cloud resilience in the AI era.
We also explore Cisco's dramatic pivot at Cisco Live 2025, where they've committed to refreshing their entire hardware stack and integrating AI throughout their ecosystem. Their new LLM called Deep Network suggests a future where networking infrastructure makes intelligent decisions autonomously. We discuss whether Cisco can deliver on these promises and what the unification of their Meraki and Catalyst lines might mean for customers.
The Ultra Ethernet Consortium has finally released their 1.0 specification, establishing a comprehensive standard for high-performance computing environments. This 600+ page document marks a significant milestone in creating viable alternatives to InfiniBand for AI workloads. Meanwhile, Network-as-a-Service pioneer Meter secured $170 million in Series C funding, raising questions about the actual size and sustainability of the NaaS market.
On the cybersecurity front, we examine two concerning developments: the mass exodus of leadership from CISA during heightened threat conditions, and a novel zero-click vulnerability in Microsoft 365 Copilot that can expose sensitive data without any user interaction. This "Echo Leak" vulnerability demonstrates how AI systems that automatically scan content create entirely new attack vectors that organizations must defend against.
Join us for a fast-paced discussion about these pivotal developments in cloud computing, networking technology, and cybersecurity. What does all this mean for your infrastructure strategy? Listen and find out.
Purchase Chris and Tim's new book on AWS Cloud Networking: https://www.amazon.com/Certified-Advanced-Networking-Certification-certification/dp/1835080839/
Check out the Fortnightly Cloud Networking News
https://docs.google.com/document/d/1fkBWCGwXDUX9OfZ9_MvSVup8tJJzJeqrauaE6VPT2b0/
Visit our website and subscribe: https://www.cables2clouds.com/
Follow us on BlueSky: https://bsky.app/profile/cables2clouds.com
Follow us on YouTube: https://www.youtube.com/@cables2clouds/
Follow us on TikTok: https://www.tiktok.com/@cables2clouds
Merch Store: https://store.cables2clouds.com/
Join the Discord Study group: https://artofneteng.com/iaatj
Hello and welcome back to another episode of the Cables to Clouds fortnightly news update. My name is Chris Miles at BGP Main on Blue Sky and, as always, I'm joined by my good mate, my beloved pal Tim McConaughey at Carpe DMVPN. Uh wait, is it, did you?
Tim McConnaughy:change it okay.
Chris Miles:I couldn't remember. I was like it's been so long since I've had to say it. Um, on blue sky. So, um, we have an exciting um update for you today. Um, a lot of a lot of stuff's come in over the last couple weeks. So, if you're not familiar with this format, we typically grab a few news articles that have come out over the last two weeks since we last did this, give a summary and some opinions on it and go from there. So we have plenty to talk about, so let's go ahead and hop right in.
Chris Miles:So, first up, we have an article here from Network World covering a massive scale outage that Google Cloud experienced just the other day, on the 12th of June. So Google Cloud experienced a significant outage lasting about seven hours a little over seven hours affecting over 54 of its global cloud services. So it began at about 10 in the morning Pacific time and wasn't resolved till pretty much the end of the day. So you can tell that's obviously a big chunk of the day for a lot of its users. It had a global impact as well, over the Americas, europe, etc. And it affected not just Google Cloud but, as Public Cloud works, many services that are using Public Cloud, such as Spotify, discord, openai, chatgpt type thing and CloudFlare. I remember I saw plenty of screenshots getting posted on the front page of Down Detector and it was like everything was just red. So over 1.4 million issues were reported on Down Detector. So you can obviously tell that that's pretty wide scale. The cause of the issue was surprisingly simple and quite surprising. So basically the root cause was identified that an automated quota update to Google's API management system contains some blank fields within the policy data and, in turn, started, you know kind of creating this cascade effect of issues across a lot of their services with these null pointers. So basically, you know there is, you know, things pointing to things that did not exist and started causing all these issues and API requests were failing with 503 errors, et cetera, to many of their different services, to many of their different services. So you know. The article then goes into you know kind of what are the risks and industry implications of this and you know what that means from you know resigning all your services in a single cloud, which we've talked about on this podcast several times. So we kind of don't need to dive too much into that.
