AI Made Friendly HERE

Be Careful With AI Browsers: A Malicious Image Could Hack Them

Don’t miss out on our latest stories. Add PCMag as a preferred source on Google.

AI-powered browsers are supposed to be smart. However, new security research suggests that they can also be weaponized to hack users, including when analyzing images on the web. 

On the same day OpenAI introduced its ChatGPT Atlas browser, Brave Software published details on how to trick AI browsers into carrying out malicious instructions. 

The potential flaw is another prompt injection attack, where a hacker secretly feeds a malicious prompt to an AI chatbot, which might include loading a dangerous website or viewing a user’s email. Brave, which develops the privacy-focused Brave browser, has been warning about the trade-offs involved with embedding automated AI agents into such software. On Tuesday, it reported a prompt injection attack that can be delivered to Perplexity’s AI-powered Comet browser if it’s used to analyze an image, such as a screenshot taken from the web. 

This Tweet is currently unavailable. It might be loading or has been removed.

“In our attack, we were able to hide prompt injection instructions in images using a faint light blue text on a yellow background. This means that the malicious instructions are effectively hidden from the user,” Brave Software wrote. 

If the Comet browser is asked to analyze the image, it’ll read the hidden malicious instructions and possibly execute them. Brave created an attack demo using the malicious image, which appears to have successfully tricked the Comet browser into carrying out at least some of the hidden commands, including looking up a user’s email and visiting a hacker-controlled website. 

Brave also discovered a similar prompt injection attack for the Fellou browser when the software was told to merely navigate to a hacker-controlled website. The attack demo shows Fellou will read the hidden instructions on the site and execute them, including reading the user’s email inbox and then passing the title of the most recent email to a hacker-controlled website. 

Newsletter Icon

Get Our Best Stories!

Stay Safe With the Latest Security News and Updates

SecurityWatch Newsletter Image

Sign up for our SecurityWatch newsletter for our most important privacy and security stories delivered right to your inbox.

Sign up for our SecurityWatch newsletter for our most important privacy and security stories delivered right to your inbox.

By clicking Sign Me Up, you confirm you are 16+ and agree to our Terms of Use and Privacy Policy.

Thanks for signing up!

Your subscription has been confirmed. Keep an eye on your inbox!

“While Fellou browser demonstrated some resistance to hidden instruction attacks, it still treats visible web page content as trusted input to its LLM [large language model]. Surprisingly, we found that simply asking the browser to go to a website causes the browser to send the website’s content to their LLM,” Brave says.

This Tweet is currently unavailable. It might be loading or has been removed.

The good news is that it appears the user can intervene and stop the attack, which is fairly visible when the AI is processing the task. Still, Brave argues the research underscores how “indirect prompt injection is not an isolated issue, but a systemic challenge facing the entire category of AI-powered browsers.”

Recommended by Our Editors

“The scariest aspect of these security flaws is that an AI assistant can act with the user’s authenticated privileges,” Brave added in a tweet. “An agentic browser hijacked by a malicious site can access a user’s banking, work email, or other sensitive accounts.”

In response, the company is calling on AI browser makers to implement additional safeguards to prevent potential hacks. This includes “explicit consent from users for agentic browsing actions like opening sites or reading emails,” which OpenAI and Microsoft are already doing to some extent with their own AI implementations. 

Brave reported the flaws to Perplexity and Fellou. Fellou didn’t immediately respond to a request for comment. But Perplexity tells PCMag: “We worked closely with Brave on this issue through our active bug bounty program (the flaw is patched, unreproducible, and was never exploited by any user).”

Still, Perplexity is pushing back on the alarmism from Brave. “We’ve been dismayed to see how they mischaracterize that work in public. Nonetheless, we encourage visibility for all security conversations as the AI age introduces ever more variables and attack points,” Perplexity said, adding: “We’re the leaders in security research for AI assistants.” 

About Our Expert

Michael Kan

Michael Kan

Senior Reporter

Experience

I’ve been a journalist for over 15 years. I got my start as a schools and cities reporter in Kansas City and joined PCMag in 2017, where I cover satellite internet services, cybersecurity, PC hardware, and more. I’m currently based in San Francisco, but previously spent over five years in China, covering the country’s technology sector.

Since 2020, I’ve covered the launch and explosive growth of SpaceX’s Starlink satellite internet service, writing 600+ stories on availability and feature launches, but also the regulatory battles over the expansion of satellite constellations, fights with rival providers like AST SpaceMobile and Amazon, and the effort to expand into satellite-based mobile service. I’ve combed through FCC filings for the latest news and driven to remote corners of California to test Starlink’s cellular service.

I also cover cyber threats, from ransomware gangs to the emergence of AI-based malware. Earlier this year, the FTC forced Avast to pay consumers $16.5 million for secretly harvesting and selling their personal information to third-party clients, as revealed in my joint investigation with Motherboard.

I also cover the PC graphics card market. Pandemic-era shortages led me to camp out in front of a Best Buy to get an RTX 3000. I’m now following how President Trump’s tariffs will affect the industry. I’m always eager to learn more, so please jump in the comments with feedback and send me tips.

Read Full Bio

Originally Appeared Here

You May Also Like

About the Author:

Early Bird