Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
One Click Can Turn Perplexity’s Comet AI Browser Into a Data Thief

One Click Can Turn Perplexity’s Comet AI Browser Into a Data Thief

Posted on October 4, 2025October 4, 2025 By CWS

Oct 04, 2025Ravie LakshmananAgentic AI / Enterprise Safety
Cybersecurity researchers have disclosed particulars of a brand new assault known as CometJacking focusing on Perplexity’s agentic AI browser Comet by embedding malicious prompts inside a seemingly innocuous hyperlink to siphon delicate information, together with from linked providers, like e-mail and calendar.
The sneaky immediate injection assault performs out within the type of a malicious hyperlink that, when clicked, triggers the sudden conduct unbeknownst to the victims.

“CometJacking exhibits how a single, weaponized URL can quietly flip an AI browser from a trusted co-pilot to an insider risk,” Michelle Levy, Head of Safety Analysis at LayerX, mentioned in a press release shared with The Hacker Information.
“This is not nearly stealing information; it is about hijacking the agent that already has the keys. Our analysis proves that trivial obfuscation can bypass information exfiltration checks and pull e-mail, calendar, and connector information off-box in a single click on. AI-native browsers want security-by-design for agent prompts and reminiscence entry, not simply web page content material.”

The assault, in a nutshell, hijacks the AI assistant embedded within the browser to steal information, all whereas bypassing Perplexity’s information protections utilizing trivial Base64-encoding methods. The assault doesn’t embrace any credential theft part as a result of the browser already has licensed entry to Gmail, Calendar, and different linked providers.
It takes place over 5 steps, activating when a sufferer clicks on a specifically crafted URL, both despatched in a phishing e-mail or current in an internet web page. As a substitute of taking the consumer to the “supposed” vacation spot, the URL instructs the Comet browser’s AI to execute a hidden immediate that captures the consumer’s information from, say, Gmail, obfuscates it utilizing Base64-encoding, and transmits the knowledge to an endpoint below the attacker’s management.

The crafted URL is a question string directed on the Comet AI browser, with the malicious instruction added utilizing the “assortment” parameter of the URL, inflicting the agent to seek the advice of its reminiscence moderately than carry out a dwell net search.

Whereas Perplexity has labeled the findings as having “no safety influence,” they as soon as once more spotlight how AI-native instruments introduce new safety dangers that may get round conventional defenses, permit unhealthy actors to commandeer them to do their bidding, and expose customers and organizations to potential information theft within the course of.

In August 2020, Guardio Labs disclosed an assault method dubbed Scamlexity whereby browsers like Comet might be tricked by risk actors into interacting with phishing touchdown pages or counterfeit e-commerce storefronts with out the human consumer’s data or intervention.
“AI browsers are the subsequent enterprise battleground,” Or Eshed, CEO of LayerX, mentioned. “When an attacker can direct your assistant with a hyperlink, the browser turns into a command-and-control level inside the corporate perimeter. Organizations should urgently consider controls that detect and neutralize malicious agent prompts earlier than these PoCs change into widespread campaigns.”

The Hacker News Tags:Browser, Click, Comet, Data, Perplexitys, Thief, Turn

Post navigation

Previous Post: New CometJacking Attack Let Attackers Turn Perplexity Browser Against You in One Click
Next Post: Microsoft to Disable Inline SVG Images Display to Outlook for Web and Windows Users

Related Posts

U.S. Sanctions Garantex and Grinex Over 0M in Ransomware-Linked Illicit Crypto Transactions U.S. Sanctions Garantex and Grinex Over $100M in Ransomware-Linked Illicit Crypto Transactions The Hacker News
Microsoft Locks Down IE Mode After Hackers Turned Legacy Feature Into Backdoor Microsoft Locks Down IE Mode After Hackers Turned Legacy Feature Into Backdoor The Hacker News
Enterprise Credentials at Risk – Same Old, Same Old? Enterprise Credentials at Risk – Same Old, Same Old? The Hacker News
Bitfinex Hack Convict Ilya Lichtenstein Released Early Under U.S. First Step Act Bitfinex Hack Convict Ilya Lichtenstein Released Early Under U.S. First Step Act The Hacker News
CISA Warns of Suspected Broader SaaS Attacks Exploiting App Secrets and Cloud Misconfigs CISA Warns of Suspected Broader SaaS Attacks Exploiting App Secrets and Cloud Misconfigs The Hacker News
Security Bug in StealC Malware Panel Let Researchers Spy on Threat Actor Operations Security Bug in StealC Malware Panel Let Researchers Spy on Threat Actor Operations The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News