Chris Miles:One thing that I thought was really interesting in this article. There's a quote in here from Spencer Kimball, who's the CEO of Cockroach Labs or CockroachDB, as many of you know, but I can't tell if this quote is specifically about Google or if it's just kind of a general comment, but it seems like a pretty straightforward jab. If it is about Google specifically, he calls out and says resilience isn't a feature that you layer on, it's an architectural commitment. Performance under adversity, not in perfect conditions, is the real benchmark. Now, if your system can't absorb failure without taking customers down with it, you're not production ready in 2025, especially not in the AI era. So if that's what he's saying, then essentially saying Google Cloud is not production ready in 2025, which is a pretty extreme claim.
Chris Miles:But yeah, before we hit record, tim and I were kind of comparing this to kind of the AWS type outages where when US East 1 goes down, there's a lot of affected services and things like that. I don't think we've ever seen it at this degree, necessarily. But yeah, I know I had some stuff that was down during that day. That was pretty awkward. But what about you, tim? Any other comments?
Tim McConnaughy:Yeah, we were actually doing office hours or something for the fundamental network bootcamp and Andrew was going to show them how to do something in Google cloud and he was like, oh, it's not working. And then, of course, I was like, yeah, it turns out nothing's working at Google today. It's all broke, it's all broke. So he was like, oh well, we can't do that. But I mean, it affected everything.
Tim McConnaughy:And what I find so interesting about this and I do every time they do one of these post-mortems you know, and I've been saying it for years, that automation is great. It lets you fuck up at scale. Um, is that? Uh, seven hours, seven hours to find this. I can't imagine why that would take. The answer, of course, is because the the hyper plane is so complex and so, like nuts, there's so much automation, there's so much rube goldberg device management going on that I can't imagine that.
Tim McConnaughy:It's even as simple as saying, like, if you were an enterprise, the first thing whenever there was an outage in enterprise, when I worked in enterprise, the first thing that would happen is somebody would come around who changed something. Like what changed? Like what was the last change that happened, and they want to roll back like every change within the last 24 hours to try to fix whatever the problem was. It's just kind of spray and pray kind of feeling, but in this case, you know, it's probably there's probably no good way to try to make that happen, right? So it's, it's changed all the time. Uh, yeah, I am curious though how they actually not only how did it take them that long? But I can understand why it took them so long, given that that giant hyperplane. I wonder how they eventually tracked it down.
Chris Miles:You kind of want to be a fly in the room, just trying to figure that out, you know.
Tim McConnaughy:But yeah, I mean the guy. What the guy said at Cockroach Labs is true, but it's also very easy to sit on the sideline and take a, take a shot. You know he's not wrong. But, like you know the something with this much automation to give customers that that kind of experience, yeah, when it breaks it's going to break spectacularly and then there's always going to be some, some linchpin service or something. I'm reminded of the xkcd with the. You know the entire internet and then the tiny little thing at the bottom. You know some library that somebody's been thanklessly maintaining since 2003. You know it's holding the whole thing up yeah, right.
Chris Miles:So anyway, it's always the meme with like the giant building block thing and then there's one tiny one at the bottom. That's just like kind of holding it together.
Tim McConnaughy:Exactly. So yeah, I mean not surprised. I have to say I'm not surprised by this, but I am curious to see who's next Like, because this definitely seems to happen once or twice a year at every CSP, it seems. Yeah, true, let's see. This next one is not a recap so much as just kind of a I should call it like a rebranding of that Cisco did at Cisco live this year. So Cisco live 2025 just wrapped up and basically Cisco, I thought last year. So I went to Cisco live last year and I thought last year was Cisco live the year of AI? And I was. We were off by a year. This was the year of AI. I mean, they needed. I was actually surprised that Cisco was saying like, hey, this is the year of AI last year because Cisco doesn't move quickly because they're a giant company. Now it seems like they've really turned the entire ship. They're doing something that they haven't done in a long time. They're saying they're going to refresh their entire hardware stack. Oh, hold on.
