Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Target Perplexity Comet Browser Users

Posted on October 24, 2025October 24, 2025 By CWS

Shortly after AI search engine firm Perplexity launched its Comet AI browser, risk actors tried to capitalize on it by luring customers to fraudulent domains and pretend purposes, risk intelligence agency BforeAI reviews.

Launched in July, Comet is a Chromium-based browser that integrates Perplexity’s AI assistant, providing assist for automating duties, organizing emails, and researching the online.

Starting August, BforeAI noticed a rise in fraudulent domains selling an executable model of the browser out there for obtain by way of third-party web sites.

Evaluation of over 40 suspicious domains confirmed the usage of typo-squatting, model impersonation, and misleading ads to lure customers to the fraudulent web sites.

The risk actors behind this coordinated marketing campaign used a number of key phrase variations containing ‘comet’, ‘AI’, ‘browser’, ‘perplexity’, and ‘obtain’.

Eight of the domains had been registered after Comet was launched, together with cometai.website, cometaibrowser.com, perplexitycomet-ai.com, cometbrowser.web, and aicometbrowser.com, that are thought-about critical- and high-level threats.

The cometai.web area, the risk intelligence agency notes, has been parked for $9,999 on GoDaddy​.

Moreover, BforeAI recognized two critical-level cell software threats within the Google Play Retailer, equivalent to Comet AI Atlas App Information, which immediately impersonates the browser.Commercial. Scroll to proceed studying.

A fraudulent iOS software was additionally recognized, and Perplexity CEO Aravind Srinivas warned of its existence earlier this month.

“The Comet app presently on iOS App Retailer is faux and spam and never from Perplexity,” his public warning reads.

The risk intelligence agency additionally found Google adverts selling fraudulent Comet downloads and social media adverts that directed to faux websites, and linked them to the identical marketing campaign.

“The timing of area registrations carefully follows Comet’s launch timeline, indicating opportunistic cybercriminals monitoring for rising know-how tendencies. Using worldwide registrars, privateness safety companies, and parking pages suggests coordination amongst risk actors,” BforeAI notes.

Associated: AI Sidebar Spoofing Places ChatGPT Atlas, Perplexity Comet and Different Browsers at Danger

Associated: Browser Extensions Pose Severe Risk to Gen-AI Instruments Dealing with Delicate Knowledge

Associated: Browser Safety Beneath Siege: The Alarming Rise of AI-Powered Phishing

Associated: The Shadow AI Surge: Research Finds 50% of Employees Use Unapproved AI Instruments

Security Week News Tags:Browser, Comet, Hackers, Perplexity, Target, Users

Post navigation

Previous Post: Arsen Launches Smishing Simulation to Help Companies Defend Against Mobile Phishing Threats
Next Post: APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign

Related Posts

The ZTNA Blind Spot: Why Unmanaged Devices Threaten Your Hybrid Workforce Security Week News
Chinese Silk Typhoon Hackers Exploited Commvault Zero-Day Security Week News
Ahold Delhaize Data Breach Impacts 2.2 Million People Security Week News
Cost of Data Breach in US Rises to $10.22 Million, Says Latest IBM Report Security Week News
CISO Conversations: John ‘Four’ Flynn, VP of Security at Google DeepMind Security Week News
Canadian Electric Utility Says Power Meters Disrupted by Cyberattack Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Newly Patched Critical Microsoft WSUS Flaw Comes Under Active Exploitation
  • MuddyWater Using New Malware Toolkit to Deliver Phoenix Backdoor Malware to International Organizations
  • New Red Teaming Tool RedTiger Attacking Gamers And Discord Accounts In The Wild
  • Critical Windows Server WSUS Vulnerability Exploited in the Wild 
  • APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Newly Patched Critical Microsoft WSUS Flaw Comes Under Active Exploitation
  • MuddyWater Using New Malware Toolkit to Deliver Phoenix Backdoor Malware to International Organizations
  • New Red Teaming Tool RedTiger Attacking Gamers And Discord Accounts In The Wild
  • Critical Windows Server WSUS Vulnerability Exploited in the Wild 
  • APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News