• Live Crypto Prices
  • Crypto News
    • Worldwide
      • Bitcoin
      • Ethereum
      • Altcoin
      • Blockchain
      • Regulation
    • Australian Crypto News
  • Education
    • Cryptocurrency For Beginners
    • Where to Buy Cryptocurrency
    • Where to Store Cryptos
    • Cryptocurrency Tax in Australia 2021
No Result
View All Result
CryptoABC.net
No Result
View All Result

Researchers Warn Malicious AI Agent Routers Could Become a New Crypto Theft Vector

April 13, 2026
in Crypto News
Reading Time: 5min read
0 0
A A
0
Researchers Warn Malicious AI Agent Routers Could Become a New Crypto Theft Vector
0
SHARES
4
VIEWS
ShareShareShareShareShare

University of California researchers have identified a new class of infrastructure-level attack capable of draining crypto wallets and injecting malicious code into developer environments – and this crypto theft already happened in the wild.

A systematic study published on arXiv on April 8, 2026, titled “Measuring Malicious Intermediary Attacks on the LLM Supply Chain,” tested 428 AI API routers and found that 9 actively injected malicious code, 17 accessed researcher AWS credentials, and at least one free router successfully drained ETH from a researcher-controlled private key.

The attack surface is the AI agent routing layer – infrastructure that has expanded rapidly as AI agents become embedded in blockchain execution workflows. The question is no longer whether this threat is theoretical. The question is how many compromised routers are already handling live user sessions.

Key Takeaways:

  • Scale of testing: Researchers tested 428 routers – 28 paid (sourced from Taobao, Xianyu, Shopify) and 400 free from public communities – using decoy AWS Canary credentials and encrypted crypto private keys.
  • Confirmed malicious activity: 9 routers injected malicious code, 17 accessed AWS credentials, and 1 free router drained ETH from a researcher-owned wallet.
  • Evasion sophistication: 2 routers deployed adaptive evasion, including waiting 50 API calls before activating and specifically targeting YOLO-mode autonomous sessions.
  • Attack mechanism: Routers operate as application-layer proxies with plaintext JSON access – no encryption standard governs what they can read or modify in transit.
  • Poisoning reach: Leaked OpenAI keys processed 2.1 billion tokens, exposing 99 credentials across 440 Codex sessions and 401 autonomous YOLO-mode sessions.
  • Recommended defenses: Researchers urge client-side fault-closure gates, response anomaly filtering, append-only audit logging, and cryptographic signing for verifiable LLM responses.

Discover: Top Crypto Presales to Watch This Month

How Malicious AI Agent Routers Actually Work – Plaintext Proxies, Not Encrypted Pipes

Standard LLM API infrastructure was designed for simple request-response relay: a client sends a prompt, the router forwards it to the model provider, the response comes back.

Malicious routers exploit exactly that trust model – they sit as application-layer proxies in the middle of that exchange, with full read-write access to plaintext JSON payloads passing through them in both directions.

There are no encryption standards governing what a router can inspect or modify in transit. A malicious router sees the raw prompt, the model response, and everything embedded in either – including private keys, API credentials, wallet seed phrases, or code being generated for a live deployment environment.

It can alter the response before it reaches the user, inject additional code into a code-generation output, or silently exfiltrate credentials to an external endpoint.

The UC researchers built an agent they called “Mine” to simulate four distinct attack types against public frameworks, specifically targeting autonomous YOLO-mode sessions where the agent executes actions without human confirmation at each step.

Two of the 428 routers tested deployed adaptive evasion – one waited 50 API calls before activating malicious behavior, specifically to avoid detection during initial testing. That’s not a blunt credential-scraper. That’s a targeted tool built to survive scrutiny.

The poisoning attack vector compounds the risk further. When leaked OpenAI API keys are processed through compromised routing infrastructure, the blast radius scales fast – 2.1 billion tokens processed, 99 credentials exposed across 440 Codex sessions in the researchers’ controlled test environment alone.

Discover: The best crypto to diversify your portfolio with

Who Is Actually Exposed – and Why Existing Defenses Don’t Reach This Layer of Crypto Theft

The problem is not that third-party API routers exist. The problem is that the entire trust model for AI agent infrastructure assumes the routing layer is neutral – and no enforcement mechanism currently verifies that assumption at scale.

Developers building onchain tools, DeFi automation scripts, and autonomous trading agents route API calls through third-party infrastructure constantly.

Free routers sourced from public communities – the category where 8 of the 9 malicious injectors were found, are widely used precisely because they lower the cost of building LLM-powered applications. As automated execution infrastructure in DeFi grows more dependent on external data and agent coordination, the routing layer becomes an increasingly attractive target.

Existing wallet security – hardware devices, multisig setups, offline key storage – does not protect against a router that intercepts a private key before it reaches the signing layer, or that injects malicious code into a deployment script that later executes onchain.

Source Chainalysis

Annual crypto theft losses already hit $1.4 billion. This attack vector doesn’t require breaking cryptography. It requires compromising a piece of middleware that most users never examine.

YOLO-mode autonomous sessions are the highest-risk exposure point. When an agent executes multi-step transactions without human confirmation checkpoints, a malicious router has a wider window to act – and the user has no interstitial moment to catch anomalous behavior.

Solayer founder @Fried_rice amplified the findings on X on April 10, 2026, describing the situation as “third-party API routers widely relied on by large language model agents” carrying “systemic security vulnerabilities” – a characterization that landed hard given the scale of autonomous agent adoption across DeFi tooling.

26 LLM routers are secretly injecting malicious tool calls and stealing creds. One drained our client $500k wallet.

We also managed to poison routers to forward traffic to us. Within several hours, we can directly take over ~400 hosts.

Check our paper: https://t.co/zyWz25CDpl pic.twitter.com/PlhmOYz2ec

— Chaofan Shou (@Fried_rice) April 10, 2026

The researchers’ recommended defenses are client-side: fault-closure gates that halt execution when anomalous responses are detected, response anomaly filtering, and append-only logging for audit trails that can’t be tampered with by the router itself. Longer term, the UC team is advocating for cryptographic signing standards that would make LLM responses verifiable – the same architectural principle that makes onchain oracle integrity a live design requirement rather than an afterthought.

Discover: The best pre-launch token sales

The post Researchers Warn Malicious AI Agent Routers Could Become a New Crypto Theft Vector appeared first on Cryptonews.


Credit: Source link

ShareTweetSendPinShare
Previous Post

SHIB Price Prediction: Technical Indicators Signal Mixed Outlook Amid Limited Price Data

Next Post

XRP Social FUD Nears 2-Year High—Contrarian Signal Brewing?

Next Post
XRP Social FUD Nears 2-Year High—Contrarian Signal Brewing?

XRP Social FUD Nears 2-Year High—Contrarian Signal Brewing?

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

You might also like

The Crash Is Over? XRP Price About To Hit ‘Significant Bottom’

The Crash Is Over? XRP Price About To Hit ‘Significant Bottom’

April 25, 2026
Bitcoin Price Prediction: After Triangle Breakdown, Is a Drop Below $105K Next?

Penguins Can Fly: PENGU Crypto Notes Huge Gain as Utility Memecoin Heats Up

April 22, 2026
TRX Price Prediction: TRON Targets $0.35-$0.40 by November 2025 Despite Current Bearish Momentum

TRX Faces $0.30 Breakdown as Selling Pressure Overwhelms Bulls

April 21, 2026
Bitcoin Addresses Holding Between 100 and 10,000 BTC Hit a 7-Week High

Bitcoin Analyst Flags ‘Disbelief Rally’ as Price Hits $77,497

April 26, 2026
Is Bitcoin Riding the Ceasefire Rally Wave?

Is Bitcoin Riding the Ceasefire Rally Wave?

April 22, 2026
Tether Minted 1 Billion USDT: On-chain Trading Grinding Back

Tether Minted 1 Billion USDT: On-chain Trading Grinding Back

April 21, 2026
CryptoABC.net

This is an Australian online news/education portal that aims to provide the latest crypto news, real-time updates, education and reviews within Australia and around the world. Feel free to get in touch with us!

What's New Here!

Dogecoin Trap Shows A Major Crash, But How Low Will The Price Go?

Dogecoin Trap Shows A Major Crash, But How Low Will The Price Go?

April 27, 2026
[LIVE] Ethereum Price Developments, October 22: Live News and Price Updates as ETH Price Crashes to $3800

Ethereum Price Just Hit a Level It First Touched 5 Years Ago: Is This the Bottom or the Beginning of More Pain?

April 27, 2026

Subscribe Now

  • Contact Us
  • Privacy Policy
  • Terms of Use
  • DMCA

© 2021 cryptoabc.net - All rights reserved!

No Result
View All Result
  • Live Crypto Prices
  • Crypto News
    • Worldwide
      • Bitcoin
      • Ethereum
      • Altcoin
      • Blockchain
      • Regulation
    • Australian Crypto News
  • Education
    • Cryptocurrency For Beginners
    • Where to Buy Cryptocurrency
    • Where to Store Cryptos
    • Cryptocurrency Tax in Australia 2021

© 2021 cryptoabc.net - All rights reserved!

Welcome Back!

Login to your account below

Forgotten Password?

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Please enter CoinGecko Free Api Key to get this plugin works.