InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: One click allows you to turn Perplexity’s Comet AI Browser into Data Thief
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > One click allows you to turn Perplexity’s Comet AI Browser into Data Thief
Technology

One click allows you to turn Perplexity’s Comet AI Browser into Data Thief

October 4, 2025 3 Min Read
Share
One click allows you to turn Perplexity's Comet AI Browser into Data Thief
SHARE

Cybersecurity researchers revealed details of a new attack called cometjacking Target Perplexity’s Agent AI Browser Comet and embed malicious prompts within seemingly harmless links to Siphon-sensitive data from connected services such as emails and calendars.

A sleazy prompt injection attack unfolds in the form of a malicious link that, when clicked, causes unexpected behavior unknown to the victim.

https://www.youtube.com/watch?v=n8vlom-musc

“CometJacking shows that a single weaponized URL can quietly flip an AI browser from a trusted co-pilot to an insider threat,” said Michelle Levy, Head of Security Research., in a statement shared with Hacker News.

“This isn’t just data stealing, it’s about hijacking agents who already have keys. Our research proves that trivial obfuscation can bypass data delamination checks and turn off email, calendar and connector data offbox with just one click.

In short, this attack hijacks AI assistants embedded in your browser to steal data. The attack does not include the qualification theft component, as the browser already allows access to Gmail, calendars, and other connection services.

It takes place in five steps, when the victim clicks on a specially created URL, it is sent via phishing email or active when it is present on a web page. Instead of taking the user to the “intended” destination, the URL tells the AI ​​in the Comet browser to perform a hidden prompt to capture the user’s data, for example from Gmail, obfuscate it using Base64 encoding, and sends the information to an endpoint under the attacker’s control.

The URL created is a query string directed to the Comet AI browser, with malicious instructions added using the URL’s “collection” parameter, which refers to memory rather than the agent performing a live web search.

See also  LastPass warns about fake repositories that infect MacOS with Atomic Infostealer

Confusion classifies the findings as “no security impact,” but once again highlights how AI-Native tools can circumvent traditional defenses and introduce new security risks that can be used by bad actors to order bids, and expose users and organizations to potential data theft in the process.

In August 2020, Guardio Labs unveiled an attack technique called molting, where browsers like comet can be fooled by threat actors as interacting with phishing landing pages and counterfeit e-commerce storefronts without the knowledge or intervention of human users.

“The AI ​​browser is the next Enterprise Battleground,” said Eshed, CEO of Layerx. “If an attacker can direct an assistant through a link, the browser becomes a command-and-control point within the company’s boundaries. Organizations need to urgently evaluate the controls that detect and neutralize malicious agent prompts before these POCs become broad campaigns.”

Share This Article
Twitter Copy Link
Previous Article A VPN is required to avoid age verification checks in Arizona A VPN is required to avoid age verification checks in Arizona
Next Article International journalists visit Gaza city under Israeli military supervision International journalists visit Gaza city under Israeli military supervision

Latest News

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

threat actor known as silver fox In attacks targeting Chinese…

December 4, 2025
Critical RSC bug in React and Next.js allows unauthenticated remote code execution

Critical RSC bug in React and Next.js allows unauthenticated remote code execution

A maximum severity security flaw has been disclosed in React…

December 3, 2025
India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India's Department of Telecommunications (DoT) has directed app-based telecom service…

December 2, 2025
India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India's Ministry of Telecommunications has reportedly asked major mobile device…

December 1, 2025
CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated…

November 30, 2025

You Might Also Like

Axios Abuse and Salty2FA Kit Fuel Advanced Microsoft 365 Fishing Attack
Technology

Axios Abuse and Salty2FA Kit Fuel Advanced Microsoft 365 Fishing Attack

7 Min Read
Stealit Malware Abuses Node.js Single Executable Feature
Technology

Stealit malware exploits a single executable feature in Node.js via game and VPN installers

4 Min Read
Google discovers PROMPTFLUX malware that uses Gemini AI to rewrite code every hour
Technology

Google discovers PROMPTFLUX malware that uses Gemini AI to rewrite code every hour

8 Min Read
New Assessment ClickFix Campaign Offers Amatera Stealer and NetSupport RAT
Technology

New Assessment ClickFix Campaign Offers Amatera Stealer and NetSupport RAT

4 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?