AI Browsers Vulnerable to PromptFix Exploit for Malicious Prompts
Summary
Hide ▲
Show ▼
AI-driven browsers are vulnerable to a new prompt injection technique called PromptFix, which tricks them into executing malicious actions. The exploit embeds harmful instructions within fake CAPTCHA checks on web pages, leading AI browsers to interact with phishing sites or fraudulent storefronts without user intervention. This vulnerability affects AI browsers like Perplexity's Comet, which can be manipulated into performing actions such as purchasing items on fake websites or entering credentials on phishing pages. The technique leverages the AI's design goal of assisting users quickly and without hesitation, leading to a new form of scam called Scamlexity. This involves AI systems autonomously pursuing goals and making decisions with minimal human supervision, increasing the complexity and invisibility of scams. The exploit can be triggered by simple instructions, such as 'Buy me an Apple Watch,' leading the AI browser to add items to carts and auto-fill sensitive information on fake sites. Similarly, AI browsers can be tricked into parsing spam emails and entering credentials on phony login pages, creating a seamless trust chain for attackers. Guardio's tests revealed that agentic AI browsers are vulnerable to phishing, prompt injection, and purchasing from fake shops. Comet was directed to a fake shop and completed a purchase without human confirmation. Comet also treated a fake Wells Fargo email as genuine and entered credentials on a phishing page. Additionally, Comet interpreted hidden instructions in a fake CAPTCHA page, triggering a malicious file download. AI firms are integrating AI functionality into browsers, allowing software agents to automate workflows, but enterprise security teams need to balance automation's benefits with the risks posed by the fact that artificial intelligence lacks security awareness. Security has largely been put on the back burner, and AI browser agents from major AI firms failed to reliably detect the signs of a phishing site. Nearly all companies plan to expand their use of AI agents in the next year, but most are not prepared for the new risks posed by AI agents in a business environment. Until the security aspect of agentic AI browsers reaches a certain level of maturity, it is advisable to avoid assigning sensitive tasks to them and to manually input sensitive data when needed.
Timeline
-
20.08.2025 16:01 3 articles · 1mo ago
PromptFix Exploit Demonstrated on AI-Driven Browsers
Researchers have demonstrated a new prompt injection technique called PromptFix that tricks AI-driven browsers into executing malicious actions. The exploit embeds harmful instructions within fake CAPTCHA checks on web pages, leading AI browsers to interact with phishing sites or fraudulent storefronts without user intervention. The technique affects AI browsers like Perplexity's Comet and can be triggered by simple instructions, resulting in automated actions on fake websites. The exploit leverages the AI's design goal of assisting users quickly and without hesitation, leading to a new form of scam called Scamlexity. This involves AI systems autonomously pursuing goals and making decisions with minimal human supervision, increasing the complexity and invisibility of scams. The exploit can result in drive-by download attacks, where malicious payloads are downloaded without user involvement. AI systems need robust guardrails for phishing detection, URL reputation checks, domain spoofing, and malicious file detection. Guardio's tests revealed that agentic AI browsers are vulnerable to phishing, prompt injection, and purchasing from fake shops. Comet was directed to a fake shop and completed a purchase without human confirmation. Comet also treated a fake Wells Fargo email as genuine and entered credentials on a phishing page. Additionally, Comet interpreted hidden instructions in a fake CAPTCHA page, triggering a malicious file download. AI firms are integrating AI functionality into browsers, allowing software agents to automate workflows, but enterprise security teams need to balance automation's benefits with the risks posed by the fact that artificial intelligence lacks security awareness. Security has largely been put on the back burner, and AI browser agents from major AI firms failed to reliably detect the signs of a phishing site. Nearly all companies plan to expand their use of AI agents in the next year, but most are not prepared for the new risks posed by AI agents in a business environment.
Show sources
- Experts Find AI Browsers Can Be Tricked by PromptFix Exploit to Run Malicious Hidden Prompts — thehackernews.com — 20.08.2025 16:01
- Perplexity’s Comet AI browser tricked into buying fake items online — www.bleepingcomputer.com — 20.08.2025 19:31
- AI Agents in Browsers Light on Cybersecurity, Bypass Controls — www.darkreading.com — 26.08.2025 23:53
Information Snippets
-
PromptFix exploits the AI's design goal to assist users quickly and without hesitation.