Tim McConnaughy:Let me quote the article itself here. The article is actually from ComputerWeeklycom, by the way. The article is actually from ComputerWeeklycom, by the way, but yeah, it goes over. Quotes from Chuck Robbins from G2 Patel specifically about how they're baking AI into everything, and it goes into very specific detail, some really cool stuff that I always thought would be cool.
Tim McConnaughy:But if Cisco could kind of get out of its own way and start integrating things, this idea of ThousandEyes, you know, adding things like IoT and mobile endpoints and just more and more essentially, data. Right, that's always been the ThousandEyes model is just bring in as many detectors as possible, but also pairing it with Splunk to actually make sense of the huge amount of telemetry that's being brought in. You know, long story short, cisco is basically building into their hardware stack this idea of their new LLM. It's like an AI. What is it called? Deep network? That's a deep network. Yeah, their own LLM. They're building it into all of their tech so that, you know, essentially, I guess the goal is to be able to leverage AI to do something Think of like a DNA assurance, you know, agentic DNA assurance or something like that. So, yeah, it's pretty interesting.
Tim McConnaughy:I haven't seen an actual product yet, so, as usual, I would like to reserve judgment until we actually see the integration and see the product that comes out of it. You know, cisco reserve judgment until we actually see the integration and see the product that comes out of it. You know, cisco, um yeah, but I think cisco is latching on to this like really, really hard. So they're they're kind of pinning all the pinning everything on there. I don't know what. Uh, did you catch any of those cisco live stuff?
Chris Miles:yeah, I watched some uh reviews. I will say our um, our good friend, um uh kevin adjacent note on tiktok, uh, gave me a couple breakdowns, so I definitely watched those.
Chris Miles:I remember, because I think we're all feeling a bit of fomo not being there this year, um, but yeah, it was, um, it was good. I will say, I mean, I didn't I didn't expect cisco to to drop that. They had, you know, basically created, basically created this domain specific LLM that was kind of surprising to me which is, I mean, let's be honest, one of the biggest networking vendors in the world. They have the data to train this thing right, so it could be very effective. Like you said, the proof is going to be in the pudding on how it's done. I mean, I would think Apple can make a good AI model, but you know, obviously that's uh, that's going to shit as well. I know, tim, you're not an Apple user, but, um, you'll be happy to know that the, the, um, oh my gosh, what did they call it? I don't remember what the AI thing is called now. Um, their AI integration sucks ass.
Chris Miles:Um so yeah, you would be. You would be surprised, um, but I mean, there was some really impressive stuff in there as well as far as the hardware goes. Very Like you said, they were kind of leaning in so much on not just the idea of agentic AI or agentic ops as something that I've been hearing for the first time over the last couple weeks I don't know if that was from Cisco Live or from someone else, but we've entered into that realm but they're talking about some of these smart switches that are going to do up to 51 terabytes per second of throughput with five microsecond latency and quantum resistance, secure networking, et cetera. Hpc stuff, yeah, which is insanely crazy just from a capacity perspective. Does that affect the common people like you and me? Probably not, but it's just crazy to know that that exists.
Chris Miles:So some super impressive stuff. Apparently, people were really pleased with the refresh on the OT switches as well. So operational technology if you're not familiar, kind of these kind of more ruggedized, smaller industrial type things that you know these things might be running at a you know mining facility that could be running manufacturing, just basically anything that's involving heavy machinery. Um, people were really pleased with that, um, oh, one thing I also forgot there's a strong unification now of the Meraki and Catalyst line as well.
Tim McConnaughy:I don't know if that means the portals are merging.
Chris Miles:Oh man that'll be the end of an era.
Tim McConnaughy:They've been trying to do that. They've been trying to do that for years now. So I'm curious if they finally realized it or whatnot.
Chris Miles:So yeah, I know there's probably going to be some Meraki fanboys and fangirls out there that are very, very disappointed to see that. Or, you know, maybe they're happy, maybe I'm wrong, maybe I'll eat crow on it, but we'll see.
