CloudSEK Research Reveals How AI Summarising Tools Can Be Tricked Using Prompt Injection-Based Attacks

CloudSEK research claims attackers can hide malicious text using CSS tricks that AI summarisers can interpret and obey.

Advertisement
Written by Akash Dutta, Edited by Rohan Pal | Updated: 26 August 2025 21:31 IST
Highlights
  • Such attacks can be carried out using basic emails
  • A similar vulnerability was recently spotted in Gemini in Gmail
  • In a demo, CloudSEK was able to deliver payload using an AI summariser

CloudSEK recommends bolstering AI summarising tools with the ability to strip suspicious CSS elements

Photo Credit: Reuters

CloudSEK, a cybersecurity firm, highlighted that artificial intelligence (AI) summarising tools can be tricked into carrying out commands of threat actors using benign CSS tricks. These tricks usually involve using hidden text in emails, messages, weblinks, and web pages. When a user asks an AI chatbot or an AI summarising tool to process the content and provide a summary, it also processes the invisible text, which are typically prompt injections aimed at overwhelming the AI system. With this, threat actors can carry out a wide range of attacks, including phishing and deploying ransomware.

AI Summarising Tools Can Be Potentially Vulnerable to CSS-Based Prompt Injections

In a blog post, CloudSEK detailed the new hacking technique being adopted by threat actors that utilises prompt injections hidden within emails, web pages, messages, and other forms of content using CSS tricks. The cybersecurity firm said this new technique on the rise is also known as ClickFix.

Advertisement

ClickFix is essentially a social engineering tactic where, instead of targeting the human directly, hackers target the AI summarising tool they might be using. The technique involves adding convincing instructions for the attack in a body of plain text in a way that the AI system is forced to comply. There are two important elements at play here.

First is using CSS-based hidden text. There are various ways to add hidden text to an email, message, document, or web page. Some of these include using white coloured font on a white page, using zero font size, placing off-screen text, and others.

Advertisement

The second element is using the abovementioned trick to add prompt injections. Prompt injection is an AI-focused attack where the threat actor manipulates the prompt to make the AI system behave in unintended or malicious ways. As per CloudSEK, this can be done by repeating the prompt dozens of times, overwhelming the AI. Other techniques include adding multi-layered prompts or long-text prompts.

A proof-of-concept was developed by CloudSEK researchers to demonstrate the plausibility of this attack. A HTML page was created with both benign text and hidden malicious prompt injections. The hidden text included a step-by-step instruction for the AI summariser to direct the execution of a Base64-encoded PowerShell command that delivers a ransomware.

Advertisement

By repeating the said instructions multiple times, the hidden text dominate the context of the AI summariser, making it surface the instructions prominently in the summary. The end user, unaware of the attack can then follow the steps and unknowingly install the payload. A similar vulnerability was recently spotted in Gemini in Gmail.

CloudSEK recommends enterprises and those building AI summarising tools to secure the system against such prompt injections. The AI systems and devices should be able to detect and flag such invisible CSS-based hidden text. Additionally, security systems should be able to recognise potentially harmful command-line patterns that exist in a document, email, or a webpage using decoding and heuristic analysis.

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement

Related Stories

Popular Mobile Brands
  1. OTT Releases This Week (April 13 - April 19): Toaster, Matka King, Assi, and More
  2. Vivo X300 Ultra, Vivo X300 FE Confirmed to Launch in India Soon
  3. Vivo X300 FE Could Be Available in These Two Storage Options in India
  4. Marathon Review: Bungie's Slick FPS Is One of the Best Shooters in Years
  5. DJI Osmo Pocket 4 Debuts With 1-inch CMOS Sensor, Improved Stabilisation
  6. Canva's Upgraded AI Suite Brings Agentic Capabilities to Complete Design Tasks
  7. Indian Smartphone Shipments Dropped to a Six-Year Low in Q1 2026: Report
  8. Huawei Watch Fit 5, Watch Fit 5 Pro Price, Specifications Leaked
  9. Youth (2026) Now Available for Streaming Online: Everything You Need to Know
  1. Honor 600 Pro and Honor 600 Key Specifications, Features Revealed via Official Listing
  2. Ethereum NFT Platform Shuts Down After Blacklove Sale Falls Through
  3. Vivo X300 FE Storage Options Leaked Alongside Live Image With Telephoto Extender Kit
  4. Indian Smartphone Shipments Dropped to Six-Year Low in Q1 2026 as Vivo Topped Market, Nothing Led Growth: Counterpoint
  5. Canva Introduces Canva AI 2.0, Brings Agentic Capabilities and Memory to Perform Design Tasks
  6. MediaTek Dimensity 9600 Pro Leak Suggests 5GHz Clock Speed, High Benchmark Scores
  7. Oppo Find X9s Pro Key Specifications Surface Online as Launch Date Draws Closer
  8. Russian-Based Crypto Exchange Grinex Halts Operation After $14 Million Hack
  9. Assassin's Creed: Black Flag Resynced Will Reportedly Release in July, Reveal Set for Next Week
  10. OnePlus Watch 4 Reportedly Listed on Google Play Console With Snapdragon W5 Chip
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.