Digital MarketingDec 10, 2025

Zero-Click Attack: How a Single Email Can Delete Your Entire Google Drive

Viewed 5 min read

Blog image

The usage of artificial intelligence in browsing has resulted in faster, easier, and more automated browsing, while at the same time it has facilitated the emergence of a new class of cyber threats. A case in point is a zero-click attack which has the potential to silently erase a Google Drive account by just a single email and without any user involvement. 

This kind of assault reveals the primary security flaws in AI-powered browser automation, and the heightened dangers associated with the use of AI assistants in browsers. It also indicates weaknesses such as the Perplexity Comet vulnerability and the HashJack vulnerability and it shows that the manipulation of AI-based systems is as easy as that of software.

What Makes Zero-Click Attacks So Dangerous?

A zero-click attack means that the user does not have to take any action like clicking a link or opening a file.

The attack, however, gets triggered automatically when, for instance, an AI assistant scans, previews, or interprets the content of an email.

Classic cyber crime was based on human errors.

Zero-click attacks take advantage of the AI's making decisions thus they get the upper hand in terms of danger.

The reason this threat is important is:

  • AI can conduct browser actions without human intervention
  • The user may not even be aware that the assistant has interacted with the email
  • Using prompt injection, commands can be obscured
  • Cloud services such as Google Drive can be accessed and controlled
  • There are virtually no signs left behind by the attack

That’s why it is becoming one of the main issues in the discussions of cyber security news, computer security, and global cyber attacks.

How AI Browser Assistants Became a New Attack Surface

Nowadays AI browser assistants—often referred to as AI copilots—are capable of producing summaries of webpages, classifying and arranging files, carrying out automations and also handling online accounts.

In order to achieve this, they are granted profound access to the browser which consists of the following:

  • The content of the page
  • Buttons for managing files
  • Actions for using cloud storage
  • Open tabs and their respective URLs
  • Email notifications
  • Among these tools are Perplexity Comet, Arc Search, etc.

This ease of use comes with a significant drawback of serious AI copilot risks, as an attacker can easily manipulate the assistant and the AI can then perform harmful actions without the user's knowledge.

Understanding the Perplexity Comet Vulnerability

The Perplexity Comet flaw showed the extent to which AI assistants could be manipulated so easily.

Comet’s bot was able to:

  • Read e-mails
  • Access Google Drive
  • Perform tasks (click buttons)
  • Remove files
  • Clear the trash

Comet, by means of prompt injection, was quite literally misled by the attacker and thus carried out a Google Drive wiper attack that remained invisible to the user. 

This vulnerability has already gained significant attention in cybersecurity discussions as it has led to the emergence of a new type of software security issue that is specifically aimed at AI-driven operations.

The HashJack Vulnerability and Browser Automation Risks

The HashJack flaw has an impact on the way browser automation works with webpage hashes and navigations. 

By deceptive means, cybercriminals could get untrustworthy artificial intelligence assistants to do things like:

  • Open sensitive dashboards
  • Accidentally erase files
  • Change files stored in the cloud
  • Gain unauthorized access to settings

The issue of HashJack has pointed out a significant flaw in the security of browser automation: AI agents do not distinguish between good and bad sites, they simply trust the structure of any page they meet.

How a Single Email Triggers a Google Drive Wipe

Let us break the attack down—it unfolds just like this, in simple words:

Step 1: Attacker sends a crafted email

The email appears innocuous to a human but has secret commands hidden either within the body or the HTML.

Step 2: AI assistant auto-scans the email

Most browser-based AIs perform "reading" of new emails automatically in order to provide summaries or suggestions.

Step 3: Prompt injection activates

The hidden commands seize the control of the AI agent.

Step 4: AI opens Google Drive

The assistant goes to drive.google.com by itself.

Step 5: AI selects and deletes everything

It performs the clicks:

  • Select All
  • Move to Trash
  • Empty Trash

All the documents are erased for good.

Step 6: User never interacted at all

This is what makes it a zero-click attack.