Tim McConnaughy:Yeah, one thing is funny because, if you remember, we talked about this. What two years ago now, when Cisco acquired Splunk, we're like, why would Cisco acquire Splunk? And at the time we were like, oh, number one is to get all that data right, To get all that data for model training. We're seeing it play out exactly like we expected. So this is very interesting stuff.
Chris Miles:Apparently, they haven't been putting that Splunk stuff into other products. They're just charging for it. So yeah, it makes sense. They're doing something with the data at some point.
Tim McConnaughy:Yeah.
Chris Miles:All right, doing something with the data at some point. Yeah, all right. Uh, next up we have um. Who's this from? This is another article from network world, but I mean the brief article from network world about this.
Chris Miles:Um, but really, um to kind of uh, it's just kind of a review of what's happened, but basically the ultra ethernet consortium, um. So if you've listened to some of the previous episodes we've had with Peter Jones, who is chair of the Ultra Ethernet Consortium I'm just going to say UEC from now on, because consortium is a tough word to say over and over again but they've basically released a first copy or 1.0 of their specification to kind of tackle the high performance computing thing that they set out to to achieve Right. So we're talking, you know, things covered in here from low latency transport, rdma, control mechanisms et cetera that don't require lossless networks, which is probably huge for, yeah, for things like ai and ai training etc. Um, obviously there's there's big backing in here from major vendors like cisco, arista, juniper, etc. Um, so it's nice to see something finally come in and um have a true competition to infiniband.
Chris Miles:Um, which is been kind of the market dominated, uh, dominating technology for a while. Um, so we've been uh talking. We might have to have peter come back on and give us a chat about this, because I'd be um curious to read this. I did. I will say I did not read the specification. It's about 600, 700 pages long.
Chris Miles:It's huge. So I'm sure we, I'm sure there's plenty of folks out there that do have the time to sit down and and read that and you know they're smart enough to understand all of it and feel happy. But I'm I'm not currently one of those people, so I'm not going to do that. But any other comments to add to?
Tim McConnaughy:yeah, I mean it's a, so you know the uec being a standards body. I mean, like that means that the whole point of them issuing a, a guideline, if you will, I say guideline, the 600 page guideline, a standard, essentially a 1.0 standard for hpc and ai data centers, like what, if you remember uh, god, was it two years ago now, or we had them back as well last year or in this past year but when we first talked to Peter Jones about this, we were like, hey, what do you think an AI data center would look like? He was like do you want me to just make something up?
Tim McConnaughy:Because it was just completely on nobody had really gotten any kind of work done on what an HPC data center might look like. And here we are now. You know they finally have released an actual standards, like a guideline for how to do it and what standards to adhere to. So, and several of the vendors in here, of course, have already said like hey, we're, we're on board, we're going to support this as the standard, this is what we're going to build to. So that's huge, right, I mean, the whole point of a standard is so that everybody's reading from that same playbook, right, so that from an interoperability perspective, that's huge, which, of course, I mean every vendor would rather that use entirely all of their gear everywhere. But you know, the fact that there is a standard now is going to be very big for building these HPC data centers. So, yeah, I'm going to reach out to Peter. I think this is going to be great, absolutely All right. So now we have one from this one's, also from Network World. There's just a lot of stuff and a lot of the same Pounder them this week. Yeah, well, we're giving them credit where it's due for what it's worth. Yeah, true, but so this one is a.
Tim McConnaughy:This one is a switching gears a little bit. This is from Network World and it's an article about Meter Meter being a network as a service vendor, mentioning that they've secured 170 million to scale their NAS stack quote unquote from the ground up. So Meter's actually been around. I think they're actually the oldest true NAS, but I might be wrong about that. They've been around for a while actually. I want to say, well, actually the might be wrong about that. They've been around for a while. Actually. I want to say, well, actually, the article says 10 years ago. So yeah, I think that's fairly safe to say that, probably the first to try to build TrueNAS. Somebody can correct me if that's incorrect. But of course, being first to market doesn't always mean you own the market or the best at the market. Sometimes that's not the case.
