Close Menu
    Facebook X (Twitter) Instagram
    • Privacy Policy
    • Terms Of Service
    • Social Media Disclaimer
    • DMCA Compliance
    • Anti-Spam Policy
    Facebook X (Twitter) Instagram
    Bytecore News
    • Home
    • Crypto News
      • Bitcoin
      • Ethereum
      • Altcoins
      • Blockchain
      • DeFi
    • AI News
    • Stock News
    • Learn
      • AI for Beginners
      • AI Tips
      • Make Money with AI
    • Reviews
    • Tools
      • Best AI Tools
      • Crypto Market Cap List
      • Stock Market Overview
      • Market Heatmap
    • Contact
    Bytecore News
    Home»Crypto News»Ethereum»AI Routers Can Steal Credentials and Crypto
    AI Routers Can Steal Credentials and Crypto
    Ethereum

    AI Routers Can Steal Credentials and Crypto

    April 13, 20263 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email
    ledger


    University of California researchers have discovered that some third-party AI large language model (LLM) routers can pose security vulnerabilities that can lead to crypto theft. 

    A paper measuring malicious intermediary attacks on the LLM supply chain, published on Thursday by the researchers, revealed four attack vectors, including malicious code injection and extraction of credentials. 

    “26 LLM routers are secretly injecting malicious tool calls and stealing creds,” said the paper’s co-author, Chaofan Shou, on X.

    LLM agents increasingly route requests through third-party API intermediaries or routers that aggregate access to providers like OpenAI, Anthropic and Google. However, these routers terminate Internet TLS (Transport Layer Security) connections and have full plaintext access to every message. 

    murf

    This means that developers using AI coding agents such as Claude Code to work on smart contracts or wallets could be passing private keys, seed phrases and sensitive data through router infrastructure that has not been screened or secured.

    Multi-hop LLM router supply chain. Source: arXiv.org

    ETH stolen from a decoy crypto wallet 

    The researchers tested 28 paid routers and 400 free routers collected from public communities. 

    Their findings were startling, with nine routers actively injecting malicious code, two deploying adaptive evasion triggers, 17 accessing researcher-owned Amazon Web Services credentials, and one draining Ether (ETH) from a researcher-owned private key.

    Related: Anthropic limits access to AI model over cyberattack concerns

    The researchers prefunded Ethereum wallet “decoy keys” with nominal balances and reported that the value lost in the experiment was below $50, but no further details such as the transaction hash were provided. 

    The authors also ran two “poisoning studies” showing that even benign routers become dangerous once they reuse leaked credentials through weak relays.

    Hard to tell whether routers are malicious

    The researchers said it was not easy to detect when a router was malicious.  

    “The boundary between ‘credential handling’ and ‘credential theft’ is invisible to the client because routers already read secrets in plaintext as part of normal forwarding.” 

    Another unsettling find was what the researchers called “YOLO mode.” This is a setting in many AI agent frameworks where the agent executes commands automatically without asking the user to confirm each one.

    Previously legitimate routers can be silently weaponized without the operator even knowing, while free routers may be stealing credentials while offering cheap API access as the lure, the researchers found.

    “LLM API routers sit on a critical trust boundary that the ecosystem currently treats as transparent transport.” 

    The researchers recommended that developers using AI agents to code should bolster client-side defenses, suggesting never letting private keys or seed phrases transit an AI agent session.

    The long-term fix is for AI companies to cryptographically sign their responses so the instructions an agent executes can be mathematically verified as coming from the actual model. 

    Magazine: Nobody knows if quantum secure cryptography will even work

    Cointelegraph is committed to independent, transparent journalism. This news article is produced in accordance with Cointelegraph’s Editorial Policy and aims to provide accurate and timely information. Readers are encouraged to verify information independently. Read our Editorial Policy https://cointelegraph.com/editorial-policy



    Source link

    murf
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    CryptoExpert
    • Website

    Related Posts

    Ethereum Foundation Exposes 100 North Korean Operatives Infiltrating Crypto Companies

    April 17, 2026

    Ethereum price outlook: ETH faces 6% downside risk if $2,312 breaks

    April 16, 2026

    ETH/BTC Breakout Aligns With Rising Ether Demand

    April 15, 2026

    Ethereum Foundation Unveils $1M Security Audit Subsidy

    April 14, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    frase
    Latest Posts

    Bitcoin Price Prediction: BTC Eyes $125K Target

    April 17, 2026

    Analyst Defends Circle’s No-Freeze Stance on $280M Drift Hack Funds

    April 17, 2026

    Chiliz price surges amid adoption in South Korea and UEFA Champions League excitement

    April 17, 2026

    The Hidden FVG Zone That Says Ethereum Price Could Rally To $10,000

    April 17, 2026

    Neo Co-Founder Proposes $461M Overhaul to End ‘Trust Me’ Governance

    April 17, 2026
    Customgpt
    LEGAL INFORMATION
    • Privacy Policy
    • Terms Of Service
    • Social Media Disclaimer
    • DMCA Compliance
    • Anti-Spam Policy
    Top Insights

    XRP Gets Major Adoption Boost From Solana as Price Gains Momentum

    April 18, 2026

    Danger Zone Or Entry Point?

    April 18, 2026
    kraken
    Facebook X (Twitter) Instagram Pinterest
    © 2026 BytecoreNews.com - All rights reserved.

    Type above and press Enter to search. Press Esc to cancel.