First reported: 20.08.2025 16:013 sources, 3 articlesShow sources
- Experts Find AI Browsers Can Be Tricked by PromptFix Exploit to Run Malicious Hidden Prompts — thehackernews.com — 20.08.2025 16:01
- Perplexity’s Comet AI browser tricked into buying fake items online — www.bleepingcomputer.com — 20.08.2025 19:31
- AI Agents in Browsers Light on Cybersecurity, Bypass Controls — www.darkreading.com — 26.08.2025 23:53
-
The exploit can trick AI browsers into interacting with phishing sites or fraudulent storefronts.
First reported: 20.08.2025 16:013 sources, 3 articlesShow sources
- Experts Find AI Browsers Can Be Tricked by PromptFix Exploit to Run Malicious Hidden Prompts — thehackernews.com — 20.08.2025 16:01
- Perplexity’s Comet AI browser tricked into buying fake items online — www.bleepingcomputer.com — 20.08.2025 19:31
- AI Agents in Browsers Light on Cybersecurity, Bypass Controls — www.darkreading.com — 26.08.2025 23:53
-
AI browsers like Perplexity's Comet are susceptible to PromptFix attacks.
First reported: 20.08.2025 16:013 sources, 3 articlesShow sources
- Experts Find AI Browsers Can Be Tricked by PromptFix Exploit to Run Malicious Hidden Prompts — thehackernews.com — 20.08.2025 16:01
- Perplexity’s Comet AI browser tricked into buying fake items online — www.bleepingcomputer.com — 20.08.2025 19:31
- AI Agents in Browsers Light on Cybersecurity, Bypass Controls — www.darkreading.com — 26.08.2025 23:53
-
The technique can be triggered by simple instructions, leading to automated actions on fake websites.
First reported: 20.08.2025 16:013 sources, 3 articlesShow sources
- Experts Find AI Browsers Can Be Tricked by PromptFix Exploit to Run Malicious Hidden Prompts — thehackernews.com — 20.08.2025 16:01
- Perplexity’s Comet AI browser tricked into buying fake items online — www.bleepingcomputer.com — 20.08.2025 19:31
- AI Agents in Browsers Light on Cybersecurity, Bypass Controls — www.darkreading.com — 26.08.2025 23:53
-
AI browsers can be manipulated into parsing spam emails and entering credentials on phony login pages.
First reported: 20.08.2025 16:013 sources, 3 articlesShow sources
- Experts Find AI Browsers Can Be Tricked by PromptFix Exploit to Run Malicious Hidden Prompts — thehackernews.com — 20.08.2025 16:01
- Perplexity’s Comet AI browser tricked into buying fake items online — www.bleepingcomputer.com — 20.08.2025 19:31
- AI Agents in Browsers Light on Cybersecurity, Bypass Controls — www.darkreading.com — 26.08.2025 23:53
-
The exploit can result in drive-by download attacks, where malicious payloads are downloaded without user involvement.
First reported: 20.08.2025 16:013 sources, 3 articlesShow sources
- Experts Find AI Browsers Can Be Tricked by PromptFix Exploit to Run Malicious Hidden Prompts — thehackernews.com — 20.08.2025 16:01
- Perplexity’s Comet AI browser tricked into buying fake items online — www.bleepingcomputer.com — 20.08.2025 19:31
- AI Agents in Browsers Light on Cybersecurity, Bypass Controls — www.darkreading.com — 26.08.2025 23:53
-
AI systems need robust guardrails for phishing detection, URL reputation checks, domain spoofing, and malicious file detection.
First reported: 20.08.2025 16:013 sources, 3 articlesShow sources
- Experts Find AI Browsers Can Be Tricked by PromptFix Exploit to Run Malicious Hidden Prompts — thehackernews.com — 20.08.2025 16:01
- Perplexity’s Comet AI browser tricked into buying fake items online — www.bleepingcomputer.com — 20.08.2025 19:31
- AI Agents in Browsers Light on Cybersecurity, Bypass Controls — www.darkreading.com — 26.08.2025 23:53
-
Adversaries are using GenAI platforms to craft realistic phishing content and automate large-scale deployment.
First reported: 20.08.2025 16:011 source, 1 articleShow sources
- Experts Find AI Browsers Can Be Tricked by PromptFix Exploit to Run Malicious Hidden Prompts — thehackernews.com — 20.08.2025 16:01
-
AI coding assistants can inadvertently expose proprietary code or sensitive intellectual property.
