Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New AI-Targeted Cloaking Attack Tricks AI Crawlers Into Citing Fake Info as Verified Facts

Posted on October 29, 2025October 29, 2025 By CWS

Oct 29, 2025Ravie LakshmananMachine Studying / AI Security
Cybersecurity researchers have flagged a brand new safety difficulty in agentic internet browsers like OpenAI ChatGPT Atlas that exposes underlying synthetic intelligence (AI) fashions to context poisoning assaults.
Within the assault devised by AI safety firm SPLX, a foul actor can arrange web sites that serve totally different content material to browsers and AI crawlers run by ChatGPT and Perplexity. The approach has been codenamed AI-targeted cloaking.
The method is a variation of search engine cloaking, which refers back to the observe of presenting one model of an online web page to customers and a special model to look engine crawlers with the tip purpose of manipulating search rankings.

The one distinction on this case is that attackers optimize for AI crawlers from varied suppliers by way of a trivial consumer agent verify that results in content material supply manipulation.
“As a result of these programs depend on direct retrieval, no matter content material is served to them turns into floor fact in AI Overviews, summaries, or autonomous reasoning,” safety researchers Ivan Vlahov and Bastien Eymery mentioned. “Meaning a single conditional rule, ‘if consumer agent = ChatGPT, serve this web page as a substitute,’ can form what tens of millions of customers see as authoritative output.”
SPLX mentioned AI-targeted cloaking, whereas deceptively easy, will also be was a strong misinformation weapon, undermining belief in AI instruments. By instructing AI crawlers to load one thing else as a substitute of the particular content material, it could possibly additionally introduce bias and affect the end result of programs leaning on such alerts.
“AI crawlers may be deceived simply as simply as early serps, however with far higher downstream impression,” the corporate mentioned. “As search engine marketing [search engine optimization] more and more incorporates AIO [artificial intelligence optimization], it manipulates actuality.”
The disclosure comes as an evaluation of browser brokers towards 20 of the most typical abuse situations, starting from multi-accounting to card testing and assist impersonation, found that the merchandise tried almost each malicious request with out the necessity for any jailbreaking, the hCaptcha Menace Evaluation Group (hTAG) mentioned.
Moreover, the research discovered that in situations the place an motion was “blocked,” it principally got here down as a result of software lacking a technical functionality moderately than as a result of safeguards constructed into them. ChatGPT Atlas, hTAG famous, has been discovered to hold out dangerous duties when they’re framed as a part of debugging workout routines.

Claude Laptop Use and Gemini Laptop Use, however, have been recognized as able to executing harmful account operations like password resets with none constraints, with the latter additionally demonstrating aggressive conduct with regards to brute-forcing coupons on e-commerce websites.
hTAG additionally examined the security measures of Manus AI, uncovering that it executes account takeovers and session hijacking with none difficulty, whereas Perplexity Comet runs unprompted SQL injection to exfiltrate hidden information.
“Brokers usually went above and past, trying SQL injection with no consumer request, injecting JavaScript on-page to aim to bypass paywalls, and extra,” it mentioned. “The near-total lack of safeguards we noticed makes it very probably that these identical brokers will even be quickly utilized by attackers towards any reputable customers who occur to obtain them.”

The Hacker News Tags:AITargeted, Attack, Citing, Cloaking, Crawlers, Facts, Fake, Info, Tricks, Verified

Post navigation

Previous Post: 10 Malicious npm Packages with Auto-Run Feature on Install Deploys Multi-Stage Credential Harvester
Next Post: Experts Reports Sharp Increase in Automated Botnet Attacks Targeting PHP Servers and IoT Devices

Related Posts

Key Findings from the Blue Report 2025 The Hacker News
CISA Adds TP-Link and WhatsApp Flaws to KEV Catalog Amid Active Exploitation The Hacker News
FBI Warns FSB-Linked Hackers Exploiting Unpatched Cisco Devices for Cyber Espionage The Hacker News
Researchers Uncover ECScape Flaw in Amazon ECS Enabling Cross-Task Credential Theft The Hacker News
Scanning Activity on Palo Alto Networks Portals Jump 500% in One Day The Hacker News
How AI-Enabled Workflow Automation Can Help SOCs Reduce Burnout The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Multiple Jenkins Vulnerability SAML Authentication Bypass And MCP Server Plugin Permissions
  • Reflectiz Raises $22 Million for Website Security Solution
  • Aembit Introduces Identity and Access Management for Agentic AI
  • Millions Impacted by Conduent Data Breach
  • BAS Is the Power Behind Real Defense

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Multiple Jenkins Vulnerability SAML Authentication Bypass And MCP Server Plugin Permissions
  • Reflectiz Raises $22 Million for Website Security Solution
  • Aembit Introduces Identity and Access Management for Agentic AI
  • Millions Impacted by Conduent Data Breach
  • BAS Is the Power Behind Real Defense

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News