Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Fears of $27M Venus Protocol hack turn out to be phishing attack on power user

    April 3, 2026

    AccuQuant launches automated trading of Ethereum contracts, enabling users to earn $7k a day through swing trading

    April 3, 2026

    From Smart Contracts to Courts with not so Smart Judges

    April 3, 2026
    Facebook X (Twitter) Instagram
    Ai Crypto TimesAi Crypto Times
    • Altcoins
      • Bitcoin
      • Coinbase
      • Litecoin
    • Blockchain
    • Crypto
    • Ethereum
    • Lithosphere News Releases
    X (Twitter) Instagram YouTube LinkedIn
    Ai Crypto TimesAi Crypto Times
    Home » DeepMind flags six web based attacks that can hijack AI agents

    DeepMind flags six web based attacks that can hijack AI agents

    Isabella TaylorBy Isabella TaylorApril 3, 2026No Comments3 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email



    Researchers at Google DeepMind have warned that the open internet can be used to manipulate autonomous AI agents and hijack their actions.

    Summary

    • DeepMind researchers have identified six attack methods that can be used to manipulate autonomous AI agents as they browse and act online.
    • The study warned that hidden instructions, persuasive language, and poisoned data sources can influence agent decisions or override safeguards.

    The study titled “AI Agent Traps” comes as companies deploy AI agents for real-world tasks and attackers begin using AI for cyber operations.

    Instead of focusing on how models are built, the research looks at the environments agents operate in. It identifies six types of traps that take advantage of how AI systems read and act on information from the web.

    The six attack categories outlined in the paper include content injection traps, semantic manipulation traps, cognitive state traps, behavioural control traps, systemic traps, and human in the loop traps.

    Content injection stands out as one of the most direct risks. Hidden instructions can be placed inside HTML comments, metadata, or cloaked page elements, allowing agents to read commands that remain invisible to human users. Tests showed these techniques can take control of agent behaviour with high success rates.

    Semantic manipulation works differently, relying on language and framing rather than hidden code. Pages loaded with authoritative phrasing or disguised as research scenarios can influence how agents interpret tasks, sometimes slipping harmful instructions past built-in safeguards.

    Another layer targets memory systems. By planting fabricated information into sources that agents rely on for retrieval, attackers can influence outputs over time, with the agent treating false data as verified knowledge.

    Behavioural control attacks take a more direct route by targeting what an agent actually does. In these cases, jailbreak instructions can be embedded into normal web content and read by the system during routine browsing. Separate tests showed that agents with broad access permissions could be pushed into locating and transmitting sensitive data, including passwords and local files, to external destinations.

    System-level risks extend beyond individual agents, with the paper warning that coordinated manipulation across many automated systems could trigger cascading effects, similar to past market flash crashes driven by algorithmic trading loops.

    Human reviewers are also part of the attack surface, as carefully crafted outputs can appear credible enough to gain approval, allowing harmful actions to pass through oversight without raising suspicion.

    How to defend against these risks?

    To counter these risks, researchers suggest a mix of adversarial training, input filtering, behavioural monitoring, and reputation systems for web content. They also point to the need for clearer legal frameworks around liability when AI agents execute harmful actions.

    The paper stops short of offering a complete fix and argues that the industry still lacks a shared understanding of the problem, leaving current defenses scattered and often focused on the wrong areas.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Isabella Taylor

    Related Posts

    AccuQuant launches automated trading of Ethereum contracts, enabling users to earn $7k a day through swing trading

    April 3, 2026

    CFTC and DOJ sue three states over prediction market oversight

    April 3, 2026

    The ultimate passive income showdown of 2026

    April 3, 2026

    Comments are closed.

    Don't Miss

    Fears of $27M Venus Protocol hack turn out to be phishing attack on power user

    Coinbase April 3, 2026

    The Venus Protocol user signed a malicious delegation transaction, granting the attacker’s contract control over…

    AccuQuant launches automated trading of Ethereum contracts, enabling users to earn $7k a day through swing trading

    April 3, 2026

    From Smart Contracts to Courts with not so Smart Judges

    April 3, 2026

    Starknet stutters, turns off and on again twice in one day

    April 3, 2026
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Our Picks

    Lithosphere Advances AI-Native Blockchain Infrastructure with Makalu Testnet and Integrated Protocol Stack

    April 3, 2026

    These are the best holiday villas in Greece for 2026

    April 2, 2026

    Lithosphere Activates Makalu Testnet to Power AI-Native Blockchain Infrastructure

    April 2, 2026

    The Decentralized Naming System Powering Web4 Infrastructure

    March 31, 2026

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    Demo
    • Popular
    • Recent
    • Top Reviews

    Litecoin Poised For Action: Falling Wedge Breakout Could Rewrite The Trend – Here’s How

    February 2, 2026

    China executes 11 ringleaders of pig butchering scam compound

    February 2, 2026

    Palantir stock forms alarming pattern: Post-earnings dive?

    February 2, 2026

    Fears of $27M Venus Protocol hack turn out to be phishing attack on power user

    April 3, 2026

    AccuQuant launches automated trading of Ethereum contracts, enabling users to earn $7k a day through swing trading

    April 3, 2026

    From Smart Contracts to Courts with not so Smart Judges

    April 3, 2026
    Latest Galleries
    [latest_gallery cat="all" number="5" type="slider"]
    Latest Reviews
    Demo
    Top Posts

    KaJ Labs Unveils Lithic Developer Stack for AI Applications, Games, and Enterprise Systems

    March 14, 20262 Views

    Lithic Introduces zk-Verifiable AI Execution Standard (LEP100-5)

    March 17, 20261 Views

    KaJ Labs Unveils Ecosystem Alignment Strategy to Strengthen AI and Web3 Integration

    March 14, 20261 Views

    Lithosphere Advances AI-Native Blockchain Infrastructure with Makalu Testnet and Integrated Protocol Stack

    April 3, 20260 Views
    Don't Miss

    Fears of $27M Venus Protocol hack turn out to be phishing attack on power user

    Coinbase April 3, 2026

    The Venus Protocol user signed a malicious delegation transaction, granting the attacker’s contract control over…

    AccuQuant launches automated trading of Ethereum contracts, enabling users to earn $7k a day through swing trading

    April 3, 2026

    From Smart Contracts to Courts with not so Smart Judges

    April 3, 2026

    Starknet stutters, turns off and on again twice in one day

    April 3, 2026
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    Demo
    Top Posts

    Protocol Update 002 – Scale Blobs

    March 16, 20262 Views

    Centrifuge price explodes as CFG trading goes live on Upbit

    March 15, 20262 Views

    KaJ Labs Unveils Lithic Developer Stack for AI Applications, Games, and Enterprise Systems

    March 14, 20262 Views

    World assets sells $65M WLD as token hits fresh pressure

    March 29, 20261 Views
    Don't Miss

    Fears of $27M Venus Protocol hack turn out to be phishing attack on power user

    Coinbase April 3, 2026

    The Venus Protocol user signed a malicious delegation transaction, granting the attacker’s contract control over…

    AccuQuant launches automated trading of Ethereum contracts, enabling users to earn $7k a day through swing trading

    April 3, 2026

    From Smart Contracts to Courts with not so Smart Judges

    April 3, 2026

    Starknet stutters, turns off and on again twice in one day

    April 3, 2026
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    X (Twitter) Instagram YouTube LinkedIn
    Our Picks

    Fears of $27M Venus Protocol hack turn out to be phishing attack on power user

    April 3, 2026

    AccuQuant launches automated trading of Ethereum contracts, enabling users to earn $7k a day through swing trading

    April 3, 2026

    From Smart Contracts to Courts with not so Smart Judges

    April 3, 2026
    Recent Posts
    • Fears of $27M Venus Protocol hack turn out to be phishing attack on power user
    • AccuQuant launches automated trading of Ethereum contracts, enabling users to earn $7k a day through swing trading
    • From Smart Contracts to Courts with not so Smart Judges
    • Starknet stutters, turns off and on again twice in one day
    • CFTC and DOJ sue three states over prediction market oversight
    © 2026 - 2026

    Type above and press Enter to search. Press Esc to cancel.