{"id":236,"date":"2026-03-11T18:14:45","date_gmt":"2026-03-11T18:14:45","guid":{"rendered":"https:\/\/thedigitalfortress.us\/?p=236"},"modified":"2026-03-11T18:14:45","modified_gmt":"2026-03-11T18:14:45","slug":"researchers-trick-perplexitys-comet-ai-browser-into-phishing-scam-in-under-four-minutes","status":"publish","type":"post","link":"https:\/\/thedigitalfortress.us\/?p=236","title":{"rendered":"Researchers Trick Perplexity&#8217;s Comet AI Browser Into Phishing Scam in Under Four Minutes"},"content":{"rendered":"<div>\n<p><span class=\"p-author\"><i class=\"icon-font icon-user\">\ue804<\/i><span class=\"author\">Ravie Lakshmanan<\/span><i class=\"icon-font icon-calendar\">\ue802<\/i><span class=\"author\">Mar 11, 2026<\/span><\/span><span class=\"p-tags\">Artificial Intelligence \/ Browser Security<\/span><\/p>\n<\/div>\n<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiHkDTAnMilk2AM0Yg71UjZJul-Q0y_QvAqY97sCemt73LNrjo7Rwp7uHjmFpSmeV75WwsRN5tRMdcgACXJFnv7FMOqb9qAnaOoyek1f0KubQtDtdkWZAh6g8ZZXNSwLLmAZYONBXIM-xa9QNbO9qQDI4REUUobzfhTuBJED4ilM5CBA0AmQ6zfyUWpvQDo\/s1700-e365\/agent.png\" style=\"display: block;  text-align: center; clear: left; float: left;\"><\/a><\/div>\n<p>Agentic web browsers that leverage artificial intelligence (AI) capabilities to autonomously execute actions across multiple websites on behalf of a user could be trained and tricked into falling prey to phishing and scam traps.<\/p>\n<p>The attack, at its core, takes advantage of AI browsers&#8217; tendency to reason their actions and use it against the model itself to lower their security guardrails, Guardio <a href=\"https:\/\/guard.io\/labs\/agenticblabbering---how-ai-browsers-verbose-reasoning-fuels-the-ultimate-scamming-machine\" rel=\"noopener\" target=\"_blank\">said<\/a> in a report shared with The Hacker News ahead of publication.<\/p>\n<p>\u00abThe AI now operates in real time, inside messy and dynamic pages, while continuously requesting information, making decisions, and narrating its actions along the way. Well, &#8216;narrating&#8217; is quite an understatement &#8211; It blabbers, and way too much!,\u00bb security researcher Shaked Chen said.<\/p>\n<p>\u00abThis is what we call <strong>Agentic Blabbering<\/strong>: the AI Browser exposing what it sees, what it believes is happening, what it plans to do next, and what signals it considers suspicious or safe.\u00bb<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/not-fast-enough-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhlXM830ruQd2xT6M7JNeNRjaFa1onD12WjSCHihTFMTzbyfT9h-irPmXy_h3E1HGSs6sdv7FTmnyNVTM5kmSb7BuUtZe8gKoTQt99P1sSzRcqqXpOJP6eoAOhR3DGb6qHx9kOZ_HBZUMmVnsnd0DM7QfUp81bgzTvvgLww6oqB-EhnDfWXH5pWCYhAsyLs\/s728-e100\/tl-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>By intercepting this traffic between the browser and the AI services running on the vendor&#8217;s servers and feeding it as input to a Generative Adversarial Network (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Generative_adversarial_network\" rel=\"noopener\" target=\"_blank\">GAN<\/a>), Guardio said it was able to make Perplexity&#8217;s Comet AI browser fall victim to a phishing scam in under four minutes.<\/p>\n<p>The research builds on prior techniques like <a href=\"https:\/\/thehackernews.com\/2025\/04\/lovable-ai-found-most-vulnerable-to.html\" rel=\"noopener\" target=\"_blank\">VibeScamming and Scamlexity, which found that vibe-coding platforms and AI browsers could be coaxed into generating scam pages or carrying out malicious actions via hidden prompt injections. In other words, with the AI agent handling the tasks without constant human supervision, there arises a shift in the attack surface wherein a scam no longer has to deceive a user. Rather, it aims to trick the AI model itself.<\/p>\n<p>\u00abIf you can observe what the agent flags as suspicious, hesitates on, and more importantly, what it thinks and blabbers about the page, you can use that as a training signal,\u00bb Chen explained. \u00abThe scam evolves until the AI Browser reliably walks into the trap another AI set for it.\u00bb<\/p>\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhl0jYugIHeLg7ZBeZoWjYpGz-30SvC5ghfoVZwOw2SyrWUqhWz5s_PERI0r6qLEcJL7So2CnCPkjyjN4Pwh8W_eomek_5J1ZRRYfC8ze3WM41y-gpiItaHSDMkmOQmmp4v7pc8WaAjg28fnla1YH8f7BrUnggVQWZzfxQoUOqlFAm7Y1cOYQE1soeHwkhj\/s1700-e365\/scam.png\" style=\"display: block;  text-align: center; clear: left; float: left;\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhl0jYugIHeLg7ZBeZoWjYpGz-30SvC5ghfoVZwOw2SyrWUqhWz5s_PERI0r6qLEcJL7So2CnCPkjyjN4Pwh8W_eomek_5J1ZRRYfC8ze3WM41y-gpiItaHSDMkmOQmmp4v7pc8WaAjg28fnla1YH8f7BrUnggVQWZzfxQoUOqlFAm7Y1cOYQE1soeHwkhj\/s1700-e365\/scam.png\" alt=\"\" border=\"0\" data-original-height=\"2266\" data-original-width=\"3478\"\/><\/a><\/div>\n<p>The idea, in a nutshell, is to build a \u00abscamming machine\u00bb that iteratively optimizes and regenerates a phishing page until the agentic browser stops complaining and proceeds to carry out the threat actor&#8217;s bidding, such as entering a victim&#8217;s credentials on a bogus web page designed for carrying out a refund scam.