Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Chinese threat group Jewelbug secretly infiltrated Russian IT networks for months

Eightfold Co-Founder Raises $35M for Viven, AI Digital Twin Startup Contacts Missed Colleagues

F5 breach exposes BIG-IP source code — state hackers behind massive intrusion

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » One click allows you to turn Perplexity’s Comet AI Browser into Data Thief
Identity

One click allows you to turn Perplexity’s Comet AI Browser into Data Thief

userBy userOctober 4, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 4, 2025Ravi LakshmananAgent AI/Enterprise Security

Cybersecurity researchers have revealed details of a new attack called CometJacking, which targets Perplexity’s agent AI browser Comet, by embedding malicious prompts within seemingly harmless links to Siphon-sensitive data from connection services such as emails and calendars.

A sleazy prompt injection attack unfolds in the form of a malicious link that, when clicked, causes unexpected behavior unknown to the victim.

“CometJacking shows that a single weaponized URL can quietly flip an AI browser from a trusted co-pilot to an insider threat,” said Michelle Levy, Head of Security Research., in a statement shared with Hacker News.

“This isn’t just data stealing, it’s about hijacking agents who already have keys. Our research proves that trivial obfuscation can bypass data delamination checks and turn off email, calendar and connector data offbox with just one click.

DFIR Retainer Service

In short, this attack hijacks AI assistants embedded in your browser to steal data. The attack does not include the qualification theft component, as the browser already allows access to Gmail, calendars, and other connection services.

It takes place in five steps, when the victim clicks on a specially created URL, it is sent via phishing email or active when it is present on a web page. Instead of taking the user to the “intended” destination, the URL tells the AI ​​in the Comet browser to perform a hidden prompt to capture the user’s data, for example from Gmail, obfuscate it using Base64 encoding, and sends the information to an endpoint under the attacker’s control.

The URL created is a query string directed to the Comet AI browser, with malicious instructions added using the URL’s “collection” parameter, which refers to memory rather than the agent performing a live web search.

Confusion classifies the findings as “no security impact,” but once again highlights how AI-Native tools can circumvent traditional defenses and introduce new security risks that can be used by bad actors to order bids, and expose users and organizations to potential data theft in the process.

CIS Build Kit

In August 2020, Guardio Labs unveiled an attack technique called molting, where browsers like comet can be fooled by threat actors as interacting with phishing landing pages and counterfeit e-commerce storefronts without the knowledge or intervention of human users.

“The AI ​​browser is the next Enterprise Battleground,” said Eshed, CEO of Layerx. “If an attacker can direct an assistant through a link, the browser becomes a command-and-control point within the company’s boundaries. Organizations need to urgently evaluate the controls that detect and neutralize malicious agent prompts before these POCs become broad campaigns.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleTesla’s insurance division accused of “severe delays” and “complete systemic disorder” by CA regulators
Next Article Event Startup: No GPS location was removed from photos used by Parishful users
user
  • Website

Related Posts

Chinese threat group Jewelbug secretly infiltrated Russian IT networks for months

October 15, 2025

F5 breach exposes BIG-IP source code — state hackers behind massive intrusion

October 15, 2025

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

October 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Chinese threat group Jewelbug secretly infiltrated Russian IT networks for months

Eightfold Co-Founder Raises $35M for Viven, AI Digital Twin Startup Contacts Missed Colleagues

F5 breach exposes BIG-IP source code — state hackers behind massive intrusion

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Beyond the Algorithm: How FySelf’s TwinH and Reinforcement Learning are Reshaping Future Education

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.