Flutterby™!
: HashJacking just sounds dirty
HashJacking just sounds dirty
2025-11-26 19:17:51.076272+01 by
Dan Lyke
0 comments
The
Register: HashJack attack shows AI browsers can be fooled with a simple #
Cato describes HashJack as "the first known indirect prompt
injection that can weaponize any legitimate website to manipulate AI browser assistants."
It outlines a method where actors sneak malicious instructions into the fragment part of
legitimate URLs, which are then processed by AI browser assistants such as Copilot in Edge,
Gemini in Chrome, and Comet from
Perplexity AI. Because URL fragments never leave the AI browser, traditional network
and server defenses cannot see them, turning legitimate websites into attack vectors.
Via.
[ related topics:
Weblogs broadband Astronomy Television Artificial Intelligence
]
comments in ascending chronological order (reverse):
Comment policy
We will not edit your comments. However, we may delete your
comments, or cause them to be hidden behind another link, if we feel
they detract from the conversation. Commercial plugs are fine,
if they are relevant to the conversation, and if you don't
try to pretend to be a consumer. Annoying endorsements will be deleted
if you're lucky, if you're not a whole bunch of people smarter and
more articulate than you will ridicule you, and we will leave
such ridicule in place.
Flutterby™ is a trademark claimed by
Dan Lyke for the web publications at www.flutterby.com and www.flutterby.net.