Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Target Perplexity Comet Browser Users

Posted on October 24, 2025October 24, 2025 By CWS

Shortly after AI search engine firm Perplexity launched its Comet AI browser, risk actors tried to capitalize on it by luring customers to fraudulent domains and pretend purposes, risk intelligence agency BforeAI reviews.

Launched in July, Comet is a Chromium-based browser that integrates Perplexity’s AI assistant, providing assist for automating duties, organizing emails, and researching the online.

Starting August, BforeAI noticed a rise in fraudulent domains selling an executable model of the browser out there for obtain by way of third-party web sites.

Evaluation of over 40 suspicious domains confirmed the usage of typo-squatting, model impersonation, and misleading ads to lure customers to the fraudulent web sites.

The risk actors behind this coordinated marketing campaign used a number of key phrase variations containing ‘comet’, ‘AI’, ‘browser’, ‘perplexity’, and ‘obtain’.

Eight of the domains had been registered after Comet was launched, together with cometai.website, cometaibrowser.com, perplexitycomet-ai.com, cometbrowser.web, and aicometbrowser.com, that are thought-about critical- and high-level threats.

The cometai.web area, the risk intelligence agency notes, has been parked for $9,999 on GoDaddy​.

Moreover, BforeAI recognized two critical-level cell software threats within the Google Play Retailer, equivalent to Comet AI Atlas App Information, which immediately impersonates the browser.Commercial. Scroll to proceed studying.

A fraudulent iOS software was additionally recognized, and Perplexity CEO Aravind Srinivas warned of its existence earlier this month.

“The Comet app presently on iOS App Retailer is faux and spam and never from Perplexity,” his public warning reads.

The risk intelligence agency additionally found Google adverts selling fraudulent Comet downloads and social media adverts that directed to faux websites, and linked them to the identical marketing campaign.

“The timing of area registrations carefully follows Comet’s launch timeline, indicating opportunistic cybercriminals monitoring for rising know-how tendencies. Using worldwide registrars, privateness safety companies, and parking pages suggests coordination amongst risk actors,” BforeAI notes.

Associated: AI Sidebar Spoofing Places ChatGPT Atlas, Perplexity Comet and Different Browsers at Danger

Associated: Browser Extensions Pose Severe Risk to Gen-AI Instruments Dealing with Delicate Knowledge

Associated: Browser Safety Beneath Siege: The Alarming Rise of AI-Powered Phishing

Associated: The Shadow AI Surge: Research Finds 50% of Employees Use Unapproved AI Instruments

Security Week News Tags:Browser, Comet, Hackers, Perplexity, Target, Users

Post navigation

Previous Post: Arsen Launches Smishing Simulation to Help Companies Defend Against Mobile Phishing Threats
Next Post: APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign

Related Posts

Thirteen Romanians Arrested for Phishing the UK’s Tax Service Security Week News
Red Hat Confirms GitLab Instance Hack, Data Theft Security Week News
Virtual Event Today: Zero Trust & Identity Strategies Summit Security Week News
Canadian Airline WestJet Says Hackers Stole Customer Data Security Week News
Security Theater or Real Defense? The KPIs That Tell the Truth Security Week News
Legitimate Shellter Pen-Testing Tool Used in Malware Attacks Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Google Fortifies Chrome Agentic AI Against Indirect Prompt Injection Attacks
  • Experts Confirm JS#SMUGGLER Uses Compromised Sites to Deploy NetSupport RAT
  • Malicious Document Reader App in Google Play With 50K Downloads Installs Anatsa Malware
  • Hackers Exploit AWS IAM Eventual Consistency for Persistence
  • INE Earns Multiple G2 Winter 2026 Badges Across Global Markets

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Google Fortifies Chrome Agentic AI Against Indirect Prompt Injection Attacks
  • Experts Confirm JS#SMUGGLER Uses Compromised Sites to Deploy NetSupport RAT
  • Malicious Document Reader App in Google Play With 50K Downloads Installs Anatsa Malware
  • Hackers Exploit AWS IAM Eventual Consistency for Persistence
  • INE Earns Multiple G2 Winter 2026 Badges Across Global Markets

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark