Browser Threats: GoldPickaxe, Opera Neon AI Prompt Injection
GoldPickaxe Malware Leverages Browser-in-the-Browser Attacks
- The GoldPickaxe malware campaign is actively employing sophisticated "browser-in-the-browser" social engineering techniques to target both iOS and Android users.
- Attackers are using this method to steal sensitive information, including facial scan data and various credentials, by impersonating legitimate banking and government applications.
- This advanced phishing technique creates fake browser windows within trusted sites, highlighting an evolving and persistent threat vector that bypasses traditional web security awareness.
Source: Security Affairs | Date: December 16, 2025
Opera Neon AI Chatbot Vulnerable to Prompt Injection
- A critical prompt injection vulnerability has been identified in the integrated AI chatbot within the Opera Neon browser, allowing for manipulation of its Large Language Model (LLM).
- This flaw enables attackers to inject malicious commands into the AI's prompts, potentially leading to cross-origin data leaks and the exposure of sensitive user information.
- The vulnerability highlights the emerging security challenges in AI-powered browser features, where novel attack vectors can bypass established browser security boundaries and expose users.
Source: Security Affairs | Date: December 16, 2025
References
- SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 76 - Security Affairs