Grok-4 Jailbreaked With Combination of Echo Chamber and Crescendo Attack

The success rates indicate that current LLM safety measures may be inadequate against sophisticated multi-turn attack strategies that exploit conversational context rather than relying on overtly harmful input patterns. The research, published by NeuralTrust on July 11, 2025, shows how the Echo Chamber Attack can be enhanced when combined with the Crescendo attack to manipulate AI systems into generating harmful content. The research demonstrates that adversarial prompting techniques can achieve harmful objectives through subtle, persistent manipulation across multiple conversational turns, effectively bypassing traditional safety measures. When the persuasion cycle reaches a “stale” state where progress stagnates, the Crescendo technique provides additional conversational turns to push the model past its safety thresholds. Uses subtle "poisonous context" and conversational manipulation, with Crescendo providing additional push when Echo Chamber stalls. Notably, some successful attacks required only two additional Crescendo turns beyond the initial Echo Chamber setup, with one instance achieving the malicious objective in a single turn without requiring the Crescendo component. The Echo Chamber component begins by introducing poisoned context through steering seeds, followed by a persuasion cycle that gradually nudges the model toward harmful objectives. Researchers merged Echo Chamber and Crescendo jailbreak techniques to bypass AI safety mechanisms more effectively than individual methods. The attack begins with milder steering seeds to avoid triggering immediate safeguards, then systematically builds toward the malicious objective through seemingly benign conversational turns. The implications extend beyond academic research, highlighting the urgent need for enhanced LLM security frameworks that can detect and prevent sophisticated multi-turn manipulation attempts. The new approach integrates this technique with the Crescendo attack method, creating a more sophisticated multi-turn exploitation strategy. Grok-4 has been jailbroken using a new strategy that combines two different jailbreak methods to bypass artificial intelligence security measures.

This Cyber News was published on cybersecuritynews.com. Publication date: Mon, 14 Jul 2025 06:25:13 +0000


Cyber News related to Grok-4 Jailbreaked With Combination of Echo Chamber and Crescendo Attack

