• About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
AimactGrow
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
AimactGrow
No Result
View All Result

One Click on Can Flip Perplexity’s Comet AI Browser Right into a Information Thief

Admin by Admin
October 5, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


Oct 04, 2025Ravie LakshmananAgentic AI / Enterprise Safety

Cybersecurity researchers have disclosed particulars of a brand new assault known as CometJacking concentrating on Perplexity’s agentic AI browser Comet by embedding malicious prompts inside a seemingly innocuous hyperlink to siphon delicate information, together with from related providers, like e-mail and calendar.

The sneaky immediate injection assault performs out within the type of a malicious hyperlink that, when clicked, triggers the sudden conduct unbeknownst to the victims.

“CometJacking reveals how a single, weaponized URL can quietly flip an AI browser from a trusted co-pilot to an insider menace,” Michelle Levy, Head of Safety Analysis at LayerX, mentioned in an announcement shared with The Hacker Information.

“This is not nearly stealing information; it is about hijacking the agent that already has the keys. Our analysis proves that trivial obfuscation can bypass information exfiltration checks and pull e-mail, calendar, and connector information off-box in a single click on. AI-native browsers want security-by-design for agent prompts and reminiscence entry, not simply web page content material.”

DFIR Retainer Services

The assault, in a nutshell, hijacks the AI assistant embedded within the browser to steal information, all whereas bypassing Perplexity’s information protections utilizing trivial Base64-encoding methods. The assault doesn’t embrace any credential theft part as a result of the browser already has licensed entry to Gmail, Calendar, and different related providers.

It takes place over 5 steps, activating when a sufferer clicks on a specifically crafted URL, both despatched in a phishing e-mail or current in an online web page. As an alternative of taking the person to the “supposed” vacation spot, the URL instructs the Comet browser’s AI to execute a hidden immediate that captures the person’s information from, say, Gmail, obfuscates it utilizing Base64-encoding, and transmits the data to an endpoint underneath the attacker’s management.

The crafted URL is a question string directed on the Comet AI browser, with the malicious instruction added utilizing the “assortment” parameter of the URL, inflicting the agent to seek the advice of its reminiscence slightly than carry out a dwell internet search.

Whereas Perplexity has labeled the findings as having “no safety influence,” they as soon as once more spotlight how AI-native instruments introduce new safety dangers that may get round conventional defenses, enable dangerous actors to commandeer them to do their bidding, and expose customers and organizations to potential information theft within the course of.

CIS Build Kits

In August 2020, Guardio Labs disclosed an assault method dubbed Scamlexity whereby browsers like Comet might be tricked by menace actors into interacting with phishing touchdown pages or counterfeit e-commerce storefronts with out the human person’s data or intervention.

“AI browsers are the following enterprise battleground,” Or Eshed, CEO of LayerX, mentioned. “When an attacker can direct your assistant with a hyperlink, the browser turns into a command-and-control level inside the corporate perimeter. Organizations should urgently consider controls that detect and neutralize malicious agent prompts earlier than these PoCs turn into widespread campaigns.”

Tags: BrowserClickCometDataPerplexitysThiefturn
Admin

Admin

Next Post
A breach each month raises doubts about South Korea’s digital defenses

A breach each month raises doubts about South Korea's digital defenses

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

Oblivion Remastered quietly retains the modding legacy alive – with out Bethesda’s assist

Oblivion Remastered quietly retains the modding legacy alive – with out Bethesda’s assist

April 25, 2025
If You Deleted This Bizarre New Folder in Home windows, You Must Put It Again. Here is How

If You Deleted This Bizarre New Folder in Home windows, You Must Put It Again. Here is How

April 14, 2025

Trending.

AI-Assisted Menace Actor Compromises 600+ FortiGate Gadgets in 55 Nations

AI-Assisted Menace Actor Compromises 600+ FortiGate Gadgets in 55 Nations

February 23, 2026
10 tricks to begin getting ready! • Yoast

10 tricks to begin getting ready! • Yoast

July 21, 2025
Exporting a Material Simulation from Blender to an Interactive Three.js Scene

Exporting a Material Simulation from Blender to an Interactive Three.js Scene

August 20, 2025
Moonshot AI Releases 𝑨𝒕𝒕𝒆𝒏𝒕𝒊𝒐𝒏 𝑹𝒆𝒔𝒊𝒅𝒖𝒂𝒍𝒔 to Exchange Mounted Residual Mixing with Depth-Sensible Consideration for Higher Scaling in Transformers

Moonshot AI Releases 𝑨𝒕𝒕𝒆𝒏𝒕𝒊𝒐𝒏 𝑹𝒆𝒔𝒊𝒅𝒖𝒂𝒍𝒔 to Exchange Mounted Residual Mixing with Depth-Sensible Consideration for Higher Scaling in Transformers

March 16, 2026
Design Has By no means Been Extra Vital: Inside Shopify’s Acquisition of Molly

Design Has By no means Been Extra Vital: Inside Shopify’s Acquisition of Molly

September 8, 2025

AimactGrow

Welcome to AimactGrow, your ultimate source for all things technology! Our mission is to provide insightful, up-to-date content on the latest advancements in technology, coding, gaming, digital marketing, SEO, cybersecurity, and artificial intelligence (AI).

Categories

  • AI
  • Coding
  • Cybersecurity
  • Digital marketing
  • Gaming
  • SEO
  • Technology

Recent News

Spies hack high-value mail servers utilizing an exploit from yesteryear

Researchers disclose vulnerabilities in IP KVMs from 4 producers

March 18, 2026
8 Leon Kennedy Scenes from Resident Evil Requiem that Turned Newbies Into Followers

8 Leon Kennedy Scenes from Resident Evil Requiem that Turned Newbies Into Followers

March 18, 2026
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved