Close Menu
    Main Menu
    • Home
    • News
    • Tech
    • Robotics
    • ML & Research
    • AI
    • Digital Transformation
    • AI Ethics & Regulation
    • Thought Leadership in AI

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    How Quick-Time period AI Effectivity Can Undermine Your Future Leaders

    January 27, 2026

    Russian hackers accused of assault on Poland electrical energy grid

    January 26, 2026

    Palantir Defends Work With ICE to Workers Following Killing of Alex Pretti

    January 26, 2026
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Home»AI Ethics & Regulation»One Click on Can Flip Perplexity’s Comet AI Browser Right into a Knowledge Thief
    AI Ethics & Regulation

    One Click on Can Flip Perplexity’s Comet AI Browser Right into a Knowledge Thief

    Declan MurphyBy Declan MurphyOctober 4, 2025No Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    One Click on Can Flip Perplexity’s Comet AI Browser Right into a Knowledge Thief
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    Oct 04, 2025Ravie LakshmananAgentic AI / Enterprise Safety

    Cybersecurity researchers have disclosed particulars of a brand new assault referred to as CometJacking concentrating on Perplexity’s agentic AI browser Comet by embedding malicious prompts inside a seemingly innocuous hyperlink to siphon delicate knowledge, together with from related providers, like e mail and calendar.

    The sneaky immediate injection assault performs out within the type of a malicious hyperlink that, when clicked, triggers the surprising habits unbeknownst to the victims.

    “CometJacking exhibits how a single, weaponized URL can quietly flip an AI browser from a trusted co-pilot to an insider risk,” Michelle Levy, Head of Safety Analysis at LayerX, mentioned in a press release shared with The Hacker Information.

    “This is not nearly stealing knowledge; it is about hijacking the agent that already has the keys. Our analysis proves that trivial obfuscation can bypass knowledge exfiltration checks and pull e mail, calendar, and connector knowledge off-box in a single click on. AI-native browsers want security-by-design for agent prompts and reminiscence entry, not simply web page content material.”

    DFIR Retainer Services

    The assault, in a nutshell, hijacks the AI assistant embedded within the browser to steal knowledge, all whereas bypassing Perplexity’s knowledge protections utilizing trivial Base64-encoding methods. The assault doesn’t embody any credential theft element as a result of the browser already has approved entry to Gmail, Calendar, and different related providers.

    It takes place over 5 steps, activating when a sufferer clicks on a specifically crafted URL, both despatched in a phishing e mail or current in an internet web page. As a substitute of taking the consumer to the “supposed” vacation spot, the URL instructs the Comet browser’s AI to execute a hidden immediate that captures the consumer’s knowledge from, say, Gmail, obfuscates it utilizing Base64-encoding, and transmits the data to an endpoint beneath the attacker’s management.

    The crafted URL is a question string directed on the Comet AI browser, with the malicious instruction added utilizing the “assortment” parameter of the URL, inflicting the agent to seek the advice of its reminiscence fairly than carry out a dwell net search.

    Whereas Perplexity has categorised the findings as having “no safety impression,” they as soon as once more spotlight how AI-native instruments introduce new safety dangers that may get round conventional defenses, enable dangerous actors to commandeer them to do their bidding, and expose customers and organizations to potential knowledge theft within the course of.

    CIS Build Kits

    In August 2020, Guardio Labs disclosed an assault method dubbed Scamlexity whereby browsers like Comet could possibly be tricked by risk actors into interacting with phishing touchdown pages or counterfeit e-commerce storefronts with out the human consumer’s data or intervention.

    “AI browsers are the subsequent enterprise battleground,” Or Eshed, CEO of LayerX, mentioned. “When an attacker can direct your assistant with a hyperlink, the browser turns into a command-and-control level inside the corporate perimeter. Organizations should urgently consider controls that detect and neutralize malicious agent prompts earlier than these PoCs turn out to be widespread campaigns.”

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Declan Murphy
    • Website

    Related Posts

    Russian hackers accused of assault on Poland electrical energy grid

    January 26, 2026

    Nike Knowledge Breach Claims Floor as WorldLeaks Leaks 1.4TB of Recordsdata On-line – Hackread – Cybersecurity Information, Knowledge Breaches, AI, and Extra

    January 26, 2026

    Konni Hackers Deploy AI-Generated PowerShell Backdoor Towards Blockchain Builders

    January 26, 2026
    Top Posts

    Evaluating the Finest AI Video Mills for Social Media

    April 18, 2025

    Utilizing AI To Repair The Innovation Drawback: The Three Step Resolution

    April 18, 2025

    Midjourney V7: Quicker, smarter, extra reasonable

    April 18, 2025

    Meta resumes AI coaching utilizing EU person knowledge

    April 18, 2025
    Don't Miss

    How Quick-Time period AI Effectivity Can Undermine Your Future Leaders

    By Charlotte LiJanuary 27, 2026

    http://visitors.libsyn.com/futureofworkpodcast/Audio_-_Melanie_Tinto_-_Updated_-_Ready.mp3 Let’s be sincere, most CHRO teams on the market are dangerous. They’re costly, full…

    Russian hackers accused of assault on Poland electrical energy grid

    January 26, 2026

    Palantir Defends Work With ICE to Workers Following Killing of Alex Pretti

    January 26, 2026

    The Workers Who Quietly Maintain Groups Collectively

    January 26, 2026
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    UK Tech Insider
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms Of Service
    • Our Authors
    © 2026 UK Tech Insider. All rights reserved by UK Tech Insider.

    Type above and press Enter to search. Press Esc to cancel.