Close Menu
    Main Menu
    • Home
    • News
    • Tech
    • Robotics
    • ML & Research
    • AI
    • Digital Transformation
    • AI Ethics & Regulation
    • Thought Leadership in AI

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Konni Hackers Deploy AI-Generated PowerShell Backdoor Towards Blockchain Builders

    January 26, 2026

    The 5 Varieties Of Organizational Buildings For The New World Of Work

    January 26, 2026

    5 Breakthroughs in Graph Neural Networks to Watch in 2026

    January 26, 2026
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Home»AI Ethics & Regulation»HashJack Assault Makes use of URL ‘#’ to Management AI Browser Conduct – Hackread – Cybersecurity Information, Information Breaches, Tech, AI, Crypto and Extra
    AI Ethics & Regulation

    HashJack Assault Makes use of URL ‘#’ to Management AI Browser Conduct – Hackread – Cybersecurity Information, Information Breaches, Tech, AI, Crypto and Extra

    Declan MurphyBy Declan MurphyNovember 30, 2025No Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    HashJack Assault Makes use of URL ‘#’ to Management AI Browser Conduct – Hackread – Cybersecurity Information, Information Breaches, Tech, AI, Crypto and Extra
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    On November 25, 2025, cybersecurity agency Cato Networks revealed HashJack, a brand new menace the place the straightforward pound signal (#) in an online handle (URL) hides malicious directions for AI browser assistants like Google’s Gemini, Microsoft’s Copilot, and Perplexity’s Comet.

    The Vulnerability

    HashJack is the primary of its sort instance of an oblique immediate injection approach, the place an attacker hides instructions in content material the AI will learn later, on this case, the URL itself. This permits HashJack to use how AI assistants learn the complete URL, together with the part after the # (the URL fragment), which net servers usually ignore.

    This permits unhealthy actors to weaponise any professional web site with out hacking the location itself. As Cato Networks’ senior safety researcher Vitaly Simonovich explains, the weak spot is within the AI assistant’s dealing with of the URL. Since customers belief the professional website, they belief the AI’s manipulated recommendation.

    The hidden instructions can result in quite a lot of malicious actions, together with tricking customers into revealing their login particulars (credential theft) and even giving false health-related recommendation (medical hurt). Extra regarding is that, in superior agentic modes (the place the AI performs duties routinely), the assistant will be instructed to steal delicate consumer knowledge (knowledge exfiltration) by fetching an attacker’s URL within the background.

    Moreover, the AI will be guided to present step-by-step directions for dangerous technical duties, equivalent to opening system ports or downloading a package deal that’s really malware. Researchers additionally famous that in some superior AI browsers, like Perplexity’s Comet, the assault may even escalate to the AI assistant routinely fetching and sending consumer knowledge to an exterior handle.

    HashJack assault chain (Supply: Cato Networks)

    Blended Response from Tech Giants

    The Cato Networks menace analysis crew disclosed their findings to the affected firms beginning in July and August of 2025. Microsoft responded shortly, making use of a repair for Copilot for Edge on October 27. Perplexity additionally utilized a repair for his or her Comet browser by November 18, 2025.

    Google, nonetheless, has not but resolved the difficulty for Gemini in Chrome. The report was marked by Google Abuse VRP / Belief & Security in October 2025 as “Received’t Repair (Meant Behaviour)” with a low severity score. It’s value noting that the difficulty remained unresolved on the time the analysis was revealed.

    Watch the video demonstration of the HashJack assault shared by Cato Networks:

    The findings from Cato CTRL™ Risk Analysis, shared completely with Hackread.com, introduce a brand new class of AI safety danger as a result of malicious instructions are hidden in URL fragments, bypassing conventional firewalls. This discovery reminds the trade that, as AI assistants deal with delicate knowledge, distributors should urgently repair flaws in AI design to forestall future context manipulation assaults.



    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Declan Murphy
    • Website

    Related Posts

    Konni Hackers Deploy AI-Generated PowerShell Backdoor Towards Blockchain Builders

    January 26, 2026

    Microsoft Open-Sources winapp, a New CLI Instrument for Streamlined Home windows App Growth

    January 26, 2026

    The cybercrime business continues to problem CISOs in 2026

    January 25, 2026
    Top Posts

    Evaluating the Finest AI Video Mills for Social Media

    April 18, 2025

    Konni Hackers Deploy AI-Generated PowerShell Backdoor Towards Blockchain Builders

    January 26, 2026

    Utilizing AI To Repair The Innovation Drawback: The Three Step Resolution

    April 18, 2025

    Midjourney V7: Quicker, smarter, extra reasonable

    April 18, 2025
    Don't Miss

    Konni Hackers Deploy AI-Generated PowerShell Backdoor Towards Blockchain Builders

    By Declan MurphyJanuary 26, 2026

    Ravie LakshmananJan 26, 2026Malware / Endpoint Safety The North Korean menace actor often called Konni…

    The 5 Varieties Of Organizational Buildings For The New World Of Work

    January 26, 2026

    5 Breakthroughs in Graph Neural Networks to Watch in 2026

    January 26, 2026

    Hadrian raises funding for automated manufacturing, bringing valuation to $1.6B

    January 26, 2026
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    UK Tech Insider
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms Of Service
    • Our Authors
    © 2026 UK Tech Insider. All rights reserved by UK Tech Insider.

    Type above and press Enter to search. Press Esc to cancel.