Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Man in the Prompt Reveals Hidden AI Threat

August 18, 2025
Reading Time: 3 mins read
in Alerts
Fake Law Firms Exploit Crypto Victims

A new type of cyber security threat, known as “Man-in-the-Prompt,” is raising alarms within the AI and cyber security communities. This new attack vector specifically targets interactions with major generative AI tools such as ChatGPT, Gemini, Copilot, and Claude. The most concerning aspect of this threat is its simplicity; it does not require complex or sophisticated hacking techniques. Instead, it leverages a common vulnerability found in web browsers: the browser extension.

According to research from LayerX, any browser extension, regardless of its permissions, has the potential to access and manipulate the prompts sent to large language models (LLMs). The exploit works by taking advantage of the fact that the text input window for these AI chatbots is a simple HTML field, which is part of the webpage’s Document Object Model (DOM). This accessibility means a malicious extension can read, alter, or rewrite a user’s request to the AI without the user ever being aware of the compromise. This makes the attack stealthy and difficult to detect.

The attack process is straightforward yet highly effective. It begins when a user opens an AI tool in their browser. A malicious browser extension then intercepts the user’s prompt before it is sent to the server. The extension modifies the prompt, adding hidden instructions for tasks like data exfiltration or prompt injection. The user then receives a response that appears normal, but in the background, sensitive data may have already been stolen or the session compromised. This method has been successfully tested on all major AI tools, including those from OpenAI, Google, Microsoft, and Anthropic.

The risks associated with the Man-in-the-Prompt attack are substantial, particularly for corporate environments.

If employees use AI tools to process confidential information like financial data, source code, or internal reports, an attacker can use modified prompts to read or extract this sensitive data. Furthermore, the attack can be used to manipulate the AI’s behavior, leading to altered or malicious responses. Crucially, this attack bypasses traditional security measures like firewalls and data loss prevention systems because the prompt modification occurs on the user’s browser, before the request even reaches the server.

Given that an estimated 99% of business users have at least one browser extension installed, the potential for widespread risk exposure is extremely high. The threat highlights a critical weakness in the current security landscape of AI tool usage, where the focus has been on securing the server-side rather than the client-side interaction. As AI tools become more integrated into daily business operations, addressing this vulnerability becomes paramount to preventing data breaches and maintaining the integrity of AI-powered workflows.

Reference:

  • Man in the Prompt The Invisible Attack Threatening ChatGPT and Other AI Systems
Tags: August 2025Cyber AlertsCyber Alerts 2025CyberattackCybersecurity
ADVERTISEMENT

Related Posts

SAP Patches Critical NetWeaver Flaw

EggStreme Malware Hits Philippine Military

September 11, 2025
SAP Patches Critical NetWeaver Flaw

RatOn Malware Hits Android Banking

September 11, 2025
SAP Patches Critical NetWeaver Flaw

SAP Patches Critical NetWeaver Flaw

September 11, 2025
Unreported Domains Expose Salt Typhoon

Unreported Domains Expose Salt Typhoon

September 10, 2025
Microsoft Warns of AD DS Flaw

Microsoft Warns of AD DS Flaw

September 10, 2025
Microsoft Warns of AD DS Flaw

Hackers Exploit Adobe Commerce Bug

September 10, 2025

Latest Alerts

RatOn Malware Hits Android Banking

EggStreme Malware Hits Philippine Military

SAP Patches Critical NetWeaver Flaw

Unreported Domains Expose Salt Typhoon

Hackers Exploit Adobe Commerce Bug

Microsoft Warns of AD DS Flaw

Subscribe to our newsletter

    Latest Incidents

    DDoS Defender Hit by Massive Attack

    Vienna VA Reports Data Breach Leak

    GitHub Hack Triggers Salesloft Breach

    Nexar Dashcam Database Breached

    Wealthsimple Platform Data Breach

    Cornwell Tools Data Breach Hits 104k

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial