Close Menu
    Main Menu
    • Home
    • News
    • Tech
    • Robotics
    • ML & Research
    • AI
    • Digital Transformation
    • AI Ethics & Regulation
    • Thought Leadership in AI

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Robotic Speak Episode 129 – Automating museum experiments, with Yuen Ting Chan

    October 18, 2025

    Malicious Perplexity Comet Browser Obtain Adverts Push Malware By way of Google – Hackread – Cybersecurity Information, Information Breaches, Tech, AI, Crypto and Extra

    October 18, 2025

    How Enterprises Ought to Harden Blockchain Apps in Cloud

    October 18, 2025
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Home»AI Ethics & Regulation»Malicious Perplexity Comet Browser Obtain Adverts Push Malware By way of Google – Hackread – Cybersecurity Information, Information Breaches, Tech, AI, Crypto and Extra
    AI Ethics & Regulation

    Malicious Perplexity Comet Browser Obtain Adverts Push Malware By way of Google – Hackread – Cybersecurity Information, Information Breaches, Tech, AI, Crypto and Extra

    Declan MurphyBy Declan MurphyOctober 18, 2025No Comments2 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Malicious Perplexity Comet Browser Obtain Adverts Push Malware By way of Google – Hackread – Cybersecurity Information, Information Breaches, Tech, AI, Crypto and Extra
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    A brand new malvertising marketing campaign is benefiting from the recognition of Perplexity’s just lately launched Comet browser, tricking customers into downloading a malicious installer as an alternative of the reliable product.

    The fraudulent advertisements seem on the high of Google search outcomes underneath domains similar to cometswift.com and cometlearn.internet, each selling what seems like a productiveness browser linked to Perplexity.

    When clicked, the advertisements redirect to perplexity.web page, a faux touchdown web page mimicking the official Comet browser web site, full with a obtain button that hyperlinks to a malicious file hosted on GitHub.

    The payload, named comet_latest.msi, is saved in a GitHub repository underneath the account "richardsuperman" and is believed to drop extra malware as soon as executed. In response to Jerome Segura, VP of Risk Analysis at DataDome, community telemetry signifies that the installer communicates with a command-and-control server hosted at icantseeyou.icu. VirusTotal scans hyperlink the exercise to DarkGate, a malware well-known for stealing passwords.

    Malicious web sites, malware installers and pretend obtain tab (Picture through Jérôme Segura on LinkedIn)

    The continuing marketing campaign is one other case of attackers abusing Google Adverts and search outcomes, the place individuals search for one thing reliable however find yourself on a faux web site as an alternative. On this occasion, customers trying to find “Comet browser” are proven a misleading advert positioned above the true Perplexity hyperlink, main them to obtain malware from a web page that appears fully genuine.

    Segura, who shared the findings on LinkedIn, mentioned his workforce has already reported the advert to Google. He famous that comparable ways are getting used in opposition to different AI-driven browsers similar to Arc, displaying that attackers are fast to use trending software program launches.

    Evaluation of the GitHub repository revealed Russian-language code feedback, hinting on the developer’s origin or linguistic background. The repository, titled musical-engine, comprises Home windows Kinds code and uploaded property that match the malicious installer.

    Malicious Perplexity Comet Browser Download Ads Push Malware Via Google
    Picture through Jérôme Segura on LinkedIn

    This complete episode reveals how briskly scammers transfer when one thing new and widespread hits the online. They make the most of the recognition and other people’s belief in acquainted platforms like Google Adverts. The most secure transfer is to skip the sponsored outcomes and go straight to the official web site every time it’s worthwhile to obtain software program.



    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Declan Murphy
    • Website

    Related Posts

    North Korean Hackers Mix BeaverTail and OtterCookie into Superior JS Malware

    October 17, 2025

    Attackers Exploit Zendesk Authentication Challenge to Flood Targets’ Inboxes with Company Notifications

    October 17, 2025

    Cyberkriminelle erbeuten Kundendaten von Modekonzern Mango

    October 17, 2025
    Top Posts

    Robotic Speak Episode 129 – Automating museum experiments, with Yuen Ting Chan

    October 18, 2025

    Evaluating the Finest AI Video Mills for Social Media

    April 18, 2025

    Utilizing AI To Repair The Innovation Drawback: The Three Step Resolution

    April 18, 2025

    Midjourney V7: Quicker, smarter, extra reasonable

    April 18, 2025
    Don't Miss

    Robotic Speak Episode 129 – Automating museum experiments, with Yuen Ting Chan

    By Arjun PatelOctober 18, 2025

    Claire chatted to Yuen Ting Chan from Pure Historical past Museum about utilizing robots to…

    Malicious Perplexity Comet Browser Obtain Adverts Push Malware By way of Google – Hackread – Cybersecurity Information, Information Breaches, Tech, AI, Crypto and Extra

    October 18, 2025

    How Enterprises Ought to Harden Blockchain Apps in Cloud

    October 18, 2025

    Switchboard-Have an effect on: Emotion Notion Labels from Conversational Speech

    October 18, 2025
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    UK Tech Insider
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms Of Service
    • Our Authors
    © 2025 UK Tech Insider. All rights reserved by UK Tech Insider.

    Type above and press Enter to search. Press Esc to cancel.