23.5 C
Canberra
Thursday, March 12, 2026

Researchers Trick Perplexity’s Comet AI Browser Into Phishing Rip-off in Underneath 4 Minutes


Ravie LakshmananMar 11, 2026Synthetic Intelligence / Browser Safety

Researchers Trick Perplexity’s Comet AI Browser Into Phishing Rip-off in Underneath 4 Minutes

Agentic internet browsers that leverage synthetic intelligence (AI) capabilities to autonomously execute actions throughout a number of web sites on behalf of a person may very well be educated and tricked into falling prey to phishing and rip-off traps.

The assault, at its core, takes benefit of AI browsers’ tendency to cause their actions and use it in opposition to the mannequin itself to decrease their safety guardrails, Guardio mentioned in a report shared with The Hacker Information forward of publication.

“The AI now operates in actual time, inside messy and dynamic pages, whereas repeatedly requesting info, making selections, and narrating its actions alongside the best way. Effectively, ‘narrating’ is kind of an understatement – It blabbers, and manner an excessive amount of!,” safety researcher Shaked Chen mentioned.

“That is what we name Agentic Blabbering: the AI Browser exposing what it sees, what it believes is going on, what it plans to do subsequent, and what alerts it considers suspicious or protected.”

By intercepting this visitors between the browser and the AI companies working on the seller’s servers and feeding it as enter to a Generative Adversarial Community (GAN), Guardio mentioned it was capable of make Perplexity’s Comet AI browser fall sufferer to a phishing rip-off in underneath 4 minutes.

The analysis builds on prior strategies like VibeScamming and Scamlexity, which discovered that vibe-coding platforms and AI browsers may very well be coaxed into producing rip-off pages or finishing up malicious actions through hidden immediate injections. In different phrases, with the AI agent dealing with the duties with out fixed human supervision, there arises a shift within the assault floor whereby a rip-off now not has to deceive a person. Relatively, it goals to trick the AI mannequin itself.

“For those who can observe what the agent flags as suspicious, hesitates on, and extra importantly, what it thinks and blabbers concerning the web page, you should utilize that as a coaching sign,” Chen defined. “The rip-off evolves till the AI Browser reliably walks into the entice one other AI set for it.”

The thought, in a nutshell, is to construct a “scamming machine” that iteratively optimizes and regenerates a phishing web page till the agentic browser stops complaining and proceeds to hold out the risk actor’s bidding, reminiscent of coming into a sufferer’s credentials on a bogus internet web page designed for finishing up a refund rip-off.

What makes this assault attention-grabbing and harmful is that when the fraudster iterates on an online web page till it really works in opposition to a selected AI browser, it really works on all customers who depend on the identical agent. Put in another way, the goal has shifted from the human person to the AI browser.

“This reveals the unlucky close to future we face: scams is not going to simply be launched and adjusted within the wild, they are going to be educated offline, in opposition to the precise mannequin tens of millions depend on, till they work flawlessly on first contact,” Guardio mentioned. “As a result of when your AI Browser explains why it stopped, it teaches attackers bypass it.”

The disclosure comes as Path of Bits demonstrated 4 immediate injection strategies in opposition to the Comet browser to extract customers’ personal info from companies like Gmail by exploiting the browser’s AI assistant and exfiltrating the info to an attacker’s server when the person asks to summarize an online web page underneath their management.

Final week, Zenity Labs additionally detailed two zero-click assaults affecting Perplexity’s Comet that use oblique immediate injection seeded inside assembly invitations to exfiltrate native information to an exterior server (aka PerplexedComet) or hijack a person’s 1Password account if the password supervisor extension is put in and unlocked. The problems, collectively codenamed PerplexedBrowser, have since been addressed by the AI firm.

That is achieved by way of a immediate injection method known as intent collision, which happens “when the agent merges a benign person request with attacker-controlled directions from untrusted internet knowledge right into a single execution plan, and not using a dependable method to distinguish between the 2,” safety researcher Stav Cohen mentioned.

Immediate injection assaults stay a elementary safety problem for big language fashions (LLMs) and for integrating them into organizational workflows, largely as a result of fully eliminating these vulnerabilities will not be possible. In December 2025, OpenAI famous that such weaknesses are “unlikely to ever” be absolutely resolved in agentic browsers, though the related dangers may very well be decreased by automated assault discovery, adversarial coaching, and new system-level safeguards.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

[td_block_social_counter facebook="tagdiv" twitter="tagdivofficial" youtube="tagdiv" style="style8 td-social-boxed td-social-font-icons" tdc_css="eyJhbGwiOnsibWFyZ2luLWJvdHRvbSI6IjM4IiwiZGlzcGxheSI6IiJ9LCJwb3J0cmFpdCI6eyJtYXJnaW4tYm90dG9tIjoiMzAiLCJkaXNwbGF5IjoiIn0sInBvcnRyYWl0X21heF93aWR0aCI6MTAxOCwicG9ydHJhaXRfbWluX3dpZHRoIjo3Njh9" custom_title="Stay Connected" block_template_id="td_block_template_8" f_header_font_family="712" f_header_font_transform="uppercase" f_header_font_weight="500" f_header_font_size="17" border_color="#dd3333"]
- Advertisement -spot_img

Latest Articles