{"id":3780,"date":"2025-12-09T13:43:22","date_gmt":"2025-12-09T13:43:22","guid":{"rendered":"https:\/\/ft365.org\/index.php\/2025\/12\/09\/uk-ncsc-raises-alarms-over-prompt-injection-attacks\/"},"modified":"2025-12-09T13:43:22","modified_gmt":"2025-12-09T13:43:22","slug":"uk-ncsc-raises-alarms-over-prompt-injection-attacks","status":"publish","type":"post","link":"http:\/\/ft365.org\/index.php\/2025\/12\/09\/uk-ncsc-raises-alarms-over-prompt-injection-attacks\/","title":{"rendered":"UK NCSC Raises Alarms Over Prompt Injection Attacks"},"content":{"rendered":"<div>\n<p><img decoding=\"async\" src=\"https:\/\/ft365.org\/wp-content\/uploads\/2025\/06\/localimages\/ea721ff9-8ba4-4d88-b386-57e9e1606077.jpg?width=64&#038;height=64&#038;mode=crop&#038;scale=both&#038;format=webp\" alt=\"Photo of Phil Muncaster\" loading=\"lazy\"><\/p>\n<\/div>\n<div id=\"cphContent_pnlArticleBody\" data-layout-id=\"2\" data-edit-folder-name=\"text\" data-index=\"0\">\n<p>Prompt injection vulnerabilities may never be fully mitigated as a category and network defenders should instead focus on ways to reduce their impact, government security experts have warned.<\/p>\n<p>Then National Cyber Security Centre (NCSC) technical director for platforms research, David C, warned security professionals not to treat prompt injection like SQL injection.<\/p>\n<p>\u201cSQL injection is \u2026 illustrative of a recurring problem in cybersecurity; that is, \u2018data\u2019 and \u2018instructions\u2019 being handled incorrectly,\u201d he explained.<\/p>\n<p>\u201cThis allows an attacker to supply \u2018data\u2019 that is executed by the system as an instruction. It\u2019s the same underlying issue for many other critical vulnerability types that include cross-site scripting and exploitation of buffer overflows.\u201d<\/p>\n<p>However, the same rules don\u2019t apply to prompt injection, because large language models (LLMs) don\u2019t distinguish between data and instructions.<\/p>\n<p>\u201cWhen you provide an LLM prompt, it doesn\u2019t understand the text it in the way a person does. It is simply predicting the most likely next token from the text so far,\u201d the blog continued.<\/p>\n<p>\u201cAs there is no inherent distinction between \u2018data\u2019 and \u2018instruction\u2019, it\u2019s very possible that prompt injection attacks may never be totally mitigated in the way that SQL injection attacks can be.\u201d<\/p>\n<p>This is why mitigations such as detecting prompt injection attempts, training models to prioritize \u201cinstructions\u201d over \u201cdata,\u201d and explaining to a model what \u201cdata\u201d is are doomed to failure, David C argued.<\/p>\n<p><em>Read more on prompt injection attacks: \u201cPromptFix\u201d Attacks Could Supercharge Agentic AI Threats<\/em><\/p>\n<p>A better way to approach the challenge is to look at prompt injection not as code injection but exploitation of an \u201cinherently confusable deputy.\u201d<\/p>\n<p>David C argued that LLMs are \u201cinherently confusable\u201d because the risk can\u2019t be fully mitigated.<\/p>\n<p>\u201cRather than hoping we can apply a mitigation that fixes prompt injection, we instead need to approach it by seeking to reduce the risk and the impact. If the system\u2019s security cannot tolerate the remaining risk, it may not be a good use case for LLMs,\u201d he explained.<\/p>\n<h2>Reducing Prompt Injection Risks<\/h2>\n<p>The NCSC suggested the following steps to reduce prompt injection risk, all of which are aligned to ETSI (TS 104 223) on Baseline Cyber Security Requirements for AI Models and Systems.<\/p>\n<ul>\n<li>Developer\/security team\/organizational awareness of this class of vulnerabilities\u00a0and that there will always be a residual risk that can\u2019t be fully mitigated with a product or appliance<\/li>\n<li>Secure LLM design, especially if the LLM calls tools or uses APIs based on its output. Protections should focus on non-LLM safeguards that constrain the actions of the system, such as preventing a model that processes emails from external individuals from having access to privileged tools<\/li>\n<li>Make it harder to inject malicious prompts, such as marking \u201cdata\u201d sections as separate to \u201cinstructions\u201d<\/li>\n<li>Monitoring logging information to identify suspicious activity, such as failed tool\/API calls<\/li>\n<\/ul>\n<p>Failure to address the challenge early on could lead to a similar situation to SQL injection bugs, which have\u00a0only recently become much rarer.