Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New ChatGPT Atlas Browser Exploit Lets Attackers Plant Persistent Hidden Commands

Posted on October 27, 2025October 27, 2025 By CWS

Oct 27, 2025Ravie LakshmananArtificial Intelligence / Vulnerability
Cybersecurity researchers have found a brand new vulnerability in OpenAI’s ChatGPT Atlas net browser that might enable malicious actors to inject nefarious directions into the unreal intelligence (AI)-powered assistant’s reminiscence and run arbitrary code.
“This exploit can enable attackers to contaminate techniques with malicious code, grant themselves entry privileges, or deploy malware,” LayerX Safety Co-Founder and CEO, Or Eshed, mentioned in a report shared with The Hacker Information.
The assault, at its core, leverages a cross-site request forgery (CSRF) flaw that may very well be exploited to inject malicious directions into ChatGPT’s persistent reminiscence. The corrupted reminiscence can then persist throughout gadgets and classes, allowing an attacker to conduct varied actions, together with seizing management of a consumer’s account, browser, or related techniques, when a logged-in consumer makes an attempt to make use of ChatGPT for authentic functions.
Reminiscence, first launched by OpenAI in February 2024, is designed to permit the AI chatbot to recollect helpful particulars between chats, thereby permitting its responses to be extra personalised and related. This may very well be something starting from a consumer’s identify and favourite shade to their pursuits and dietary preferences.

The assault poses a major safety threat in that by tainting recollections, it permits the malicious directions to persist until customers explicitly navigate to the settings and delete them. In doing so, it turns a useful characteristic right into a potent weapon that can be utilized to run attacker-supplied code.
“What makes this exploit uniquely harmful is that it targets the AI’s persistent reminiscence, not simply the browser session,” Michelle Levy, head of safety analysis at LayerX Safety, mentioned. “By chaining a typical CSRF to a reminiscence write, an attacker can invisibly plant directions that survive throughout gadgets, classes, and even totally different browsers.”
“In our assessments, as soon as ChatGPT’s reminiscence was tainted, subsequent ‘regular’ prompts might set off code fetches, privilege escalations, or information exfiltration with out tripping significant safeguards.”

The assault performs out as follows –

Consumer logs in to ChatGPT
The consumer is tricked into launching a malicious hyperlink by social engineering
The malicious net web page triggers a CSRF request, leveraging the truth that the consumer is already authenticated, to inject hidden directions into ChatGPT’s reminiscence with out their data
When the consumer queries ChatGPT for a authentic objective, the contaminated recollections might be invoked, resulting in code execution

Extra technical particulars to drag off the assault have been withheld. LayerX mentioned the issue is exacerbated by ChatGPT Atlas’ lack of strong anti-phishing controls, the browser safety firm mentioned, including it leaves customers as much as 90% extra uncovered than conventional browsers like Google Chrome or Microsoft Edge.
In assessments in opposition to over 100 in-the-wild net vulnerabilities and phishing assaults, Edge managed to cease 53% of them, adopted by Google Chrome at 47% and Dia at 46%. In distinction, Perplexit’s Comet and ChatGPT Atlas stopped solely 7% and 5.8% of malicious net pages.
This opens the door to a large spectrum of assault eventualities, together with one the place a developer’s request to ChatGPT to write down code may cause the AI agent to slide in hidden directions as a part of the vibe coding effort.

The event comes as NeuralTrust demonstrated a immediate injection assault affecting ChatGPT Atlas, the place its omnibox could be jailbroken by disguising a malicious immediate as a seemingly innocent URL to go to. It additionally follows a report that AI brokers have grow to be the most typical information exfiltration vector in enterprise environments.
“AI browsers are integrating app, identification, and intelligence right into a single AI menace floor,” Eshed mentioned. “Vulnerabilities like ‘Tainted Reminiscences’ are the brand new provide chain: they journey with the consumer, contaminate future work, and blur the road between useful AI automation and covert management.”
“Because the browser turns into the widespread interface for AI, and as new agentic browsers carry AI straight into the searching expertise, enterprises have to deal with browsers as essential infrastructure, as a result of that’s the subsequent frontier of AI productiveness and work.”

The Hacker News Tags:Atlas, Attackers, Browser, ChatGPT, Commands, Exploit, Hidden, Lets, Persistent, Plant

Post navigation

Previous Post: Massive China-Linked Smishing Campaign Leveraged 194,000 Domains
Next Post: 1inch partners with Innerworks to strengthen DeFi security through AI-Powered threat detection

Related Posts

VirusTotal Finds 44 Undetected SVG Files Used to Deploy Base64-Encoded Phishing Pages The Hacker News
Nation-State Hacks, Spyware Alerts, Deepfake Malware, Supply Chain Backdoors The Hacker News
iPhone Spyware, Microsoft 0-Day, TokenBreak Hack, AI Data Leaks and More The Hacker News
UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware The Hacker News
Salt Typhoon Exploits Cisco, Ivanti, Palo Alto Flaws to Breach 600 Organizations Worldwide The Hacker News
3 Reasons Why Copy/Paste Attacks Are Driving Security Breaches The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • iOS 26 Deletes Pegasus and Predator Spyware Infection Evidence by Overwriting The ‘shutdown.log’ file on Reboot
  • X Warns Users With Security Keys to Re-Enroll Before November 10 to Avoid Lockouts
  • Chainguard Raises $280 Million in Growth Funding
  • Predatory Sparrow Group Attacking Critical Infrastructure to Destroy Data and Cause Disruption
  • 1inch partners with Innerworks to strengthen DeFi security through AI-Powered threat detection

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • iOS 26 Deletes Pegasus and Predator Spyware Infection Evidence by Overwriting The ‘shutdown.log’ file on Reboot
  • X Warns Users With Security Keys to Re-Enroll Before November 10 to Avoid Lockouts
  • Chainguard Raises $280 Million in Growth Funding
  • Predatory Sparrow Group Attacking Critical Infrastructure to Destroy Data and Cause Disruption
  • 1inch partners with Innerworks to strengthen DeFi security through AI-Powered threat detection

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News