Close Menu
Chain Tech Daily

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    SlowMist audit finds no private key leakage in OKX Wallet

    April 3, 2026

    Crypto has become Kim Jong-Un’s lifeline — and Russia’s secret weapon

    April 3, 2026

    ESP: Beyond Grants | Ethereum Foundation Blog

    April 3, 2026
    Facebook X (Twitter) Instagram
    Chain Tech Daily
    • Altcoins
      • Litecoin
      • Coinbase
      • Crypto
      • Blockchain
    • Bitcoin
    • Ethereum
    • Lithosphere News Releases
    Facebook X (Twitter) Instagram YouTube
    Chain Tech Daily
    Home » DeepMind flags six web based attacks that can hijack AI agents
    Crypto

    DeepMind flags six web based attacks that can hijack AI agents

    James WilsonBy James WilsonApril 3, 20263 Mins Read
    Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email



    Researchers at Google DeepMind have warned that the open internet can be used to manipulate autonomous AI agents and hijack their actions.

    Summary

    • DeepMind researchers have identified six attack methods that can be used to manipulate autonomous AI agents as they browse and act online.
    • The study warned that hidden instructions, persuasive language, and poisoned data sources can influence agent decisions or override safeguards.

    The study titled “AI Agent Traps” comes as companies deploy AI agents for real-world tasks and attackers begin using AI for cyber operations.

    Instead of focusing on how models are built, the research looks at the environments agents operate in. It identifies six types of traps that take advantage of how AI systems read and act on information from the web.

    The six attack categories outlined in the paper include content injection traps, semantic manipulation traps, cognitive state traps, behavioural control traps, systemic traps, and human in the loop traps.

    Content injection stands out as one of the most direct risks. Hidden instructions can be placed inside HTML comments, metadata, or cloaked page elements, allowing agents to read commands that remain invisible to human users. Tests showed these techniques can take control of agent behaviour with high success rates.

    Semantic manipulation works differently, relying on language and framing rather than hidden code. Pages loaded with authoritative phrasing or disguised as research scenarios can influence how agents interpret tasks, sometimes slipping harmful instructions past built-in safeguards.

    Another layer targets memory systems. By planting fabricated information into sources that agents rely on for retrieval, attackers can influence outputs over time, with the agent treating false data as verified knowledge.

    Behavioural control attacks take a more direct route by targeting what an agent actually does. In these cases, jailbreak instructions can be embedded into normal web content and read by the system during routine browsing. Separate tests showed that agents with broad access permissions could be pushed into locating and transmitting sensitive data, including passwords and local files, to external destinations.

    System-level risks extend beyond individual agents, with the paper warning that coordinated manipulation across many automated systems could trigger cascading effects, similar to past market flash crashes driven by algorithmic trading loops.

    Human reviewers are also part of the attack surface, as carefully crafted outputs can appear credible enough to gain approval, allowing harmful actions to pass through oversight without raising suspicion.

    How to defend against these risks?

    To counter these risks, researchers suggest a mix of adversarial training, input filtering, behavioural monitoring, and reputation systems for web content. They also point to the need for clearer legal frameworks around liability when AI agents execute harmful actions.

    The paper stops short of offering a complete fix and argues that the industry still lacks a shared understanding of the problem, leaving current defenses scattered and often focused on the wrong areas.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Tumblr Email
    James Wilson

    Related Posts

    Crypto April 3, 2026

    SlowMist audit finds no private key leakage in OKX Wallet

    Crypto April 3, 2026

    AccuQuant launches automated trading of Ethereum contracts, enabling users to earn $7k a day through swing trading

    Crypto April 3, 2026

    CFTC and DOJ sue three states over prediction market oversight

    Crypto April 3, 2026

    Trump warns of more strikes after Iran bridge attack, Bitcoin retreats

    Crypto April 3, 2026

    OpenAI buys tech talk show TBPN as it builds out communication strategy

    Crypto April 3, 2026

    x402 joins Linux Foundation with backing from Google, Stripe, AWS

    Leave A Reply Cancel Reply

    Don't Miss
    Crypto April 3, 2026

    SlowMist audit finds no private key leakage in OKX Wallet

    SlowMist finds no key leaks in OKX Web3 wallet, but BOM-style malware and compromised devices…

    Crypto has become Kim Jong-Un’s lifeline — and Russia’s secret weapon

    April 3, 2026

    ESP: Beyond Grants | Ethereum Foundation Blog

    April 3, 2026

    AccuQuant launches automated trading of Ethereum contracts, enabling users to earn $7k a day through swing trading

    April 3, 2026
    Stay In Touch
    • Facebook
    • Twitter
    • YouTube
    • LinkedIn
    Our Picks

    SlowMist audit finds no private key leakage in OKX Wallet

    April 3, 2026

    Crypto has become Kim Jong-Un’s lifeline — and Russia’s secret weapon

    April 3, 2026

    ESP: Beyond Grants | Ethereum Foundation Blog

    April 3, 2026

    AccuQuant launches automated trading of Ethereum contracts, enabling users to earn $7k a day through swing trading

    April 3, 2026

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    Don't Miss
    Crypto April 3, 2026

    SlowMist audit finds no private key leakage in OKX Wallet

    SlowMist finds no key leaks in OKX Web3 wallet, but BOM-style malware and compromised devices…

    Crypto has become Kim Jong-Un’s lifeline — and Russia’s secret weapon

    April 3, 2026

    ESP: Beyond Grants | Ethereum Foundation Blog

    April 3, 2026

    AccuQuant launches automated trading of Ethereum contracts, enabling users to earn $7k a day through swing trading

    April 3, 2026

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    About Us
    About Us

    ChainTechDaily.xyz delivers the latest updates and trends in the world of cryptocurrency. Stay informed with daily news, insights, and analysis tailored for crypto enthusiasts.

    Our Picks
    Lithosphere News Releases

    Lithosphere Advances AI-Native Blockchain Infrastructure with Makalu Testnet and Integrated Protocol Stack

    April 3, 2026

    Lithosphere Activates Makalu Testnet to Power AI-Native Blockchain Infrastructure

    April 2, 2026

    The Decentralized Naming System Powering Web4 Infrastructure

    March 31, 2026

    Lithosphere’s MultX and LEP100 Introduce a New Standard for Blockchain Evolution

    March 30, 2026
    X (Twitter) Instagram YouTube LinkedIn
    © 2026 Copyright

    Type above and press Enter to search. Press Esc to cancel.