CometJacking Attack Exploits AI Browser to Steal Sensitive Data

  • A new attack named CometJacking targets Perplexity‘s agentic AI browser Comet via malicious embedded prompts.
  • The attack uses a deceptive link to extract sensitive data from connected services like email and calendar.
  • CometJacking bypasses existing data protection by using simple Base64-encoding for data exfiltration.
  • The attack requires no credential theft since the browser already has authorized access to user accounts.
  • Experts warn AI-enabled browsers pose new security threats that need built-in protections for prompt and memory handling.

Cybersecurity experts have revealed details of a newly identified attack called CometJacking, which exploits Perplexity‘s AI-powered browser, Comet. This method uses malicious prompts hidden inside seemingly harmless links to steal sensitive data from services linked to the browser, such as email and calendar.

- Advertisement -

The attack unfolds when a user clicks a specially crafted URL that triggers the browser’s AI to execute a hidden command. This command gathers private information from connected accounts, encodes the data with Base64 (a simple text encoding method), and sends it to a server controlled by the attacker. The entire process bypasses standard protections as it does not involve stealing user credentials, relying instead on the browser’s existing authorized access.

Michelle Levy, Head of Security Research at LayerX, said, “CometJacking shows how a single, weaponized URL can quietly flip an AI browser from a trusted co-pilot to an insider threat.” She added, “Our research proves that trivial obfuscation can bypass data exfiltration checks and pull email, calendar, and connector data off-box in one click.” Levy emphasized the need for AI browsers to incorporate security throughout their design, especially around agent prompts and memory access, not just web page content.

The malicious link uses their “collection” parameter to instruct the AI agent to access stored prompts, avoiding real-time web searches. While Perplexity has stated their findings pose “no security impact,” the incident raises concerns about new vulnerabilities inherent in AI-native tools. These risks challenge traditional defenses and highlight how attackers could misuse AI assistants within browsers.

This follows a 2020 attack called Scamlexity, disclosed by Guardio Labs, which showed how browsers like Comet could be manipulated into interacting with phishing or fake shopping sites without user knowledge. Or Eshed, CEO of LayerX, noted, “AI browsers are the next enterprise battleground,” and urged organizations to actively develop systems to detect and block malicious AI prompts before such attacks become common.

- Advertisement -

For more information on the attack, see the full report at LayerX’s blog.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Burry Says OpenAI Oracle Exit Reveals Chip Rivalry

Investor Michael Burry criticized NVIDIA's aggressive data center tactics, raising antitrust concerns.Burry linked OpenAI's...

Hedera Deprecates Hiero Local Node for Solo

Hiero Local Node is being deprecated, with a 6-month transition window ending September 2026.Developers...

Prediction markets quietly trade on global assassinations amid crisis

Polymarket is Hosting open "assassination markets" that let users bet on the political fate...

Arthur Hayes Forecasts Hyperliquid Could Hit $150 by August

Hyperliquid's HYPE token could rally to $150 by August if it continues to capture...

DOJ seeks retrial for Tornado Cash dev on key charges

U.S. Attorney Jay Clayton has requested a retrial for Tornado Cash developer Roman Storm...

Must Read

What Is Binance Earn?

As someone who is passionate about cryptocurrency, I am always on the lookout for new opportunities to grow my portfolio. That's why I was...