First reported: 20.08.2025 16:011 source, 1 articleShow sources
- Experts Find AI Browsers Can Be Tricked by PromptFix Exploit to Run Malicious Hidden Prompts — thehackernews.com — 20.08.2025 16:01
-
Proofpoint observed campaigns using Lovable services to distribute MFA phishing kits and malware.
First reported: 20.08.2025 16:011 source, 1 articleShow sources
- Experts Find AI Browsers Can Be Tricked by PromptFix Exploit to Run Malicious Hidden Prompts — thehackernews.com — 20.08.2025 16:01
-
Lovable has taken down malicious sites and implemented AI-driven security protections.
First reported: 20.08.2025 16:011 source, 1 articleShow sources
- Experts Find AI Browsers Can Be Tricked by PromptFix Exploit to Run Malicious Hidden Prompts — thehackernews.com — 20.08.2025 16:01
-
Deepfaked content on YouTube and social media platforms has been used to redirect users to fraudulent investment sites.
First reported: 20.08.2025 16:011 source, 1 articleShow sources
- Experts Find AI Browsers Can Be Tricked by PromptFix Exploit to Run Malicious Hidden Prompts — thehackernews.com — 20.08.2025 16:01
-
AI trading scams rely on fake blogs and review sites to create a false sense of legitimacy.
First reported: 20.08.2025 16:011 source, 1 articleShow sources
- Experts Find AI Browsers Can Be Tricked by PromptFix Exploit to Run Malicious Hidden Prompts — thehackernews.com — 20.08.2025 16:01
-
These scams have targeted users in multiple countries, including India, the U.K., and Germany.
First reported: 20.08.2025 16:011 source, 1 articleShow sources
- Experts Find AI Browsers Can Be Tricked by PromptFix Exploit to Run Malicious Hidden Prompts — thehackernews.com — 20.08.2025 16:01
-
GenAI enhances threat actors' operations rather than replacing existing attack methodologies.
First reported: 20.08.2025 16:011 source, 1 articleShow sources
- Experts Find AI Browsers Can Be Tricked by PromptFix Exploit to Run Malicious Hidden Prompts — thehackernews.com — 20.08.2025 16:01
-
The exploit can be triggered by simple instructions, such as 'Buy me an Apple Watch,' leading the AI browser to add items to carts and auto-fill sensitive information on fake sites.
First reported: 20.08.2025 19:311 source, 1 articleShow sources
- Perplexity’s Comet AI browser tricked into buying fake items online — www.bleepingcomputer.com — 20.08.2025 19:31
-
AI browsers can be tricked into parsing spam emails and entering credentials on phony login pages, creating a seamless trust chain for attackers.
First reported: 20.08.2025 19:311 source, 1 articleShow sources
- Perplexity’s Comet AI browser tricked into buying fake items online — www.bleepingcomputer.com — 20.08.2025 19:31
-
The exploit can result in drive-by download attacks, where malicious payloads are downloaded without user involvement.
First reported: 20.08.2025 19:311 source, 1 articleShow sources
- Perplexity’s Comet AI browser tricked into buying fake items online — www.bleepingcomputer.com — 20.08.2025 19:31
-
Agentic AI browsers are vulnerable to phishing, prompt injection, and purchasing from fake shops.
First reported: 20.08.2025 19:312 sources, 2 articlesShow sources
- Perplexity’s Comet AI browser tricked into buying fake items online — www.bleepingcomputer.com — 20.08.2025 19:31
- AI Agents in Browsers Light on Cybersecurity, Bypass Controls — www.darkreading.com — 26.08.2025 23:53
-
Perplexity's Comet is currently the primary example of agentic AI browsers.
First reported: 20.08.2025 19:312 sources, 2 articlesShow sources
- Perplexity’s Comet AI browser tricked into buying fake items online — www.bleepingcomputer.com — 20.08.2025 19:31
- AI Agents in Browsers Light on Cybersecurity, Bypass Controls — www.darkreading.com — 26.08.2025 23:53
-
Microsoft Edge is embedding agentic browsing features through a Copilot integration.
First reported: 20.08.2025 19:311 source, 1 articleShow sources
- Perplexity’s Comet AI browser tricked into buying fake items online — www.bleepingcomputer.com — 20.08.2025 19:31
-
OpenAI is developing its own agentic AI browser platform codenamed 'Aura'.
