Flutterby™! : HashJacking just sounds dirty

Next unread comment / Catchup all unread comments User Account Info | Logout | XML/Pilot/etc versions | Long version (with comments) | Weblog archives | Site Map | | Browse Topics

HashJacking just sounds dirty

2025-11-26 19:17:51.076272+01 by Dan Lyke 0 comments

The Register: HashJack attack shows AI browsers can be fooled with a simple ‘#’

Cato describes HashJack as "the first known indirect prompt injection that can weaponize any legitimate website to manipulate AI browser assistants." It outlines a method where actors sneak malicious instructions into the fragment part of legitimate URLs, which are then processed by AI browser assistants such as Copilot in Edge, Gemini in Chrome, and Comet from Perplexity AI. Because URL fragments never leave the AI browser, traditional network and server defenses cannot see them, turning legitimate websites into attack vectors.

Via.

[ related topics: Weblogs broadband Astronomy Television Artificial Intelligence ]

comments in ascending chronological order (reverse):