This unbelievable procedure reveals the extent to which AI—after being automated—can be powerful and, at the same time, dangerous when security controls are not strong enough.

Why This Represents a New Era of Cyber Attacks

The attack in question is not limited to Google Drive alone. It indicates a considerable transformation in security of computers:

AI has become a target

Humans are not the victims anymore, instead the AI is being fooled.

Instructions in disguise are sufficient

Prompt injection is free from the need for malware or downloads.

Cloud storage is insecure

An entire Google Drive account can be erased in no time, just a few seconds.

No traces left in logs

The AI behaves "like the user," thus making its detection difficult.

Such a scenario is one of the severe and alarming cyber-attack cases of the present day.

AI Agent Manipulation: The New Threat Category

At present, security specialists refer to this incident as AI agent manipulation, which is a type of threat that attackers take advantage of AI systems command recognition to interpret the command in their favor.

AI-mannered assistants can, without knowing: 

  • Erase documents, 
  • Transmit information that is not meant to be shared, 
  • Follow links that are dangerous, 
  • Alter the preferences of the user in question, 
  • Obtain harmful software. 

AI manipulation will be the main subject of cyber security news going forward as the use of AI will speed up.

Who Is at Risk?

Are there any users of:

  • Google Drive
  • Artificial intelligence browser assistants
  • Artificial intelligence summarizers for emails
  • Workflow automation through the cloud
  • Artificial intelligence co-pilots in browsers with heavy automation?

Typical users include:

  • Learners
  • Workers
  • Programmers
  • Companies
  • Groups working on cloud collaboration

Even agencies managing client assets like the top-notchbest digital marketing agency in Delhi could face terrible data loss due to an AI assistant's wrong usage.

How to Protect Yourself (Simple, Practical Steps)

Below are some simple but effective steps that help protect against AI-driven threats in a significant way.

  • Stop browser automation at the highest level
  • Terminate all AI actions that operate by clicking buttons or moving from one page to another automatically.
  • Limit the AI assistant's access rights

Deny entry to:

  • Destroying files
  • Google account configurations
  • Drive waste
  • Features of cloud management

Do not let AI read emails automatically If possible, have it manual activation only.

Turn-on backups from Google Drive Utilize:

  • Physical external hard drives
  • Secure offline backups
  • Another cloud service provider

This way you will always have data recovery even after using up Google Drive storage.

Do not forget to update your browser extensions

The developers will often fix not only the Perplexity Comet vulnerability and HashJack vulnerability but also other security holes in their software.

The Future of AI Browser Security

AI Browser Security is getting more and more skilled day by day hence security must adapt quickly to that. Expect the following:

  • AI safety firewalls:Toolset that bans prompt patterns harmful for humans.
  • Permission-based AI actions: AI has to take user’s confirmation for risky measures like file deletions.
  • Enhanced sandboxing: AI brokers will operate in totally safe and limited virtual environments.
  • Independent AI security audits: Almost the same as how software is being audited nowadays.

The above-mentioned changes are necessary for the long-term browser automation security.

Overall Summary

The Google Drive attack with zero clicks shows that:

  • AI is mighty
  • AI is open to attack
  • AI can operate independently
  • Cybercriminals are focusing on AI rather than humans

Now, knowing the dangers of AI copilot risks, prompt injection, and AI agent manipulation is very important for being safe in the digital world. 

With the expansion of AI, the focus on the security of browsers against AI, the prevention of software vulnerabilities, and the proper usage of secure cloud facilities, must also grow. 

tags: zero-click attackGoogle Drive wiper attackcyber attacksAI copilot risksHashJack vulnerability

  • TitleZero-Click Attack: How a Single Email Can Delete Your Entire Google Drive
  • Published OnDec 10, 2025
  • CategoriesDigital Marketing
  • Tags
    zero-click attack
    Google Drive wiper attack
    cyber attacks
    AI copilot risks
    HashJack vulnerability
  • Author Hitesh

want to work with us

Let’s make someting great together