• About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
AimactGrow
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
AimactGrow
No Result
View All Result

One Click on Can Flip Perplexity’s Comet AI Browser Right into a Information Thief

Admin by Admin
October 5, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


Oct 04, 2025Ravie LakshmananAgentic AI / Enterprise Safety

Cybersecurity researchers have disclosed particulars of a brand new assault known as CometJacking concentrating on Perplexity’s agentic AI browser Comet by embedding malicious prompts inside a seemingly innocuous hyperlink to siphon delicate information, together with from related providers, like e-mail and calendar.

The sneaky immediate injection assault performs out within the type of a malicious hyperlink that, when clicked, triggers the sudden conduct unbeknownst to the victims.

“CometJacking reveals how a single, weaponized URL can quietly flip an AI browser from a trusted co-pilot to an insider menace,” Michelle Levy, Head of Safety Analysis at LayerX, mentioned in an announcement shared with The Hacker Information.

“This is not nearly stealing information; it is about hijacking the agent that already has the keys. Our analysis proves that trivial obfuscation can bypass information exfiltration checks and pull e-mail, calendar, and connector information off-box in a single click on. AI-native browsers want security-by-design for agent prompts and reminiscence entry, not simply web page content material.”

DFIR Retainer Services

The assault, in a nutshell, hijacks the AI assistant embedded within the browser to steal information, all whereas bypassing Perplexity’s information protections utilizing trivial Base64-encoding methods. The assault doesn’t embrace any credential theft part as a result of the browser already has licensed entry to Gmail, Calendar, and different related providers.

It takes place over 5 steps, activating when a sufferer clicks on a specifically crafted URL, both despatched in a phishing e-mail or current in an online web page. As an alternative of taking the person to the “supposed” vacation spot, the URL instructs the Comet browser’s AI to execute a hidden immediate that captures the person’s information from, say, Gmail, obfuscates it utilizing Base64-encoding, and transmits the data to an endpoint underneath the attacker’s management.

The crafted URL is a question string directed on the Comet AI browser, with the malicious instruction added utilizing the “assortment” parameter of the URL, inflicting the agent to seek the advice of its reminiscence slightly than carry out a dwell internet search.

Whereas Perplexity has labeled the findings as having “no safety influence,” they as soon as once more spotlight how AI-native instruments introduce new safety dangers that may get round conventional defenses, enable dangerous actors to commandeer them to do their bidding, and expose customers and organizations to potential information theft within the course of.

CIS Build Kits

In August 2020, Guardio Labs disclosed an assault method dubbed Scamlexity whereby browsers like Comet might be tricked by menace actors into interacting with phishing touchdown pages or counterfeit e-commerce storefronts with out the human person’s data or intervention.

“AI browsers are the following enterprise battleground,” Or Eshed, CEO of LayerX, mentioned. “When an attacker can direct your assistant with a hyperlink, the browser turns into a command-and-control level inside the corporate perimeter. Organizations should urgently consider controls that detect and neutralize malicious agent prompts earlier than these PoCs turn into widespread campaigns.”

Tags: BrowserClickCometDataPerplexitysThiefturn
Admin

Admin

Next Post
A breach each month raises doubts about South Korea’s digital defenses

A breach each month raises doubts about South Korea's digital defenses

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

New Chrome Zero-Day Actively Exploited; Google Points Emergency Out-of-Band Patch

New Chrome Zero-Day Actively Exploited; Google Points Emergency Out-of-Band Patch

June 3, 2025
36 touchdown web page examples + conversion secrets and techniques from HubSpot strategists

36 touchdown web page examples + conversion secrets and techniques from HubSpot strategists

June 5, 2025

Trending.

Learn how to Watch Auckland Metropolis vs. Boca Juniors From Anyplace for Free: Stream FIFA Membership World Cup Soccer

Learn how to Watch Auckland Metropolis vs. Boca Juniors From Anyplace for Free: Stream FIFA Membership World Cup Soccer

June 24, 2025
Begin constructing with Gemini 2.0 Flash and Flash-Lite

Begin constructing with Gemini 2.0 Flash and Flash-Lite

April 14, 2025
New Assault Makes use of Home windows Shortcut Information to Set up REMCOS Backdoor

New Assault Makes use of Home windows Shortcut Information to Set up REMCOS Backdoor

August 3, 2025
The most effective methods to take notes for Blue Prince, from Blue Prince followers

The most effective methods to take notes for Blue Prince, from Blue Prince followers

April 20, 2025
Menace Actors Use Pretend DocuSign Notifications to Steal Company Information

Menace Actors Use Pretend DocuSign Notifications to Steal Company Information

May 28, 2025

AimactGrow

Welcome to AimactGrow, your ultimate source for all things technology! Our mission is to provide insightful, up-to-date content on the latest advancements in technology, coding, gaming, digital marketing, SEO, cybersecurity, and artificial intelligence (AI).

Categories

  • AI
  • Coding
  • Cybersecurity
  • Digital marketing
  • Gaming
  • SEO
  • Technology

Recent News

UK House Workplace Seeks Apple Backdoor Entry

UK House Workplace Seeks Apple Backdoor Entry

October 6, 2025
AI Rivals Radiologists in Most cancers Detection

AI Rivals Radiologists in Most cancers Detection

October 6, 2025
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved