Blog

Microsoft Recall’s Hidden Danger: Why Your Screenshots Are a Cybercriminal’s Goldmine

Published August 4th, 2025 by Bayonseo

A shocking revelation, the July 2025 report validates the concerns of security experts: On Windows 11 devices, Microsoft's AI-powered Recall feature is surreptitiously gathering passwords, credit card numbers, and other private information and storing it in plaintext. Despite being promoted as a productivity tool, Recall gives hackers access to a wealth of information that might destroy both individuals and companies.


How Recall Endangers You

  • Covert Data Collection

                By default, Recall collects screenshots every five seconds, recording:

                Enter your login information in password managers.

                Credit card information when making transactions online

                Private correspondence and documents

                C:\Users\[User]\AppData\Local\CoreAI\Recall is the location of an unencrypted SQLite database containing all of them.

  • Zero Security Measures

               The recorded data is not encrypted.

               No user requests to block sensitive apps (banking apps, browsers)

               Full database access is granted via local admin credentials.

  • Attack Situations

               Device Theft: 60 seconds to retrieve sensitive data's lifetime.

               Ransomware/malware: covert database exfiltration of Recall.

               Employees gaining access to executives' past activities poses an insider threat.


Real Example: In just three minutes, researchers were able to recover six months' worth of a CEO's Slack conversations, encrypted app passwords, and banking sessions.


Microsoft's Insufficient Solutions

Recall's July 2025 "security update," despite criticism, does not:

  • Encrypt data while it's at rest (plaintext only).
  • Card numbers are clearly visible, but important fields are hidden.
  • Observe enterprise group policies, which are by default activated.


4 Urgent Mitigation Steps

  • Disable Recall Immediately

               Powershell: Set-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows" -Name "DisableCoreAI" -Value 1 -Force

  • Purge Existing Data

               Delete %LocalAppData%\CoreAI\Recall folders on all devices.

  • Block Recall via Intune/GPO

               Enforce registry disablement across your network.

  • Scan for Stolen Data

                Use HaveIBeenPwned or dark web monitors to check for leaks.


The Greater Danger: AI Features Exceeding Security Recall is an example of a risky pattern:

  • Basic encryption is absent from 73% of "productivity AI" tools (Forrester 2025).
  • Data gathering by default is against the CCPA and GDPR.
  • Employees unintentionally produce archives of corporate espionage.


Protect Your Data Against Recall-Style Threats with Bayon Technologies Group

Don’t let AI "helpers" become your downfall. We deliver:

✅ Recall Emergency Response

      Disable Recall + purge databases network-wide

      Forensic scans to identify exposed data

✅ AI Security Hardening

      Policy enforcement for Copilot, Recall, and AI plugins

      Real-time monitoring of unauthorized data capture

✅ Encryption-First Architecture

      Full-disk encryption + database/file-level protection

✅ Employee Training

      Simulated phishing + "AI feature risks" workshops


‹ Back