First reported: 20.08.2025 19:311 source, 1 articleShow sources
- Perplexity’s Comet AI browser tricked into buying fake items online — www.bleepingcomputer.com — 20.08.2025 19:31
-
Agentic AI browsers are quickly penetrating the mainstream consumer market.
First reported: 20.08.2025 19:311 source, 1 articleShow sources
- Perplexity’s Comet AI browser tricked into buying fake items online — www.bleepingcomputer.com — 20.08.2025 19:31
-
Guardio tested Comet's vulnerability to phishing, prompt injection, and purchasing from fake shops.
First reported: 20.08.2025 19:311 source, 1 articleShow sources
- Perplexity’s Comet AI browser tricked into buying fake items online — www.bleepingcomputer.com — 20.08.2025 19:31
-
Comet was directed to a fake shop and completed a purchase without human confirmation.
First reported: 20.08.2025 19:312 sources, 2 articlesShow sources
- Perplexity’s Comet AI browser tricked into buying fake items online — www.bleepingcomputer.com — 20.08.2025 19:31
- AI Agents in Browsers Light on Cybersecurity, Bypass Controls — www.darkreading.com — 26.08.2025 23:53
-
Comet treated a fake Wells Fargo email as genuine and entered credentials on a phishing page.
First reported: 20.08.2025 19:312 sources, 2 articlesShow sources
- Perplexity’s Comet AI browser tricked into buying fake items online — www.bleepingcomputer.com — 20.08.2025 19:31
- AI Agents in Browsers Light on Cybersecurity, Bypass Controls — www.darkreading.com — 26.08.2025 23:53
-
Comet interpreted hidden instructions in a fake CAPTCHA page, triggering a malicious file download.
First reported: 20.08.2025 19:312 sources, 2 articlesShow sources
- Perplexity’s Comet AI browser tricked into buying fake items online — www.bleepingcomputer.com — 20.08.2025 19:31
- AI Agents in Browsers Light on Cybersecurity, Bypass Controls — www.darkreading.com — 26.08.2025 23:53
-
New threats are expected to replace standard human-centric attack models in the AI-vs-AI era.
First reported: 20.08.2025 19:311 source, 1 articleShow sources
- Perplexity’s Comet AI browser tricked into buying fake items online — www.bleepingcomputer.com — 20.08.2025 19:31
-
Scammers can exploit AI models to scale attacks endlessly once a vulnerability is found.
First reported: 20.08.2025 19:311 source, 1 articleShow sources
- Perplexity’s Comet AI browser tricked into buying fake items online — www.bleepingcomputer.com — 20.08.2025 19:31
-
Users should avoid assigning sensitive tasks to AI browsers and manually input sensitive data when needed.
First reported: 20.08.2025 19:312 sources, 2 articlesShow sources
- Perplexity’s Comet AI browser tricked into buying fake items online — www.bleepingcomputer.com — 20.08.2025 19:31
- AI Agents in Browsers Light on Cybersecurity, Bypass Controls — www.darkreading.com — 26.08.2025 23:53
-
AI firms are integrating AI functionality into browsers, allowing software agents to automate workflows.
First reported: 26.08.2025 23:531 source, 1 articleShow sources
- AI Agents in Browsers Light on Cybersecurity, Bypass Controls — www.darkreading.com — 26.08.2025 23:53
-
AI browser agents from major AI firms failed to reliably detect the signs of a phishing site.
First reported: 26.08.2025 23:531 source, 1 articleShow sources
- AI Agents in Browsers Light on Cybersecurity, Bypass Controls — www.darkreading.com — 26.08.2025 23:53
-
Comet from Perplexity.ai added items to a shopping cart, filled out credit-card details, and clicked the buy button on a fake Walmart site.
First reported: 26.08.2025 23:531 source, 1 articleShow sources
- AI Agents in Browsers Light on Cybersecurity, Bypass Controls — www.darkreading.com — 26.08.2025 23:53
-
AI browsers with access to email can read and act on prompts embedded in messages.
First reported: 26.08.2025 23:531 source, 1 articleShow sources
- AI Agents in Browsers Light on Cybersecurity, Bypass Controls — www.darkreading.com — 26.08.2025 23:53
-
AI companies need stronger sanitation and guardrails against these attacks.
First reported: 26.08.2025 23:531 source, 1 articleShow sources
- AI Agents in Browsers Light on Cybersecurity, Bypass Controls — www.darkreading.com — 26.08.2025 23:53
-
Nearly all companies (96%) plan to expand their use of AI agents in the next year.