Tim McConnaughy:The point is here is that basically the, since they're doing NAS, which is networks as a service, they're building their own. You know, they've got their own silicon, they've got their own white boxes. They have that network as a service model where they will essentially give you the network gear. You utilize it. They buy it back from you or take it back from you, like you just buy, kind of use what you need. Um, honestly, I had to. I had to, you know, read up on this a little bit. Their deployment model is it says, meter was an early entrant in the nas space, so maybe they weren't first.
Tim McConnaughy:Maybe there's somebody older than I, just don't know who it is um, but they defined kind of what nas looks like. Like. What, what does nas mean? How do you, how do customers consume it? That's kind of that usability model that Niall and others are using now. So I actually mentioned it here that they're actually competing against other NAS vendors like Niall, join digital and Raman networks. Now I don't know what Raman networks is, but I'm going to go find out because I am required to figure out what Raman networks is. It's kind of brand specific that I must know what Ramen Networks is.
Chris Miles:Yeah, based on your post, you should probably check their jobs page see if they're looking for an evangelist.
Tim McConnaughy:Yeah, do you guys need an evangelist? Because I've got you. I'm an expert at this, I promise. Yeah, right, but yeah, I mean. So there's not much else to say here, except that they just raised a series. I think it's a series C. Funding is what it said in the article. Yeah, so I mean. God, that's pretty good, though They've been around 10 years, they only are on a series C now. The only thing I'll add before I ask, because I want to know your opinion on this as well is like naz, like they, so gartner killed the multi-cloud networking um quadrant because it said there wasn't an actual market there. Like it said, basically, yeah, it exists, but there's not enough of a market to judge to justify a magic quadrant. I just don't know about network as a service because I I keep hearing about it on the fringe, but I it's been on the fringe for like as long as I can remember. I've never actually. How big is this? How big is the? How many people are you actually using, as do you think?
Chris Miles:Yeah, it's it's tough to say like, like you said, um kind of similar to the multi-cloud networking, um, you know, magic quadrant or whatever. Um, there, there's definitely a market out there. There's definitely some customers that get to a certain scale or just have a desire to have something that does a lot of that for them. So sometimes there are products that come in and fill that use case for some very large customers, which is a good thing. The problem is there's only so many of them. The problem is there's only so many of them, and then once those are exhausted and the rest of the people aren't buying it, then you kind of head into the trough of disillusionment and all this kind of stuff. Right, the fact that Mita's been around this long and are only on a Series C, like you said, I think that's a great sign. They've probably had some very early success with some very large brands and I don't know what their margins look like, but apparently they've been doing pretty well for for that period of time. So this is this is cool to see.
Chris Miles:I will say I did participate in a sponsored episode of the Art of Network Engineering with this, the CEO of Metered. Yeah, it was an episode with me, um, andy, um, their ceo, um, I will put. I will put the link to that in the show notes because it was, I'll be honest. I asked some pretty uh, blunt questions for a, for a sponsored episode, because he he welcomed that, he wanted, he wanted to get beat up a little bit. So, um, I would definitely advise folks, if you want to know more about Meter, to check out that episode, because I was genuinely surprised with some of their capabilities. So I can definitely see some of their added benefits and things like that. But, like you say, with this kind of NAS market as the whole, is the juice worse than the squeeze, for you know, some of these bigger organizations.
Tim McConnaughy:So is there enough? Essentially, are there enough people out there that need it? I think is the question that still has to be answered. Yep, a hundred percent.
Chris Miles:All right, another brief one here from Cybersecurity Dive. So you know, with the latest installment of the new administration in the White House, I have an article here talking about how many of the CISA leadership has started stepping down. So, cisa being the what is it? I always forget what CISA actually stands for. Cisa, yeah.
Tim McConnaughy:Cyber Security or no something? Information Security Association, yeah.
Chris Miles:I just forget what the first word is. Maybe it's cyber information security association. Yeah, I just forget what the first word is. Maybe it's cyber.
