Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Target Perplexity Comet Browser Users

Hackers Target Perplexity Comet Browser Users

Posted on October 24, 2025October 24, 2025 By CWS

Shortly after AI search engine firm Perplexity launched its Comet AI browser, risk actors tried to capitalize on it by luring customers to fraudulent domains and pretend purposes, risk intelligence agency BforeAI reviews.

Launched in July, Comet is a Chromium-based browser that integrates Perplexity’s AI assistant, providing assist for automating duties, organizing emails, and researching the online.

Starting August, BforeAI noticed a rise in fraudulent domains selling an executable model of the browser out there for obtain by way of third-party web sites.

Evaluation of over 40 suspicious domains confirmed the usage of typo-squatting, model impersonation, and misleading ads to lure customers to the fraudulent web sites.

The risk actors behind this coordinated marketing campaign used a number of key phrase variations containing ‘comet’, ‘AI’, ‘browser’, ‘perplexity’, and ‘obtain’.

Eight of the domains had been registered after Comet was launched, together with cometai.website, cometaibrowser.com, perplexitycomet-ai.com, cometbrowser.web, and aicometbrowser.com, that are thought-about critical- and high-level threats.

The cometai.web area, the risk intelligence agency notes, has been parked for $9,999 on GoDaddy​.

Moreover, BforeAI recognized two critical-level cell software threats within the Google Play Retailer, equivalent to Comet AI Atlas App Information, which immediately impersonates the browser.Commercial. Scroll to proceed studying.

A fraudulent iOS software was additionally recognized, and Perplexity CEO Aravind Srinivas warned of its existence earlier this month.

“The Comet app presently on iOS App Retailer is faux and spam and never from Perplexity,” his public warning reads.

The risk intelligence agency additionally found Google adverts selling fraudulent Comet downloads and social media adverts that directed to faux websites, and linked them to the identical marketing campaign.

“The timing of area registrations carefully follows Comet’s launch timeline, indicating opportunistic cybercriminals monitoring for rising know-how tendencies. Using worldwide registrars, privateness safety companies, and parking pages suggests coordination amongst risk actors,” BforeAI notes.

Associated: AI Sidebar Spoofing Places ChatGPT Atlas, Perplexity Comet and Different Browsers at Danger

Associated: Browser Extensions Pose Severe Risk to Gen-AI Instruments Dealing with Delicate Knowledge

Associated: Browser Safety Beneath Siege: The Alarming Rise of AI-Powered Phishing

Associated: The Shadow AI Surge: Research Finds 50% of Employees Use Unapproved AI Instruments

Security Week News Tags:Browser, Comet, Hackers, Perplexity, Target, Users

Post navigation

Previous Post: Arsen Launches Smishing Simulation to Help Companies Defend Against Mobile Phishing Threats
Next Post: APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign

Related Posts

CrystalX RAT: New Malware Threat Grows Rapidly CrystalX RAT: New Malware Threat Grows Rapidly Security Week News
OpenAI User Data Exposed in Mixpanel Hack OpenAI User Data Exposed in Mixpanel Hack Security Week News
Cyber Espionage Group Targets 37 Nations’ Infrastructure Cyber Espionage Group Targets 37 Nations’ Infrastructure Security Week News
Millions of Cars Exposed to Remote Hacking via PerfektBlue Attack Millions of Cars Exposed to Remote Hacking via PerfektBlue Attack Security Week News
Risks of Pirated Software in Corporate Environments Risks of Pirated Software in Corporate Environments Security Week News
From Ex Machina to Exfiltration: When AI Gets Too Curious From Ex Machina to Exfiltration: When AI Gets Too Curious Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark