Close Menu
    Main Menu
    • Home
    • News
    • Tech
    • Robotics
    • ML & Research
    • AI
    • Digital Transformation
    • AI Ethics & Regulation
    • Thought Leadership in AI

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    The 5 Varieties Of Organizational Buildings For The New World Of Work

    January 26, 2026

    5 Breakthroughs in Graph Neural Networks to Watch in 2026

    January 26, 2026

    Hadrian raises funding for automated manufacturing, bringing valuation to $1.6B

    January 26, 2026
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Home»AI Ethics & Regulation»Zero-Click on Agentic Browser Assault Can Delete Whole Google Drive Utilizing Crafted Emails
    AI Ethics & Regulation

    Zero-Click on Agentic Browser Assault Can Delete Whole Google Drive Utilizing Crafted Emails

    Declan MurphyBy Declan MurphyDecember 6, 2025No Comments4 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Zero-Click on Agentic Browser Assault Can Delete Whole Google Drive Utilizing Crafted Emails
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    Dec 05, 2025Ravie LakshmananElectronic mail Safety / Risk Analysis

    A brand new agentic browser assault concentrating on Perplexity’s Comet browser that is able to turning a seemingly innocuous electronic mail right into a damaging motion that wipes a person’s complete Google Drive contents, findings from Straiker STAR Labs present.

    The zero-click Google Drive Wiper method hinges on connecting the browser to companies like Gmail and Google Drive to automate routine duties by granting them entry to learn emails, in addition to browse recordsdata and folders, and carry out actions like transferring, renaming, or deleting content material.

    For example, a immediate issued by a benign person may appear to be this: “Please test my electronic mail and full all my current group duties.” This may trigger the browser agent to go looking the inbox for related messages and carry out the required actions.

    Cybersecurity

    “This conduct displays extreme company in LLM-powered assistants the place the LLM performs actions that go far past the person’s express request,” safety researcher Amanda Rousseau stated in a report shared with The Hacker Information.

    An attacker can weaponize this conduct of the browser agent to ship a specifically crafted electronic mail that embeds pure language directions to prepare the recipient’s Drive as a part of a daily cleanup activity, delete recordsdata matching sure extensions or recordsdata that aren’t inside any folder, and evaluation the adjustments.

    On condition that the agent interprets the e-mail message as routine housekeeping, it treats the directions as respectable and deletes actual person recordsdata from Google Drive with out requiring any person affirmation.

    “The outcome: a browser-agent-driven wiper that strikes vital content material to trash at scale, triggered by one natural-language request from the person,” Rousseau stated. “As soon as an agent has OAuth entry to Gmail and Google Drive, abused directions can propagate shortly throughout shared folders and group drives.”

    What’s notable about this assault is that it neither depends on a jailbreak or a immediate injection. Relatively, it achieves its purpose by merely being well mannered, offering sequential directions, and utilizing phrases like “handle,” “deal with this,” and “do that on my behalf,” that shift the possession to the agent.

    In different phrases, the assault highlights how sequencing and tone can nudge the massive language mannequin (LLM) to adjust to malicious directions with out even bothering to test if every of these steps is definitely protected.

    To counter the dangers posed by the menace, it is suggested to take steps to safe not simply the mannequin, but in addition the agent, its connectors, and the pure language directions it follows via.

    “Agentic browser assistants flip on a regular basis prompts into sequences of highly effective actions throughout Gmail and Google Drive,” Rousseau stated. “When these actions are pushed by untrusted content material (particularly well mannered, well-structured emails) organizations inherit a brand new class of zero-click data-wiper danger.”

    HashJack Exploits URL Fragments for Oblique Immediate Injection

    The disclosure comes as Cato Networks demonstrated one other assault geared toward synthetic intelligence (AI)-powered browsers that hides rogue prompts after the “#” image in respectable URLs (e.g., “www.instance[.]com/dwelling#“) to deceive the brokers into executing them. The method has been dubbed HashJack.

    So as to set off the client-side assault, a menace actor can share such a specifically crafted URL through electronic mail, social media, or by embedding it immediately on an internet web page. As soon as the sufferer masses the web page and asks the AI browser a related query, it executes the hidden immediate.

    Cybersecurity

    “HashJack is the primary identified oblique immediate injection that may weaponize any respectable web site to control AI browser assistants,” safety researcher Vitaly Simonovich stated. “As a result of the malicious fragment is embedded in an actual web site’s URL, customers assume the content material is protected whereas hidden directions secretly manipulate the AI browser assistant.”

    Following accountable disclosure, Google labeled it as “will not repair (meant conduct)” and low severity, whereas Perplexity and Microsoft have launched patches for his or her respective AI browsers (Comet v142.0.7444.60 and Edge 142.0.3595.94). Claude for Chrome and OpenAI Atlas have been discovered to be proof against HashJack.

    It is price noting that Google doesn’t deal with policy-violating content material era and guardrail bypasses as safety vulnerabilities beneath its AI Vulnerability Reward Program (AI VRP).

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Declan Murphy
    • Website

    Related Posts

    Microsoft Open-Sources winapp, a New CLI Instrument for Streamlined Home windows App Growth

    January 26, 2026

    The cybercrime business continues to problem CISOs in 2026

    January 25, 2026

    FBI Accessed Home windows Laptops After Microsoft Shared BitLocker Restoration Keys – Hackread – Cybersecurity Information, Information Breaches, AI, and Extra

    January 25, 2026
    Top Posts

    The 5 Varieties Of Organizational Buildings For The New World Of Work

    January 26, 2026

    Evaluating the Finest AI Video Mills for Social Media

    April 18, 2025

    Utilizing AI To Repair The Innovation Drawback: The Three Step Resolution

    April 18, 2025

    Midjourney V7: Quicker, smarter, extra reasonable

    April 18, 2025
    Don't Miss

    The 5 Varieties Of Organizational Buildings For The New World Of Work

    By Charlotte LiJanuary 26, 2026

    It is a premium article obtainable to paid subscribers solely. Click on right here to subscribe and…

    5 Breakthroughs in Graph Neural Networks to Watch in 2026

    January 26, 2026

    Hadrian raises funding for automated manufacturing, bringing valuation to $1.6B

    January 26, 2026

    Microsoft Open-Sources winapp, a New CLI Instrument for Streamlined Home windows App Growth

    January 26, 2026
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    UK Tech Insider
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms Of Service
    • Our Authors
    © 2026 UK Tech Insider. All rights reserved by UK Tech Insider.

    Type above and press Enter to search. Press Esc to cancel.