Grok-4 Jailbreaked With Combination of Echo Chamber and Crescendo Attack - The success rates indicate that current LLM safety measures may be inadequate against sophisticated multi-turn attack strategies that exploit conversational context rather than relying on overtly harmful input patterns. The research, published by ...
1 day ago Cybersecuritynews.com
Grok 4 spotted ahead of launch with special coding features - Grok 4 Code (grok-4-code-0629) — Engineering Intelligence Unleashed — a model purpose-built to be your coding companion. Elon Musk-funded xAI is skipping Grok 3.5 and releasing Grok 4 after Independence Day in the United States, and it ...
1 week ago Bleepingcomputer.com
Unauthorized Access to Grok-3 AI Achieved via Client-Side Code Exploitation - A researcher with the handle “single mode” has demonstrated how client-side code manipulation can bypass access controls and gain unauthorized access to Grok-3, an AI model integrated into Elon Musk’s X platform. The script modifies ...
4 months ago Cybersecuritynews.com
xAI prepares Grok 4 Code as it plans to take on Claude and Gemini - xAI is planning to release Grok 4 without Vision and Image support after Independence Day in the United States of America. xAI is preparing the rollout of Grok 4, which replaces Grok 3 as the new state-of-the-art model. One of the models is ...
1 week ago Bleepingcomputer.com
European firms urge China to give more clarity on data transfer laws - AP Moeller - Maersk A/S Siemens AG BEIJING, Nov 15 - European firms "Urgently" need China to give clearer definitions of key terms in its cross-border data transfer rules, a European business lobby group said on Wednesday, warning firms also stood to ...
1 year ago Reuters.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
1 year ago Esecurityplanet.com
xAI Dev Leaked API Key on GitHub for Private SpaceX, Tesla & Twitter/X - The exposed credentials provided unauthorized access to private large language models (LLMs) specifically fine-tuned for SpaceX, Tesla, and Twitter/X internal operations, highlighting critical vulnerabilities in credential security practices even at ...
2 months ago Cybersecuritynews.com
Attack Vector vs Attack Surface: The Subtle Difference - Cybersecurity discussions about "Attack vectors" and "Attack surfaces" sometimes use these two terms interchangeably. This article guides you through the distinctions between attack vectors and attack surfaces to help you better understand the two ...
2 years ago Trendmicro.com
xAI Dev Leaks API Key for Private SpaceX, Tesla LLMs – Krebs on Security - An employee at Elon Musk’s artificial intelligence company xAI leaked a private key on GitHub that for the past two months could have allowed anyone to query private xAI large language models (LLMs) which appear to have been custom made for ...
2 months ago Krebsonsecurity.com
Rug Pull Schemes: Crypto Investor Losses Near $1M - Check Point's Threat Intel Blockchain system has revealed a new scam, shedding light on the persistent threat of Rug Pulls - a deceptive tactic causing financial losses for investors. The company's system recently identified suspicious activities ...
1 year ago Infosecurity-magazine.com
CVE-2025-21733 - In the Linux kernel, the following vulnerability has been resolved: ...
4 months ago
Researchers Jailbreaked 17 Popular LLM Models To Communicate Sensitive Data - Researchers demonstrated this by using a repeated token attack, where after generating the character “A” thousands of times, the model unexpectedly outputted content from a webpage that had been incorporated into its training data. ...
4 months ago Cybersecuritynews.com
CVE-2022-49075 - In the Linux kernel, the following vulnerability has been resolved: ...
4 months ago
7 Best Attack Surface Management Software for 2024 - Attack surface management is a relatively new cybersecurity technology that combines elements of vulnerability management and asset discovery with the automation capabilities of breach and attack simulation and applies them to an organization's ...
1 year ago Esecurityplanet.com
CVE-2025-23917 - Missing Authorization vulnerability in Chandrika Guntur, Morgan Kay Chamber Dashboard Business Directory allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Chamber Dashboard Business Directory: from n/a through ...
5 months ago Tenable.com
CVE-2025-32162 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Morgan Kay Chamber Dashboard Business Directory allows DOM-Based XSS. This issue affects Chamber Dashboard Business Directory: from n/a ...
3 months ago
CVE-2022-49006 - In the Linux kernel, the following vulnerability has been resolved: tracing: Free buffers when a used dynamic event is removed After 65536 dynamic events have been added and removed, the "type" field of the event then uses the first type number that ...
8 months ago Tenable.com
CVE-2024-50194 - In the Linux kernel, the following vulnerability has been resolved: arm64: probes: Fix uprobes for big-endian kernels The arm64 uprobes code is broken for big-endian kernels as it doesn't convert the in-memory instruction encoding (which is always ...
8 months ago Tenable.com
CVE-2021-22144 - In Elasticsearch versions before 7.13.3 and 6.8.17 an uncontrolled recursion vulnerability that could lead to a denial of service attack was identified in the Elasticsearch Grok parser. A user with the ability to submit arbitrary queries to ...
3 years ago
CVE-2022-49888 - In the Linux kernel, the following vulnerability has been resolved: ...
2 months ago
CVE-2021-1588 - A vulnerability in the MPLS Operation, Administration, and Maintenance (OAM) feature of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due ...
3 years ago
CVE-2024-36478 - In the Linux kernel, the following vulnerability has been resolved: ...
7 months ago
CVE-2021-46933 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
CVE-2021-47011 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
Attack Surface Management: What is it? Why do you need it? - Traditional asset inventory and vulnerability management software can't keep up to date with the growing attack surface and morphing vulnerabilities. Contrary to other cybersecurity software, Attack Surface Management software operates from a ...
1 year ago Securityboulevard.com

Latest Cyber News


Cyber Trends (last 7 days)