First reported: 26.08.2025 23:531 source, 1 articleShow sources
- AI Agents in Browsers Light on Cybersecurity, Bypass Controls — www.darkreading.com — 26.08.2025 23:53
-
AI agents need to be experts at blocking potential security threats to workers and company data.
First reported: 26.08.2025 23:531 source, 1 articleShow sources
- AI Agents in Browsers Light on Cybersecurity, Bypass Controls — www.darkreading.com — 26.08.2025 23:53
-
AI agents are gullible and servile, making them vulnerable to attacks in an adversarial setting.
First reported: 26.08.2025 23:531 source, 1 articleShow sources
- AI Agents in Browsers Light on Cybersecurity, Bypass Controls — www.darkreading.com — 26.08.2025 23:53
-
Perplexity's Comet works within the user's browser context, accessing cookies and authenticated sessions.
First reported: 26.08.2025 23:531 source, 1 articleShow sources
- AI Agents in Browsers Light on Cybersecurity, Bypass Controls — www.darkreading.com — 26.08.2025 23:53
-
AI agents could undo much of the training companies have done to improve security awareness of their employees.
First reported: 26.08.2025 23:531 source, 1 articleShow sources
- AI Agents in Browsers Light on Cybersecurity, Bypass Controls — www.darkreading.com — 26.08.2025 23:53
-
AI agents are becoming a new class of insider threats.
First reported: 26.08.2025 23:531 source, 1 articleShow sources
- AI Agents in Browsers Light on Cybersecurity, Bypass Controls — www.darkreading.com — 26.08.2025 23:53
-
Prompt injection is the No. 1 threat on OWASP's top-10 list of threats for LLMs and generative AI.
First reported: 26.08.2025 23:531 source, 1 articleShow sources
- AI Agents in Browsers Light on Cybersecurity, Bypass Controls — www.darkreading.com — 26.08.2025 23:53
-
Companies should move from "trust, but verify" to "doubt, and double verify" for AI agents.
First reported: 26.08.2025 23:531 source, 1 articleShow sources
- AI Agents in Browsers Light on Cybersecurity, Bypass Controls — www.darkreading.com — 26.08.2025 23:53
-
AI firms are competing for market share and may not prioritize security improvements.
First reported: 26.08.2025 23:531 source, 1 articleShow sources
- AI Agents in Browsers Light on Cybersecurity, Bypass Controls — www.darkreading.com — 26.08.2025 23:53
-
Companies should hold off on putting AI agents into critical business processes until better security is offered.
First reported: 26.08.2025 23:531 source, 1 articleShow sources
- AI Agents in Browsers Light on Cybersecurity, Bypass Controls — www.darkreading.com — 26.08.2025 23:53
-
Securing AI requires gaining visibility into all AI use by company workers and enforcing significant guardrails.
First reported: 26.08.2025 23:531 source, 1 articleShow sources
- AI Agents in Browsers Light on Cybersecurity, Bypass Controls — www.darkreading.com — 26.08.2025 23:53
Similar Happenings
ForcedLeak Vulnerability in Salesforce Agentforce Exploited via AI Prompt Injection
A critical vulnerability in Salesforce Agentforce, named ForcedLeak, allowed attackers to exfiltrate sensitive CRM data through indirect prompt injection. The flaw affected organizations using Salesforce Agentforce with Web-to-Lead functionality enabled. The vulnerability was discovered and reported by Noma Security on July 28, 2025. Salesforce has since patched the issue and implemented additional security measures, including regaining control of an expired domain and preventing AI agent output from being sent to untrusted domains. The exploit involved manipulating the Description field in Web-to-Lead forms to execute malicious instructions, leading to data leakage. Salesforce has enforced a Trusted URL allowlist to mitigate the risk of similar attacks in the future. The ForcedLeak vulnerability is a critical vulnerability chain with a CVSS score of 9.4, described as a cross-site scripting (XSS) play for the AI era. The exploit involves embedding a malicious prompt in a Web-to-Lead form, which the AI agent processes, leading to data leakage. The attack could potentially lead to the exfiltration of internal communications, business strategy insights, and detailed customer information. Salesforce is addressing the root cause of the vulnerability by implementing more robust layers of defense for their models and agents.
