Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Attack Technique Tricks AI Browsers Using a Simple ‘#’

New Attack Technique Tricks AI Browsers Using a Simple ‘#’

Posted on November 26, 2025November 26, 2025 By CWS

Safety researchers at Cato CTRL have found a brand new oblique immediate injection method known as HashJack, which weaponises legit web sites to control AI browser assistants.

The assault conceals malicious directions after the “#” image inside trusted URLs, enabling menace actors to conduct a variety of assaults with out compromising any web site.

How HashJack Works

The method exploits a basic design flaw in how AI browsers deal with URL fragments. When customers go to a URL containing hidden prompts after the “#” image, the AI browser sends the entire URL, together with the fragment, to its AI assistant.

The assault chain

Since URL fragments by no means go away the client-side, conventional community and server defences can not detect them.

This creates a harmful blind spot. Server logs solely file the clear base URL, and intrusion detection methods can not see the malicious payload.

Even security-conscious customers are fooled as a result of the AI assistant’s options seem native to the trusted web site they’re visiting.

Google categorized the difficulty as “Gained’t Repair (Meant Behaviour)” regardless of acknowledging the report. Microsoft responded promptly and utilized a repair inside two months of disclosure.

Six Assault Eventualities Recognized

In keeping with Cato Networks, researchers outlined six harmful eventualities enabled by HashJack.

These embrace callback phishing, the place pretend assist numbers seem in AI responses; knowledge exfiltration in agentic browsers like Comet; and misinformation via fabricated monetary information.

Cato CTRL examined HashJack in opposition to three main AI browsers:

AI BrowserVendorStatusCometPerplexityFixed (November 18, 2025)Copilot for EdgeMicrosoftFixed (October 27, 2025)Gemini for ChromeGoogleUnresolved

The method additionally permits malware steering with step-by-step set up directions, medical hurt via harmful dosage misinformation, and credential theft through injected login hyperlinks.

The agentic capabilities of Perplexity’s Comet browser proved particularly regarding.

Throughout testing, the browser robotically despatched consumer knowledge, together with account names, transaction historical past, and get in touch with particulars, to attacker-controlled endpoints.

HashJack represents a major shift within the AI menace panorama. Not like conventional phishing assaults that depend on pretend web sites, this system abuses consumer belief in legit domains.

Any web site could be weaponised with out being compromised. The attacker must share a crafted URL containing the malicious fragment.

As AI browser assistants achieve entry to delicate knowledge and system controls, the chance of context manipulation will proceed rising.

Safety specialists urge AI browser distributors to implement sturdy defences earlier than widespread adoption makes these assaults inevitable in real-world eventualities.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attack, Browsers, Simple, Technique, Tricks

Post navigation

Previous Post: Dartmouth College Confirms Data Theft in Oracle Hack
Next Post: RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware

Related Posts

APT36 Hackers Used Python-Based ELF Malware to Target Indian Government Entities APT36 Hackers Used Python-Based ELF Malware to Target Indian Government Entities Cyber Security News
New Phishing Attack Abusing Blob URLs to Bypass SEGs and Evade Analysis New Phishing Attack Abusing Blob URLs to Bypass SEGs and Evade Analysis Cyber Security News
Google Cloud and Cloudflare Suffers Massive Widespread Outages Google Cloud and Cloudflare Suffers Massive Widespread Outages Cyber Security News
Cisco Webex Meetings Vulnerability Let Attackers Manipulate HTTP Responses Cisco Webex Meetings Vulnerability Let Attackers Manipulate HTTP Responses Cyber Security News
Anubis Ransomware Attacking Android and Windows Users to Encrypt Files and Steal Login Credentials Anubis Ransomware Attacking Android and Windows Users to Encrypt Files and Steal Login Credentials Cyber Security News
CISA Adds Sierra Router Vulnerability to KEV Catalogue Following Active Exploitation CISA Adds Sierra Router Vulnerability to KEV Catalogue Following Active Exploitation Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News