Close Menu
    Main Menu
    • Home
    • News
    • Tech
    • Robotics
    • ML & Research
    • AI
    • Digital Transformation
    • AI Ethics & Regulation
    • Thought Leadership in AI

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Humanoid robotics builders should handle a variety of purposes

    March 16, 2026

    OpenClaw AI Agent Flaws May Allow Immediate Injection and Information Exfiltration

    March 16, 2026

    Safe AI brokers with Coverage in Amazon Bedrock AgentCore

    March 16, 2026
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Home»AI Ethics & Regulation»One Click on Can Flip Perplexity’s Comet AI Browser Right into a Knowledge Thief
    AI Ethics & Regulation

    One Click on Can Flip Perplexity’s Comet AI Browser Right into a Knowledge Thief

    Declan MurphyBy Declan MurphyOctober 4, 2025No Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    One Click on Can Flip Perplexity’s Comet AI Browser Right into a Knowledge Thief
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    Oct 04, 2025Ravie LakshmananAgentic AI / Enterprise Safety

    Cybersecurity researchers have disclosed particulars of a brand new assault referred to as CometJacking concentrating on Perplexity’s agentic AI browser Comet by embedding malicious prompts inside a seemingly innocuous hyperlink to siphon delicate knowledge, together with from related providers, like e mail and calendar.

    The sneaky immediate injection assault performs out within the type of a malicious hyperlink that, when clicked, triggers the surprising habits unbeknownst to the victims.

    “CometJacking exhibits how a single, weaponized URL can quietly flip an AI browser from a trusted co-pilot to an insider risk,” Michelle Levy, Head of Safety Analysis at LayerX, mentioned in a press release shared with The Hacker Information.

    “This is not nearly stealing knowledge; it is about hijacking the agent that already has the keys. Our analysis proves that trivial obfuscation can bypass knowledge exfiltration checks and pull e mail, calendar, and connector knowledge off-box in a single click on. AI-native browsers want security-by-design for agent prompts and reminiscence entry, not simply web page content material.”

    DFIR Retainer Services

    The assault, in a nutshell, hijacks the AI assistant embedded within the browser to steal knowledge, all whereas bypassing Perplexity’s knowledge protections utilizing trivial Base64-encoding methods. The assault doesn’t embody any credential theft element as a result of the browser already has approved entry to Gmail, Calendar, and different related providers.

    It takes place over 5 steps, activating when a sufferer clicks on a specifically crafted URL, both despatched in a phishing e mail or current in an internet web page. As a substitute of taking the consumer to the “supposed” vacation spot, the URL instructs the Comet browser’s AI to execute a hidden immediate that captures the consumer’s knowledge from, say, Gmail, obfuscates it utilizing Base64-encoding, and transmits the data to an endpoint beneath the attacker’s management.

    The crafted URL is a question string directed on the Comet AI browser, with the malicious instruction added utilizing the “assortment” parameter of the URL, inflicting the agent to seek the advice of its reminiscence fairly than carry out a dwell net search.

    Whereas Perplexity has categorised the findings as having “no safety impression,” they as soon as once more spotlight how AI-native instruments introduce new safety dangers that may get round conventional defenses, enable dangerous actors to commandeer them to do their bidding, and expose customers and organizations to potential knowledge theft within the course of.

    CIS Build Kits

    In August 2020, Guardio Labs disclosed an assault method dubbed Scamlexity whereby browsers like Comet could possibly be tricked by risk actors into interacting with phishing touchdown pages or counterfeit e-commerce storefronts with out the human consumer’s data or intervention.

    “AI browsers are the subsequent enterprise battleground,” Or Eshed, CEO of LayerX, mentioned. “When an attacker can direct your assistant with a hyperlink, the browser turns into a command-and-control level inside the corporate perimeter. Organizations should urgently consider controls that detect and neutralize malicious agent prompts earlier than these PoCs turn out to be widespread campaigns.”

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Declan Murphy
    • Website

    Related Posts

    OpenClaw AI Agent Flaws May Allow Immediate Injection and Information Exfiltration

    March 16, 2026

    International Authorities Take Down 45,000 Malicious IPs Utilized in Ransomware Campaigns

    March 15, 2026

    Cyber criminals too are working from residence… your private home

    March 15, 2026
    Top Posts

    Evaluating the Finest AI Video Mills for Social Media

    April 18, 2025

    Utilizing AI To Repair The Innovation Drawback: The Three Step Resolution

    April 18, 2025

    Midjourney V7: Quicker, smarter, extra reasonable

    April 18, 2025

    Meta resumes AI coaching utilizing EU person knowledge

    April 18, 2025
    Don't Miss

    Humanoid robotics builders should handle a variety of purposes

    By Arjun PatelMarch 16, 2026

    Humanoid robots comparable to Optimus have to evolve from industrial to extra normal purposes. Supply:…

    OpenClaw AI Agent Flaws May Allow Immediate Injection and Information Exfiltration

    March 16, 2026

    Safe AI brokers with Coverage in Amazon Bedrock AgentCore

    March 16, 2026

    International Authorities Take Down 45,000 Malicious IPs Utilized in Ransomware Campaigns

    March 15, 2026
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    UK Tech Insider
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms Of Service
    • Our Authors
    © 2026 UK Tech Insider. All rights reserved by UK Tech Insider.

    Type above and press Enter to search. Press Esc to cancel.