Malicious npm package 'fezbox' uses QR codes to deliver cookie-stealing malware
A malicious npm package named 'fezbox' was discovered using QR codes to fetch and execute cookie-stealing malware. The package, disguised as a utility library, was downloaded at least 327 times before being removed from the npm registry. The malware targets user credentials and employs steganographic techniques to evade detection. The package was found to fetch a JPG image containing a QR code, which then executes a second-stage payload. The QR code is designed to be unusually dense and difficult to read with standard phone cameras, making it harder to detect. The package was published by a Chinese-speaking attacker using the alias 'janedu' and included multiple layers of obfuscation to evade detection. The malware specifically targets cookies to steal usernames and passwords, sending the stolen information via an HTTPS POST request to a command-and-control server. The package was removed and flagged as malware posing a supply-chain risk. The attacker's activity status on the npm registry remains unclear. The package's ReadMe mentioned a QR Code Module, making its existence seem legitimate. The package used reversed strings as an anti-analysis technique. The payload could read a web cookie and extract the username and password if both were present.
RaccoonO365 Phishing Network Disrupted by Microsoft and Cloudflare
The RaccoonO365 phishing network, a financially motivated threat group, was disrupted by Microsoft's Digital Crimes Unit (DCU) and Cloudflare. The operation, executed through a court order in the Southern District of New York, seized 338 domains used by the group since July 2024. The network targeted over 2,300 organizations in 94 countries, including at least 20 U.S. healthcare entities, and stole over 5,000 Microsoft 365 credentials. The RaccoonO365 network operated as a phishing-as-a-service (PhaaS) toolkit, marketed to cybercriminals via a subscription model on a private Telegram channel. The group used legitimate tools like Cloudflare Turnstile and Workers scripts to protect their phishing pages, making detection more challenging. The mastermind behind RaccoonO365 is believed to be Joshua Ogundipe, who received over $100,000 in cryptocurrency payments. The group is also suspected to collaborate with Russian-speaking cybercriminals. Cloudflare executed a three-day 'rugpull' against RaccoonO365, banning all identified domains, placing interstitial 'phish warning' pages, terminating associated Workers scripts, and suspending user accounts to prevent re-registration.
Increased Browser-Based Attacks Targeting Business Applications
Browser-based attacks targeting business applications have surged, exploiting modern work practices and decentralized internet apps. These attacks, including phishing, malicious OAuth integrations, and browser extensions, compromise business apps and data by targeting users. The attacks leverage various delivery channels and evasion techniques, making them difficult to detect and block. Phishing attacks have evolved to use non-email channels such as social media, instant messaging apps, and malicious search engine ads. These attacks often bypass traditional email security controls and are harder to detect. Attackers exploit the decentralized nature of modern work environments, targeting users across multiple apps and communication channels. Non-email phishing attacks can result in significant breaches, as seen in the 2023 Okta breach. The rise in these attacks highlights the need for enhanced browser security measures and better visibility into user activities within the browser.
Axios and Direct Send Abuse in Microsoft 365 Phishing Campaigns
Threat actors are exploiting HTTP client tools like Axios and Microsoft's Direct Send feature to create highly efficient phishing campaigns targeting Microsoft 365 environments. These attacks, which began in July 2025, initially targeted executives and managers in finance, healthcare, and manufacturing sectors, but have since expanded to all users. The campaigns use compensation-themed lures to trick recipients into revealing credentials and bypassing multi-factor authentication (MFA). The abuse of Axios has surged, accounting for 24.44% of all flagged user agent activity from June to August 2025. The attacks leverage Axios to intercept, modify, and replay HTTP requests, capturing session tokens or MFA codes in real-time. This method allows attackers to bypass traditional security defenses and conduct phishing operations at an unprecedented scale. Additionally, a phishing-as-a-service (PhaaS) offering called Salty 2FA has been discovered, which steals Microsoft login credentials and sidesteps MFA by simulating various authentication methods. Salty 2FA uses advanced features such as subdomain rotation, dynamic corporate branding, and sophisticated evasion tactics to enhance its phishing campaigns. It also abuses legitimate platforms to stage initial attacks and uses Cloudflare Turnstile for secure CAPTCHA replacement. Salty2FA campaigns have been active since late July 2025 and continue to this day, generating dozens of fresh analysis sessions daily. The campaigns target industries including finance, healthcare, government, logistics, energy, IT consulting, education, construction, telecom, chemicals, industrial manufacturing, real estate, and consulting.