Data Splicing Attacks: Breaking Enterprise Data Loss Prevention

Vivek Ramachandran, Audrey Adeline

BSidesSF 2025 — Here Be Dragons · Day 1 · Main

Researchers from Square X introduced a new class of attack they call "data splicing" — five distinct techniques that systematically bypass both endpoint DLP and SASE/SSE proxy DLP solutions by exploiting fundamental architectural limitations. The techniques — including alternate binary communication channels, data sharding, encryption, encoding, and invisible character insertion — were demonstrated live, and an open-source toolkit called Angry Magpie was released to reproduce them. The conclusion: most enterprise DLP hasn't materially innovated in fifteen to seventeen years, and the browser is now the most critical — and least protected — data exfiltration surface. ---

AI review

This is the DLP industry's worst nightmare on a slide deck, backed by live demos and an open-source toolkit that anybody can run today. Five independent bypass techniques — any one of which defeats enterprise-grade solutions — demonstrated live, toolkit released, and the kill shot: most of the code was written with the free tier of ChatGPT. Drop everything.

Watch on YouTube