Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

ChatGPT advertises | Tech Crunch

China-linked UNC3886 targets Singapore’s telecom sector with cyber espionage

Now you can let people know you’ve arrived at your destination on Snapchat

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » One click allows you to turn Perplexity’s Comet AI Browser into Data Thief
Identity

One click allows you to turn Perplexity’s Comet AI Browser into Data Thief

userBy userOctober 4, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 4, 2025Ravi LakshmananAgent AI/Enterprise Security

Cybersecurity researchers have revealed details of a new attack called CometJacking, which targets Perplexity’s agent AI browser Comet, by embedding malicious prompts within seemingly harmless links to Siphon-sensitive data from connection services such as emails and calendars.

A sleazy prompt injection attack unfolds in the form of a malicious link that, when clicked, causes unexpected behavior unknown to the victim.

“CometJacking shows that a single weaponized URL can quietly flip an AI browser from a trusted co-pilot to an insider threat,” said Michelle Levy, Head of Security Research., in a statement shared with Hacker News.

“This isn’t just data stealing, it’s about hijacking agents who already have keys. Our research proves that trivial obfuscation can bypass data delamination checks and turn off email, calendar and connector data offbox with just one click.

DFIR Retainer Service

In short, this attack hijacks AI assistants embedded in your browser to steal data. The attack does not include the qualification theft component, as the browser already allows access to Gmail, calendars, and other connection services.

It takes place in five steps, when the victim clicks on a specially created URL, it is sent via phishing email or active when it is present on a web page. Instead of taking the user to the “intended” destination, the URL tells the AI ​​in the Comet browser to perform a hidden prompt to capture the user’s data, for example from Gmail, obfuscate it using Base64 encoding, and sends the information to an endpoint under the attacker’s control.

The URL created is a query string directed to the Comet AI browser, with malicious instructions added using the URL’s “collection” parameter, which refers to memory rather than the agent performing a live web search.

Confusion classifies the findings as “no security impact,” but once again highlights how AI-Native tools can circumvent traditional defenses and introduce new security risks that can be used by bad actors to order bids, and expose users and organizations to potential data theft in the process.

CIS Build Kit

In August 2020, Guardio Labs unveiled an attack technique called molting, where browsers like comet can be fooled by threat actors as interacting with phishing landing pages and counterfeit e-commerce storefronts without the knowledge or intervention of human users.

“The AI ​​browser is the next Enterprise Battleground,” said Eshed, CEO of Layerx. “If an attacker can direct an assistant through a link, the browser becomes a command-and-control point within the company’s boundaries. Organizations need to urgently evaluate the controls that detect and neutralize malicious agent prompts before these POCs become broad campaigns.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleTesla’s insurance division accused of “severe delays” and “complete systemic disorder” by CA regulators
Next Article Event Startup: No GPS location was removed from photos used by Parishful users
user
  • Website

Related Posts

China-linked UNC3886 targets Singapore’s telecom sector with cyber espionage

February 9, 2026

SolarWinds Web Help Desk exploited by RCE in multi-stage attack against public servers

February 9, 2026

AI Skill Malware, 31Tbps DDoS, Notepad++ Hack, LLM Backdoors and More

February 9, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

ChatGPT advertises | Tech Crunch

China-linked UNC3886 targets Singapore’s telecom sector with cyber espionage

Now you can let people know you’ve arrived at your destination on Snapchat

Discord to introduce age verification for full access to platform next month

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.