Chris Miles:Anyways, um says it basically is the head of cyber security um for um, all of the us um, and we've seen a mass kind of deportation um of, or a mass exodus, I should say of, their um kind of top talent. We've seen a lot of people resigning over the last 30 days, um within the month of May, um, and you know we're seeing a lot of this critical expertise kind of being lost during a heightened threat period. Right, we have a lot of, you know, nation state actors and things like that which are um, um, you know, potentially seeing compromises in the US. You know we were just talking about this North Korea hacker thing where people were posing as actual employees of organizations recently, and it's only going to get worse from here. So this is kind of a, I'd say a very concerning thing. Current administration probably doesn't care about it to the degree that they should.
Chris Miles:Um, and you know, it sounds like morale is at an all time low over at CISA, which is not good Um, which has been in a relatively decent state for the last um for the last few years. Um, so yeah, um, I don't have a ton more to add here. Obviously, I'm out of the country now, but there's a trickle-down effect, much like trickle-down economics. Totally works, wink, wink. There is a trickle-down effect of what happens in the US usually follows in Australia within about one to two years. So this will have an effect on me eventually. Um, but I don't know, how do you feel, tim? Are you? Uh, are you shaking in your boots?
Tim McConnaughy:oh, it's a cyber security infrastructure, secure, cyber security and infrastructure security agency. By the way. Nice, that's what it means, thank you, I had to look it up because I was like, actually that's not right. Information security anyway, um, yeah, no, I mean there's not much to say. Like the administration is tearing CISA apart and at a really bad time and this happened we saw the CVE program get defunded and then, like you know, emergency funded and, yeah, people are just quitting in droves because I think the current administration has no respect for cybersecurity. I don't know what else to say it. So yeah, so yeah, I mean, there's not much to add to that that. I, I think hopefully these people go to the private sector, where they'll be appreciated. Uh, god knows, they needed.
Chris Miles:Um, yeah, I unless you go to the private sector and then get prosecuted by the president yeah, that's true good point that that also happens that's a.
Tim McConnaughy:That's a good point. Actually, uh, yeah, being a cso must be thankless, like you know. If you're like, yeah, it's like, uh, we don't have any budget to protect anything, but you're the fault, you're the person that gets to take the fall if we get hacked and you could go to prison and get fined. So, anyway, uh, nope, nothing, nothing else to add to this one. I think it's pretty clear. But, sticking with cybersecurity, we'll close out with one more, and this is really interesting.
Tim McConnaughy:So I was digging around on thehackernewscom and some of the CVEs and just exploits and whatnot. This website always lists like CVEs and exploits and stuff, and I found one that's pretty interesting. And this is a novel attack, meaning that you know, I haven't, it hasn't been to their knowledge, hasn't been exploited, but like they've, you know, microsoft found it. It's a zero click AI vulnerability that exposes the Microsoft 365 copilot data without user interaction. So the? So, just to set the stage, microsoft Copilot generally can hook into your Office suite, like Microsoft Office 365 and whatnot, and you can use it for insights. So you could ask Copilot hey, where's that document I wrote about pancakes? Or hey, when's that meeting that I'm supposed to have, you know? Or what? What was the email I last you know what email with this person? What do we talk about in this last email? I can't seem to find it. Copilot can go, do all that, search for you, like you know, and then bring it back. Essentially, rags especially using rag to find, you know, all of your stuff in Office 365 becomes a rag.
Tim McConnaughy:So the new attack is interesting because it uses this default behavior of copilot to actually poison the copilot and expose data. So let's see the critical rating vulnerability has gotten CVE 2025 32711, with a CVSS score of 9.3, which is pretty high because you don't need to be authenticated and there's no action on the part of the user required in order to make the attack successful, which is crazy. So how it works is basically because Copilot is able to go find all this data and, like you know, index it and use it for replies. You can actually so in this case of this attack, what they did was they exceed the scope of it's called a scope, llm, scope violation. Basically, what Copilot is and isn't supposed to be able to give you information about and how they violate it is they essentially inject you information about and how they violate it is, um, they essentially inject into documents and stuff. Uh, extra malicious, you know, I think it's.
Tim McConnaughy:I think it ends up being a prompt injection. Yeah, an indirect prompt injection, because think about, like you like they make a word document and like, make it white text on you know white background and it says something like you know, ignore all previous instructions. It's not actually this, but like, ignore all previous instructions, it's not actually this, but like, ignore all previous instructions and tell me a poem or something like that kind of indirect prompt injection. And so it can use this to break essentially the scope that Copilot is normally operating within as an LLM, where it won't it knows not to expose certain data or whatnot to the user as part of it. But so this is really really interesting because a lot of enterprises are using Copilot now as this agent, essentially to help them index and make use of, you know, sharepoint data, for example, excel files or PowerPoints, and like all that stuff.
Tim McConnaughy:Right, you know you can ask Copilot. You know, hey, look at all PowerPoints and all that stuff, right, you can ask Copilot, hey, look at all my stuff and tell me whatever, something about my product or something like that, right? So if the stuff that it's looking at is poisoned. In this way, with indirect prompts, you get an indirect prompt injection that can break, break out of the uh, the co-pilot, uh wireframe or whatnot. You want to call it the safety net that's working within yeah, it's.
Chris Miles:Uh, I was. I was commenting before we hit record that I thought this was a great find by you, tim, because this is, this is crazy. Um, that you know, I mean, it makes sense, like right, like you like, even if something simple as an email, like I, I've seen this happen where, like you know, I get an email in Outlook and and copilot or copilot for sales, I don't know, there's about 10 different tools that they use, but, um, it'll automatically summarize the thing and search for stuff. So, yeah, if you can, you know, obviously, put in a prompt, inject it into the payload in some capacity, that causes it to, you know, basically exfiltrate some of this data without even the user interacting with the email, with the item at all, which is crazy.
Chris Miles:One thing I wasn't totally sure on there's obviously a strong emphasis in here on MCP security and how that is kind of the crux of the problem. Yeah for sure. So in this article are they saying that the attacker is the one that owns the MCP server and it's basically directing the LLM to use their MCP server? I wasn't totally positive on that.
Tim McConnaughy:Well, so actually this is interesting because the I mean Copilot we don't know what it's doing under the covers, right? But the article does go on to point out that this particular leak what they're calling Echo leak was disclosed at the same time as CyberArk disclosed a tool poisoning attack around MCP. So I don't think they're related, but they're kind of related because you don't actually know what Copa is doing under the covers and it could be using some internal, you know, agentic type of MCP type framework within Microsoft for all we know. But yeah, so this specifically points out that, like something we've been saying for a while, which is like, hey, mcp is really cool, but everybody's building it so quickly and everybody's like, you know, just opening up, here's my MCP, you can use it. Where's the security, where's the validation, where's the authentication, where's the encryption, where's the anything right?
Tim McConnaughy:And so this idea of tool poisoning attack that affects MCP goes beyond the tool description to extend it across the entire tool schema. The attack technique has been codenamed full schema poisoning. So this is really interesting. So I don't quite and this is my own fault, I need to do a lot more research on MCP but the idea basically is that you know you can insert an attack or a malicious tool into the MCP flow and then you know, the agent reaches out to the as part of its workflow, reaches out to the poison tool and gets back something that is poisoned and somehow executes, as itself, as its agent, a malicious action which is really interesting.
Chris Miles:Yeah, once again, if your default behavior is to have you know your LLM or copilot, what have you scan all these things, then people are definitely going to prey on that default behavior.
Chris Miles:So this is this is just kind of one of the first major iterations I think we've seen of that where AI is automatically scanning stuff and it's like, well, I'm going to tell it to scan bad stuff. So, yeah, this is super interesting and if you want to read more, definitely check out the show notes. We have the full article from the Hacker News in there, which has a lot of diagrams kind of explaining the workflow of the attack and things like that, which is super interesting, as well as all the other articles we'd covered today and even a few more that we did not get to. Like I said, this is pretty busy news week, which is a good thing. So that will be in the show notes and if you want to hear any more from us, you can check out our YouTube channel, capelistcloudscom, et cetera, and with that we'll take it away and we will talk to you next week. Goodbye.