<\/p>\n<p>\u201cWe risk seeing this pattern repeated with prompt injection, as we are on a path to embed genAI into most applications,\u201d David C concluded.<\/p>\n<p>\u201cIf those applications are not designed with prompt injection in mind, a similar wave of breaches may follow.\u201d<\/p>\n<p>Exabeam chief AI officer, Steve Wilson, agreed that current approaches to tackling prompt injection are failing.<\/p>\n<p>\u201cCISOs need to shift their mindset. Defending AI agents is less like securing traditional software and far more like defending the humans inside an organization. Agents, like people, are messy, adaptive, and prone to being manipulated, coerced\u00a0or confused,\u201d he added.<\/p>\n<p>\u201cThat makes them more analogous to insider threats than to classic application components. Whether dealing with a malicious prompt, compromised upstream data\u00a0or unintended reasoning pathways, constant vigilance is required. Effective AI security will come not from magical layers of protection, but from operational discipline, monitoring, containment\u00a0and the expectation that these systems will continue to behave unpredictably for years to come.\u201d<\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Prompt injection vulnerabilities may never be fully mitigated as a category and network defenders should instead focus on ways to reduce their impact, government security experts have warned. Then National Cyber Security Centre (NCSC) technical director for platforms research, David C, warned security professionals not to treat prompt injection like SQL injection. \u201cSQL injection is<\/p>\n","protected":false},"author":2,"featured_media":3781,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-3780","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"featured_image_urls":{"full":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/12\/3780-dc76f2e3-e86f-4258-a615-18eef182a649.jpg",300,300,false],"thumbnail":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/12\/3780-dc76f2e3-e86f-4258-a615-18eef182a649-150x150.jpg",150,150,true],"medium":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/12\/3780-dc76f2e3-e86f-4258-a615-18eef182a649.jpg",300,300,false],"medium_large":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/12\/3780-dc76f2e3-e86f-4258-a615-18eef182a649.jpg",300,300,false],"large":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/12\/3780-dc76f2e3-e86f-4258-a615-18eef182a649.jpg",300,300,false],"1536x1536":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/12\/3780-dc76f2e3-e86f-4258-a615-18eef182a649.jpg",300,300,false],"2048x2048":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/12\/3780-dc76f2e3-e86f-4258-a615-18eef182a649.jpg",300,300,false],"morenews-featured":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/12\/3780-dc76f2e3-e86f-4258-a615-18eef182a649.jpg",300,300,false],"morenews-large":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/12\/3780-dc76f2e3-e86f-4258-a615-18eef182a649.jpg",300,300,false],"morenews-medium":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/12\/3780-dc76f2e3-e86f-4258-a615-18eef182a649.jpg",300,300,false],"crawlomatic_preview_image":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/12\/3780-dc76f2e3-e86f-4258-a615-18eef182a649-146x146.jpg",146,146,true]},"author_info":{"display_name":"henry","author_link":"http:\/\/ft365.org\/index.php\/author\/henry\/"},"category_info":"<a href=\"http:\/\/ft365.org\/index.php\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","tag_info":"Uncategorized","comment_count":"0","_links":{"self":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts\/3780","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/comments?post=3780"}],"version-history":[{"count":0,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts\/3780\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/media\/3781"}],"wp:attachment":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/media?parent=3780"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/categories?post=3780"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/tags?post=3780"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}