Researchers Hack Gemini AI to Control Smart Home Devices via Calendar Invites

Reviewed byNidhi Govil

18 Sources

Share

Cybersecurity researchers demonstrate a novel "promptware" attack on Google's Gemini AI, using malicious calendar invites to manipulate smart home devices, raising concerns about AI safety and real-world implications.

Novel "Promptware" Attack Exploits Gemini AI

Researchers from Tel Aviv University, Technion Israel Institute of Technology, and SafeBreach have demonstrated a groundbreaking security vulnerability in Google's Gemini AI system. This "promptware" attack, dubbed "Invitation is All You Need," showcases how malicious actors could potentially manipulate smart home devices through cleverly crafted calendar invites

1

.

Source: Gizmodo

Source: Gizmodo

Attack Mechanism and Real-World Impact

The attack leverages Gemini's integration with Google's app ecosystem, particularly its ability to access calendars and control smart home devices. By embedding malicious instructions within seemingly innocent calendar event descriptions, the researchers tricked Gemini into executing unauthorized commands when asked to summarize the user's schedule

2

.

In controlled demonstrations, the team successfully:

  1. Turned off lights
  2. Opened smart shutters
  3. Activated a connected boiler
  4. Sent spam messages
  5. Leaked emails
  6. Initiated Zoom calls
  7. Downloaded files without user consent

This marks what researchers believe to be the first instance of an AI-based attack causing physical, real-world consequences

3

.

Technical Details of the Exploit

The attack utilizes an indirect prompt injection technique, where malicious instructions are hidden within calendar invite descriptions. When Gemini processes these events, it unknowingly activates a set of pre-programmed actions. The researchers demonstrated that common user responses like "thank you" or "sure" could trigger these hidden commands

4

.

Source: PC Magazine

Source: PC Magazine

Implications for AI Safety and Integration

This vulnerability raises significant concerns about the safety of integrating AI systems with physical devices and autonomous systems. Ben Nassi, a researcher at Tel Aviv University, emphasized the importance of securing large language models (LLMs) before their integration with machines where outcomes could affect physical safety

2

.

Google's Response and Mitigation Efforts

Upon being notified of the vulnerability in February 2025, Google implemented several fixes and enhanced safeguards for Gemini. Andy Wen, senior director of security product management at Google Workspace, confirmed that new defenses are now in place to protect users

3

.

Google's mitigation strategies include:

  1. Filtering outputs
  2. Requiring explicit user confirmation for sensitive actions
  3. Implementing AI-driven detection of suspect prompts

Recommendations for Users

While Google has addressed this specific vulnerability, experts recommend several general security practices for smart home users

5

:

  1. Keep all devices and apps updated with the latest firmware and security patches
  2. Be cautious when accepting calendar invites from unknown sources
  3. Regularly review and manage app permissions
  4. Consider disabling AI assistants' access to sensitive information or devices when not needed
Source: Android Police

Source: Android Police

Future Implications

As AI systems become more integrated into our daily lives and physical environments, this research underscores the critical need for robust security measures and ongoing vigilance. The incident serves as a wake-up call for both developers and users of AI-powered smart home technologies, highlighting the potential risks as these systems evolve and gain more capabilities.

Explore today's top stories

TheOutpost.ai

Your Daily Dose of Curated AI News

Don’t drown in AI news. We cut through the noise - filtering, ranking and summarizing the most important AI news, breakthroughs and research daily. Spend less time searching for the latest in AI and get straight to action.

© 2025 Triveous Technologies Private Limited
Instagram logo
LinkedIn logo