Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft Exposes AI Chatbot Manipulation Techniques

Microsoft Exposes AI Chatbot Manipulation Techniques

Posted on February 17, 2026 By CWS

Microsoft has uncovered a new technique where businesses are manipulating AI chatbots using ‘Summarize with AI’ buttons on websites. This method, resembling traditional search engine poisoning, has been named AI Recommendation Poisoning by Microsoft’s Defender Security Research Team. It involves injecting bias into AI systems to influence their responses and recommendations.

Understanding AI Recommendation Poisoning

The technique involves embedding hidden instructions within the ‘Summarize with AI’ buttons. When clicked, these buttons inject persistent commands into an AI assistant’s memory, which can skew recommendations in favor of certain companies. Microsoft identified over 50 such prompts from 31 businesses across various sectors, highlighting potential risks to transparency and trust.

These manipulative actions are executed through specially crafted URLs that pre-populate AI chatbots with biased prompt instructions. This approach is a variant of AI Memory Poisoning, which can also occur through social engineering or cross-prompt injections.

Mechanics of Manipulation

In a typical scenario, clicking a ‘Summarize with AI’ button executes pre-filled commands that manipulate the AI’s memory. Microsoft has noted that such links are also being distributed via emails, further expanding their reach. Examples include URLs that direct the AI to remember specific sources as authoritative for certain topics.

The manipulation relies on the AI’s inability to differentiate genuine user preferences from those inserted by external entities. This has led to the proliferation of tools like CiteMET and AI Share Button URL Creator, which facilitate embedding promotional content into AI assistants.

Implications and Preventive Measures

The consequences of such manipulation are significant, potentially leading to the dissemination of false information and undermining trust in AI-driven insights. Users often accept AI-generated recommendations without verification, making this form of manipulation particularly dangerous.

To mitigate these risks, users are advised to audit AI assistant memories regularly, be cautious of AI-related links from untrusted sources, and approach ‘Summarize with AI’ buttons with skepticism. Organizations should monitor for URLs that contain suspicious prompt instructions to identify potential manipulation.

The rise of AI Recommendation Poisoning underscores the need for vigilance in maintaining the integrity and trustworthiness of AI systems, which play an increasingly vital role in decision-making processes.

The Hacker News Tags:AI, AI memory poisoning, AI recommendations, AI security, chatbot manipulation, Cybersecurity, digital trust, enterprise security, Microsoft, tech news

Post navigation

Previous Post: Langchain SSRF Vulnerability Threatens Internal Security
Next Post: New Cyber Threats Targeting ICS/OT in 2025 Identified

Related Posts

Your First and Last Line of Defense Your First and Last Line of Defense The Hacker News
BAS Is the Power Behind Real Defense BAS Is the Power Behind Real Defense The Hacker News
Iranian APT35 Hackers Targeting Israeli Tech Experts with AI-Powered Phishing Attacks Iranian APT35 Hackers Targeting Israeli Tech Experts with AI-Powered Phishing Attacks The Hacker News
Critical SolarWinds Vulnerability Listed as Actively Exploited Critical SolarWinds Vulnerability Listed as Actively Exploited The Hacker News
WinRAR Zero-Day Under Active Exploitation – Update to Latest Version Immediately WinRAR Zero-Day Under Active Exploitation – Update to Latest Version Immediately The Hacker News
3 Ways to Protect Your Business in 2026 3 Ways to Protect Your Business in 2026 The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Dell Vulnerability Exploited by Chinese Hackers Since 2024
  • Cybercriminals Exploit Atlassian for Fraudulent Schemes
  • DigitStealer Malware Uncovers macOS System Vulnerabilities
  • EU Parliament Disables AI on Devices Due to Security Risks
  • Major Data Breach at India’s Leading Pharmacy Chain

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Dell Vulnerability Exploited by Chinese Hackers Since 2024
  • Cybercriminals Exploit Atlassian for Fraudulent Schemes
  • DigitStealer Malware Uncovers macOS System Vulnerabilities
  • EU Parliament Disables AI on Devices Due to Security Risks
  • Major Data Breach at India’s Leading Pharmacy Chain

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News