Saturday, 13 December 2025
26 C
Singapore
22.1 C
Thailand
20.6 C
Indonesia
26.9 C
Philippines

AI browsers vulnerable to covert hacks using simple URL fragments, experts warn

Experts warn AI browsers can be hacked with hidden URL fragments, posing risks invisible to traditional security measures.

Recent research has revealed that many AI browsers may be at risk from a novel hacking method that exploits hidden text in URLs. Experts say the technique, called “HashJack,” allows attackers to insert commands after a hashtag in an otherwise legitimate link, which the browser assistant processes without alerting users or servers.

How the HashJack technique works

Cato Networks’ study demonstrated that HashJack lets malicious instructions remain hidden in the browser. The assistant interprets the text locally, meaning it does not transmit the instructions to the server. Users continue to see a normal web page while the browser quietly executes the commands.

Tests revealed that certain AI assistants could autonomously take action after encountering these fragments, including sending data to external locations controlled by attackers. Others generated misleading guidance or promoted links that appeared to be from trusted sources, creating the impression of a normal session while altering the information presented to the user. The page displayed in the browser remained unchanged, making the intrusion difficult to detect without close monitoring of the assistant’s behaviour.

Industry response and challenges

Major technology firms have been notified of the vulnerability, but responses have varied. Some companies issued updates to their AI browser features, while others considered the behaviour to be expected under existing design logic.

Defending against this type of indirect prompt manipulation depends on how each AI assistant interprets hidden instructions on a page. Traditional traffic inspection tools only monitor URL fragments that leave the device. Because HashJack fragments are processed locally, conventional security measures offer limited protection. Experts say defenders must look beyond network-level monitoring and examine how AI assistants integrate with browsers, with particular attention to local behaviour invisible to users.

Stronger protection requires stricter endpoint security and tighter firewall rules, though these measures do not fully address the visibility gap. HashJack highlights a vulnerability unique to AI-assisted browsing, where even legitimate websites can be weaponised without leaving conventional traces. Awareness of these limitations is essential for organisations deploying AI tools, as traditional monitoring methods cannot fully capture such threats.

Tips for staying safe online

Experts recommend limiting the personal information shared online and monitoring financial accounts for unusual activity. Using unique, complex passwords and verifying URLs before logging in can reduce the risk of attacks. Users should also exercise caution with unsolicited messages or calls claiming to be from financial institutions and ensure antivirus software and firewalls are enabled. Identity theft protection services can help monitor sensitive information, though experts stress that even sophisticated measures cannot eliminate the risk from AI-driven attacks and phishing campaigns. Consistent implementation across all devices and networks remains key to maintaining security.

HashJack serves as a reminder that, while convenient, AI browsers introduce new cybersecurity risks that require careful oversight.

Hot this week

Kirby Air Riders brings fast, chaotic racing to modern players

Kirby Air Riders offers fast, chaotic racing for quick sessions and modern short-attention-play styles.

Enterprise AI adoption accelerates as organisations deepen workflow integration

A new OpenAI report shows rapid global growth in enterprise AI, rising productivity gains, and a widening gap between leading and lagging adopters.

Tech industry overlooks Auracast as momentum quietly builds

Auracast promises major improvements in wireless audio, but limited marketing and slow adoption mean many consumers still don't know it exists.

Singapore leads global third-party cyber risk maturity as supply-chain threats intensify

Singapore leads global third-party cyber risk maturity but faces rising supply-chain cyber threats, according to new BlueVoyant research.

Razorpay Singapore introduces checkout feature to reduce payment costs and boost conversions

Razorpay Singapore launches a checkout feature offering instant discounts to reduce payment fees and boost online conversion rates.

PlayStation introduces limited edition Genshin Impact DualSense controller

PlayStation announces a limited edition Genshin Impact DualSense controller for PS5, launching in Singapore on 21 January 2026.

PGL brings Counter-Strike 2 Major to Singapore in November 2026

PGL confirms the Counter-Strike 2 Major is coming to Singapore in November 2026, marking the first CS2 Major in Southeast Asia.

Denodo: Rethinking data architecture for AI agility and measurable ROI in Asia-Pacific

Denodo highlights how modern, composable data architectures powered by logical data management are helping Asia-Pacific enterprises accelerate AI adoption, ensure governance, and achieve measurable ROI.

Veeam completes acquisition of Securiti AI to build unified trusted data platform

Veeam completes its US$1.725 billion acquisition of Securiti AI to form a unified trusted data platform for secure and scalable AI adoption.

Related Articles

Popular Categories