<\/p>\n<p>What makes this attack interesting and dangerous is that once the fraudster iterates on a web page until it works against a specific AI browser, it works on all users who rely on the same agent. Put differently, the target has shifted from the human user to the AI browser.<\/p>\n<p>\u00abThis reveals the unfortunate near future we are facing: scams will not just be launched and adjusted in the wild, they will be trained offline, against the exact model millions rely on, until they work flawlessly on first contact,\u00bb Guardio said. \u00abBecause when your AI Browser explains why it stopped, it teaches attackers how to bypass it.\u00bb<\/p>\n<p>The disclosure comes as Trail of Bits <a href=\"https:\/\/blog.trailofbits.com\/2026\/02\/20\/using-threat-modeling-and-prompt-injection-to-audit-comet\/\" rel=\"noopener\" target=\"_blank\">demonstrated<\/a> four <a href=\"https:\/\/arxiv.org\/abs\/2511.20597\" rel=\"noopener\" target=\"_blank\">prompt injection techniques<\/a> against the Comet browser to extract users&#8217; private information from services like Gmail by exploiting the browser&#8217;s AI assistant and exfiltrating the data to an attacker\u2019s server when the user asks to summarize a web page under their control.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/cyber-comm-guide-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEigDbfWwE4P_DsjfBRxgecgosqTRr8-2j328LrzdUBWrWmWeDUTI7OhXc-zXveYOjBc7GStGz5WnpXsJGaLCuoryIXbL7NxRyaWzIJGO1TBpd48NkYzNqTMj9zWMzgfvqh20RxsdMll45TFiMzXja0pAd7roFjMnzsRYBGHOWSLnyKN-oMKyCLoYcjmb5hm\/s728-e100\/ciso-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>Last week, Zenity Labs also detailed two zero-click attacks affecting Perplexity&#8217;s Comet that use indirect prompt injection seeded within meeting invites to exfiltrate local files to an external server (aka <a href=\"https:\/\/labs.zenity.io\/p\/perplexedbrowser-perplexity-s-agent-browser-can-leak-your-personal-pc-local-files\" rel=\"noopener\" target=\"_blank\">PerplexedComet<\/a>) or <a href=\"https:\/\/labs.zenity.io\/p\/perplexedbrowser-how-attackers-can-weaponize-comet-to-takeover-your-1password-vault\" rel=\"noopener\" target=\"_blank\">hijack a user&#8217;s 1Password account<\/a> if the <a href=\"https:\/\/1password.com\/blog\/security-advisory-for-ai-assisted-browsing-with-the-1password-browser\" rel=\"noopener\" target=\"_blank\">password manager extension<\/a> is installed and unlocked. The issues, collectively codenamed PerplexedBrowser, have since been addressed by the AI company.<\/p>\n<p>This is achieved by means of a prompt injection technique referred to as intent collision, which occurs \u00abwhen the agent merges a benign user request with attacker-controlled instructions from untrusted web data into a single execution plan, without a reliable way to distinguish between the two,\u00bb security researcher Stav Cohen said.<\/p>\n<p>Prompt injection attacks remain a fundamental security challenge for large language models (LLMs) and for integrating them into organizational workflows, largely because completely eliminating these vulnerabilities may not be feasible. In December 2025, OpenAI noted that such weaknesses are \u00abunlikely to ever\u00bb be fully resolved in agentic browsers, although the associated risks could be reduced through automated attack discovery, adversarial training, and new system-level safeguards.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\ue804Ravie Lakshmanan\ue802Mar 11, 2026Artificial Intelligence \/ Browser Security Agentic web browsers that leverage artificial intelligence (AI) capabilities to autonomously execute actions across multiple websites on behalf of a user could&hellip;<\/p>\n","protected":false},"author":1,"featured_media":237,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[265,608,609,607,390,605,595,606],"class_list":["post-236","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-browser","tag-comet","tag-minutes","tag-perplexitys","tag-phishing","tag-researchers","tag-scam","tag-trick"],"_links":{"self":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/236","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=236"}],"version-history":[{"count":0,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/236\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/media\/237"}],"wp:attachment":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=236"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=236"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=236"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}