Close Menu
    Facebook X (Twitter) Instagram
    • Privacy Policy
    • Terms Of Service
    • Social Media Disclaimer
    • DMCA Compliance
    • Anti-Spam Policy
    Facebook X (Twitter) Instagram
    Bytecore News
    • Home
    • Crypto News
      • Bitcoin
      • Ethereum
      • Altcoins
      • Blockchain
      • DeFi
    • AI News
    • Stock News
    • Learn
      • AI for Beginners
      • AI Tips
      • Make Money with AI
    • Reviews
    • Tools
      • Best AI Tools
      • Crypto Market Cap List
      • Stock Market Overview
      • Market Heatmap
    • Contact
    Bytecore News
    Home»Uncategorized»DeepMind flags six web based attacks that can hijack AI agents
    Uncategorized

    DeepMind flags six web based attacks that can hijack AI agents

    April 3, 20263 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email
    kraken



    Researchers at Google DeepMind have warned that the open internet can be used to manipulate autonomous AI agents and hijack their actions.

    Summary

    • DeepMind researchers have identified six attack methods that can be used to manipulate autonomous AI agents as they browse and act online.
    • The study warned that hidden instructions, persuasive language, and poisoned data sources can influence agent decisions or override safeguards.

    The study titled “AI Agent Traps” comes as companies deploy AI agents for real-world tasks and attackers begin using AI for cyber operations.

    livechat

    Instead of focusing on how models are built, the research looks at the environments agents operate in. It identifies six types of traps that take advantage of how AI systems read and act on information from the web.

    The six attack categories outlined in the paper include content injection traps, semantic manipulation traps, cognitive state traps, behavioural control traps, systemic traps, and human in the loop traps.

    Content injection stands out as one of the most direct risks. Hidden instructions can be placed inside HTML comments, metadata, or cloaked page elements, allowing agents to read commands that remain invisible to human users. Tests showed these techniques can take control of agent behaviour with high success rates.

    Semantic manipulation works differently, relying on language and framing rather than hidden code. Pages loaded with authoritative phrasing or disguised as research scenarios can influence how agents interpret tasks, sometimes slipping harmful instructions past built-in safeguards.

    Another layer targets memory systems. By planting fabricated information into sources that agents rely on for retrieval, attackers can influence outputs over time, with the agent treating false data as verified knowledge.

    Behavioural control attacks take a more direct route by targeting what an agent actually does. In these cases, jailbreak instructions can be embedded into normal web content and read by the system during routine browsing. Separate tests showed that agents with broad access permissions could be pushed into locating and transmitting sensitive data, including passwords and local files, to external destinations.

    System-level risks extend beyond individual agents, with the paper warning that coordinated manipulation across many automated systems could trigger cascading effects, similar to past market flash crashes driven by algorithmic trading loops.

    Human reviewers are also part of the attack surface, as carefully crafted outputs can appear credible enough to gain approval, allowing harmful actions to pass through oversight without raising suspicion.

    How to defend against these risks?

    To counter these risks, researchers suggest a mix of adversarial training, input filtering, behavioural monitoring, and reputation systems for web content. They also point to the need for clearer legal frameworks around liability when AI agents execute harmful actions.

    The paper stops short of offering a complete fix and argues that the industry still lacks a shared understanding of the problem, leaving current defenses scattered and often focused on the wrong areas.



    Source link

    coinbase
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    CryptoExpert
    • Website

    Related Posts

    Calm Before the BTC Storm as Trump Says a Deal or Obliteration Is Next for Iran?

    April 5, 2026

    Ethereum Net Taker Volume Rises To Most Positive Level Since 2023 – Bullish Reversal Soon?

    April 5, 2026

    Bitcoin Flashes Cycle Signal That Has Called Every Bear Market Bottom

    April 5, 2026

    Kiyosaki Says 1974 Shift Drives Debt Crisis, Backs Bitcoin and gold

    April 5, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    frase
    Latest Posts

    Michael Saylor says Bitcoin four-year cycle is dead

    April 5, 2026

    Will XRP Explode After the War? ChatGPT Weighs In on Ceasefire Impact

    April 5, 2026

    Bitcoin Reaches Highest Level Of Bearish Chatter In 5 Weeks

    April 5, 2026

    Crypto Token Glut Is Diluting Value And Breaking Investor Returns

    April 5, 2026

    Bitcoin On-Chain Data Hints At Macro Bottom Near $47,960

    April 5, 2026
    coinbase
    LEGAL INFORMATION
    • Privacy Policy
    • Terms Of Service
    • Social Media Disclaimer
    • DMCA Compliance
    • Anti-Spam Policy
    Top Insights

    Calm Before the BTC Storm as Trump Says a Deal or Obliteration Is Next for Iran?

    April 5, 2026

    18 Claude Code Token Hacks in 18 Minutes

    April 5, 2026
    synthesia
    Facebook X (Twitter) Instagram Pinterest
    © 2026 BytecoreNews.com - All rights reserved.

    Type above and press Enter to search. Press Esc to cancel.