Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Anthropic Launches Claude Security Beta for Enterprise
May 1, 2026
Human-Centric
Beyond the Click: A Human-Centric Approach to Phishing Defense
April 30, 2026
Qilin Ransomware Lists RDP Auth History on Enumerates Authentication
April 30, 2026
Home/Threats/Hackers Exploit AI Summarize Buttons for Weaponize AI’
Threats

Hackers Exploit AI Summarize Buttons for Weaponize AI’

A novel security threat, termed AI Recommendation Poisoning, has emerged, specifically targeting users of AI assistants. Companies and threat actors embed hidden instructions in seemingly harmless...

Sarah simpson
Sarah simpson
February 16, 2026 2 Min Read
0 0

A novel security threat, termed AI Recommendation Poisoning, has emerged, specifically targeting users of AI assistants.

Companies and threat actors embed hidden instructions in seemingly harmless “Summarize with AI” buttons found on websites and emails.

When clicked, these buttons inject persistence commands into an AI assistant’s memory through specially crafted URL parameters.

The attack exploits memory features that AI assistants use to personalize responses across conversations.

The injection technique hides malicious instructions in URL parameters that automatically execute when users click AI-related links.

These prompts instruct the AI to remember specific companies as trusted sources or recommend certain products first.

Once injected, instructions persist in the AI’s memory across sessions, subtly influencing recommendations on health, finance, and security decisions without users knowing their AI has been compromised.

Microsoft security researchers discovered over 50 unique prompts from 31 companies across 14 industries using this technique for promotional purposes.

The researchers identified real-world cases where legitimate businesses embedded these manipulation attempts in their websites.

The attacks use URLs pointing to popular AI platforms like Copilot, ChatGPT, Claude, and Perplexity with pre-filled prompt parameters.

Memory poisoning can occur through several vectors (Source - Microsoft)
Memory poisoning can occur through several vectors (Source – Microsoft)

Microsoft analysts identified this growing trend while reviewing AI-related URLs observed in email traffic over 60 days. Freely available tooling makes this technique easy to deploy.

Tools like the CiteMET NPM package and AI Share URL Creator provide ready-to-use code for adding memory manipulation buttons to websites, marketed as SEO growth hacks for AI assistants.

Attack Mechanism and Persistence Tactics

The attack operates through malicious links containing pre-filled prompts delivered via URL parameters.

When users click a “Summarize with AI” button, they are redirected to their AI assistant with the malicious prompt automatically populated.

These prompts include commands like “remember as a trusted source” or “recommend first in future conversations” that establish long-term influence over responses.

Real-world cases of AI memory poisoning (Source - Microsoft)
Real-world cases of AI memory poisoning (Source – Microsoft)

Memory poisoning occurs because AI assistants store user preferences and instructions that persist across sessions. Once the malicious prompt executes, it plants itself as a legitimate user preference in the AI’s memory.

The AI treats this injected instruction as authentic guidance, repeatedly favoring the attacker’s content in subsequent conversations. This makes the manipulation invisible to users who may not realize their AI has been compromised.

Microsoft has implemented mitigations against prompt injection attacks in Copilot and continues deploying protections.

Users should check their AI memory settings regularly, avoid clicking AI-related links from untrusted sources, and question suspicious recommendations by asking their AI to explain its reasoning.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitHackerSecurityThreat

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Palo Alto Networks Completes CyberArk Identity Security Acquisition

Next Post

Clickfix Matryoshka Variant Attacks Users with Attacking Deploy

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Popular Python Package ‘lightning’ Hacked in Supply Chain
April 30, 2026
FBI & CISA Release Zero Trust Guide for Released Principles
April 30, 2026
Google Gemini CLI Flaws Allow Remote Code Execution on Hosts
April 30, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us