Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Attack Technique Tricks AI Browsers Using a Simple ‘#’

Posted on November 26, 2025November 26, 2025 By CWS

Safety researchers at Cato CTRL have found a brand new oblique immediate injection method known as HashJack, which weaponises legit web sites to control AI browser assistants.

The assault conceals malicious directions after the “#” image inside trusted URLs, enabling menace actors to conduct a variety of assaults with out compromising any web site.

How HashJack Works

The method exploits a basic design flaw in how AI browsers deal with URL fragments. When customers go to a URL containing hidden prompts after the “#” image, the AI browser sends the entire URL, together with the fragment, to its AI assistant.

The assault chain

Since URL fragments by no means go away the client-side, conventional community and server defences can not detect them.

This creates a harmful blind spot. Server logs solely file the clear base URL, and intrusion detection methods can not see the malicious payload.

Even security-conscious customers are fooled as a result of the AI assistant’s options seem native to the trusted web site they’re visiting.

Google categorized the difficulty as “Gained’t Repair (Meant Behaviour)” regardless of acknowledging the report. Microsoft responded promptly and utilized a repair inside two months of disclosure.

Six Assault Eventualities Recognized

In keeping with Cato Networks, researchers outlined six harmful eventualities enabled by HashJack.

These embrace callback phishing, the place pretend assist numbers seem in AI responses; knowledge exfiltration in agentic browsers like Comet; and misinformation via fabricated monetary information.

Cato CTRL examined HashJack in opposition to three main AI browsers:

AI BrowserVendorStatusCometPerplexityFixed (November 18, 2025)Copilot for EdgeMicrosoftFixed (October 27, 2025)Gemini for ChromeGoogleUnresolved

The method additionally permits malware steering with step-by-step set up directions, medical hurt via harmful dosage misinformation, and credential theft through injected login hyperlinks.

The agentic capabilities of Perplexity’s Comet browser proved particularly regarding.

Throughout testing, the browser robotically despatched consumer knowledge, together with account names, transaction historical past, and get in touch with particulars, to attacker-controlled endpoints.

HashJack represents a major shift within the AI menace panorama. Not like conventional phishing assaults that depend on pretend web sites, this system abuses consumer belief in legit domains.

Any web site could be weaponised with out being compromised. The attacker must share a crafted URL containing the malicious fragment.

As AI browser assistants achieve entry to delicate knowledge and system controls, the chance of context manipulation will proceed rising.

Safety specialists urge AI browser distributors to implement sturdy defences earlier than widespread adoption makes these assaults inevitable in real-world eventualities.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attack, Browsers, Simple, Technique, Tricks

Post navigation

Previous Post: Dartmouth College Confirms Data Theft in Oracle Hack
Next Post: RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware

Related Posts

Mustang Panda With SnakeDisk USB Worm and Toneshell Backdoor Seeking to Penetrate Air-Gap Systems Cyber Security News
NVIDIA VApp for Windows Vulnerability Let Attackers Execute Malicious Code Cyber Security News
“GPUGate” Malware Abuses Uses Google Ads and GitHub to Deliver Advanced Malware Payload Cyber Security News
New ModSecurity WAF Vulnerability Let Attackers Crash the System Cyber Security News
Timeliner – Windows Forensic Tool for DFIR Investigators Cyber Security News
Microsoft Zero Day Quest Hacking Contest Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • OpenAI User Data Exposed in Mixpanel Hack
  • Malicious Chrome Extension Silently Steal and Injects Hidden SOL Fees Into Solana Swaps
  • Angular HTTP Client Vulnerability Exposes XSRF Token to an Attacker-Controlled Domain
  • AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks — and 20 More Stories
  • OpenAI Discloses Mixpanel Data Breach

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • OpenAI User Data Exposed in Mixpanel Hack
  • Malicious Chrome Extension Silently Steal and Injects Hidden SOL Fees Into Solana Swaps
  • Angular HTTP Client Vulnerability Exposes XSRF Token to an Attacker-Controlled Domain
  • AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks — and 20 More Stories
  • OpenAI Discloses Mixpanel Data Breach

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark