One Click: How Perplexity’s Comet AI Browser Can Compromise Your Data

Published:

spot_img

Oct 04, 2025Ravie LakshmananAgentic AI / Enterprise Security

Understanding CometJacking: A New Threat to AI Browsers

Recently, cybersecurity experts unveiled a novel attack dubbed CometJacking, aimed specifically at Perplexity’s AI browser, Comet. This technique involves embedding harmful prompts within seemingly harmless links to gain unauthorized access to sensitive information. The key targets include connected services like email and calendars, making it a pressing concern for users who rely on these tools for both personal and professional tasks.

How CometJacking Works

The CometJacking attack operates as a subtle prompt injection method. When a user clicks a malicious link, often included in phishing emails or embedded in web pages, they unknowingly trigger the browser’s AI to execute actions without their consent. This deceptive approach can result in significant data breaches.

Michelle Levy, Head of Security Research at LayerX, emphasized the dangers of this attack, stating that a single compromised URL can transform a trusted AI assistant into a potential insider threat. “It’s not merely about data theft; it’s about exploiting an agent that already possesses critical access,” she noted. According to Levy, the research demonstrates how minor obfuscation techniques can bypass standard data protection measures, allowing attackers to retrieve emails, calendar entries, and other integrated data with minimal effort.

The Steps of the Attack

The mechanics of the CometJacking attack can be summarized in a five-step process:

  1. Initiation: The victim clicks on a specially crafted URL, which could be located in a phishing email or on a compromised webpage.

  2. Execution: Rather than leading the user to the intended website, the URL contains commands that instruct the Comet browser’s AI to execute hidden prompts.

  3. Data Capture: The AI captures sensitive data from platforms like Gmail.

  4. Obfuscation: This information is then encoded using techniques like Base64 to obscure its contents.

  5. Transmission: Finally, the encoded data is sent to an endpoint controlled by the attacker.

This entire process illustrates how the crafted URL utilizes a specific query string directed at the AI, pushing it to refer to its memory instead of performing a normal web search.

Security Implications

Perplexity has publicly stated that the findings of the research are classified as having “no security impact.” However, this perspective highlights a growing concern: AI-driven tools may expose fresh vulnerabilities that traditional security protocols struggle to counteract. The potential for malicious actors to manipulate these tools puts both users and organizations at risk of data breaches.

In a previous instance, Guardio Labs reported a similar threat, called Scamlexity, in which browsers, including Comet, could be manipulated into interacting with phishing sites without the users’ awareness. This evolving landscape underscores the need for heightened security measures in AI applications.

Preparing for AI-Driven Threats

As AI browsers increasingly become integral to enterprise environments, the landscape of cybersecurity is shifting. Or Eshed, CEO of LayerX, cautioned that the AI browser could become a central command point for attacks within corporate networks. “Organizations need to act swiftly to assess their security controls to detect and neutralize these malicious agent prompts before they escalate into widespread campaigns,” he stated.

The emergence of attacks like CometJacking serves as a reminder that while technology continues to evolve, so too does the sophistication of cyber threats. Understanding these risks and adopting proactive measures will be crucial in safeguarding sensitive information against emerging vulnerabilities.

spot_img

Related articles

Recent articles

Webinar: Uncovering Suspicious APK Files in Wedding Card and Loan App Scams

The surge of malicious APK files in cyber fraud schemes, such as fake wedding invitations and instant loan applications, has become a growing concern....

Skylon Partners with COBNB to Launch COBNB+ Featuring L’Occitane en Provence Hotel Amenities

Skylon Partners with COBNB for a Luxurious Hospitality Experience in Kuala Lumpur Introduction to the New Partnership In an exciting development for the hospitality scene in...

Understanding CISA KEV: Key Insights and Tools for Security Teams

Understanding the CISA Known Exploited Vulnerability (KEV) Catalog The Cybersecurity and Infrastructure Security Agency (CISA) maintains the Known Exploited Vulnerability (KEV) catalog, a resource designed...

Dark Web Leak Sparks WFH Job Scams; Prayagraj Police Freeze ₹2 Crore in Fraudulent Funds

Rising Cybercrime in Prayagraj: A New Target Shifting Tactics of Cybercriminals In Prayagraj, the landscape of cybercrime is evolving. Previously, scammers predominantly targeted victims through enticing...