Google Finds Web Pages Hijacking AI Agents

According to Decrypt, Google's security team scanned billions of web pages and discovered live payloads designed to hijack autonomous AI agents. Decrypt reports the payloads use prompt-injection techniques to trick agents into actions such as sending money, deleting files, and exfiltrating credentials. The coverage highlights cases that attempt to initiate PayPal transfers and other real-world side effects. Decrypt says the findings show threat actors embedding actionable instructions and web-based payloads specifically crafted to manipulate agent workflows. Google's scanning effort and the reported PayPal-targeting examples are described by Decrypt as evidence that web-origin prompt attacks are moving from proof-of-concept to operational exploitation.
What happened
According to Decrypt, Google's security team scanned billions of web pages and identified live payloads that carry prompt-injection style instructions aimed at autonomous AI agents. Decrypt reports these payloads include sequences intended to cause agents to perform destructive or monetizable actions, including sending money, deleting local files, and leaking credentials. The Decrypt coverage specifically highlights examples where payloads attempt to trigger PayPal transfers.
Editorial analysis - technical context
Prompt-injection attacks exploit the way agents ingest and follow web content when web browsing or tool-calling is enabled. Industry observers have documented prompt injection as a generic vector; Decrypt's report documents a scale-out pattern where pages embed executable instructions and staged payloads meant to be interpreted by agents. For practitioners, this raises two technical concerns: agents that execute web-driven workflows increase attack surface, and automated action execution without strong intent or provenance checks amplifies impact.
Industry context
Observed patterns in similar transitions: security research teams and red teams have long warned that agentic systems blur the boundary between parsing content and executing side effects. Decrypt's findings align with earlier academic and industry demonstrations showing how web-origin content can induce model-driven actions. The addition of real-world financial targets, such as attempts against PayPal, moves this from theoretical risk to operational fraud exposure.
What to watch
Editorial analysis: practitioners and defenders should monitor three indicators reported by Decrypt: prevalence of web pages embedding structured, stepwise instructions for action; use of web-hosted payload staging to escalate from instruction to transaction; and emergence of monetizable targets in payload content. Observability around agent tool calls, stronger provenance/meta-data signals on fetched content, and tighter allowlists for actions are practical monitoring focuses for teams assessing risk. Decrypt does not quote direct statements from Google about remediation timelines, and Google has not been quoted in the Decrypt article on the rationale behind the scanning effort.
Scoring Rationale
The report documents operationalized prompt-injection attacks with financial targets, increasing urgency for agent security. This affects agent design, observability, and runtime controls used by practitioners.
Practice with real Payments data
90 SQL & Python problems · 15 industry datasets
250 free problems · No credit card
See all Payments problems

