Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Attack Technique Tricks AI Browsers Using a Simple ‘#’

New Attack Technique Tricks AI Browsers Using a Simple ‘#’

Posted on November 26, 2025November 26, 2025 By CWS

Safety researchers at Cato CTRL have found a brand new oblique immediate injection method known as HashJack, which weaponises legit web sites to control AI browser assistants.

The assault conceals malicious directions after the “#” image inside trusted URLs, enabling menace actors to conduct a variety of assaults with out compromising any web site.

How HashJack Works

The method exploits a basic design flaw in how AI browsers deal with URL fragments. When customers go to a URL containing hidden prompts after the “#” image, the AI browser sends the entire URL, together with the fragment, to its AI assistant.

The assault chain

Since URL fragments by no means go away the client-side, conventional community and server defences can not detect them.

This creates a harmful blind spot. Server logs solely file the clear base URL, and intrusion detection methods can not see the malicious payload.

Even security-conscious customers are fooled as a result of the AI assistant’s options seem native to the trusted web site they’re visiting.

Google categorized the difficulty as “Gained’t Repair (Meant Behaviour)” regardless of acknowledging the report. Microsoft responded promptly and utilized a repair inside two months of disclosure.

Six Assault Eventualities Recognized

In keeping with Cato Networks, researchers outlined six harmful eventualities enabled by HashJack.

These embrace callback phishing, the place pretend assist numbers seem in AI responses; knowledge exfiltration in agentic browsers like Comet; and misinformation via fabricated monetary information.

Cato CTRL examined HashJack in opposition to three main AI browsers:

AI BrowserVendorStatusCometPerplexityFixed (November 18, 2025)Copilot for EdgeMicrosoftFixed (October 27, 2025)Gemini for ChromeGoogleUnresolved

The method additionally permits malware steering with step-by-step set up directions, medical hurt via harmful dosage misinformation, and credential theft through injected login hyperlinks.

The agentic capabilities of Perplexity’s Comet browser proved particularly regarding.

Throughout testing, the browser robotically despatched consumer knowledge, together with account names, transaction historical past, and get in touch with particulars, to attacker-controlled endpoints.

HashJack represents a major shift within the AI menace panorama. Not like conventional phishing assaults that depend on pretend web sites, this system abuses consumer belief in legit domains.

Any web site could be weaponised with out being compromised. The attacker must share a crafted URL containing the malicious fragment.

As AI browser assistants achieve entry to delicate knowledge and system controls, the chance of context manipulation will proceed rising.

Safety specialists urge AI browser distributors to implement sturdy defences earlier than widespread adoption makes these assaults inevitable in real-world eventualities.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attack, Browsers, Simple, Technique, Tricks

Post navigation

Previous Post: Dartmouth College Confirms Data Theft in Oracle Hack
Next Post: RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware

Related Posts

Google Enhances Security, Blocks 1.75 Million Malicious Apps Google Enhances Security, Blocks 1.75 Million Malicious Apps Cyber Security News
Hackers Exploiting Windows Server Update Services Vulnerability to Steal Sensitive Data from Organizations Hackers Exploiting Windows Server Update Services Vulnerability to Steal Sensitive Data from Organizations Cyber Security News
Adobe Acrobat Reader Vulnerabilities let Attackers Execute Arbitrary Code and Bypass Security Adobe Acrobat Reader Vulnerabilities let Attackers Execute Arbitrary Code and Bypass Security Cyber Security News
LockBit Operators Using Stealthy DLL Sideloading Technique to Load Malicious App as Legitimate One LockBit Operators Using Stealthy DLL Sideloading Technique to Load Malicious App as Legitimate One Cyber Security News
CISA Warns of Android 0-Day Vulnerability Exploited in Attacks CISA Warns of Android 0-Day Vulnerability Exploited in Attacks Cyber Security News
CPUID Site Delivers Compromised CPU-Z and HWMonitor Tools CPUID Site Delivers Compromised CPU-Z and HWMonitor Tools Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark