Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    NJ Special Election Tests House GOP Majority

    April 16, 2026

    Anthropic Trust Adds Novartis CEO to Board

    April 16, 2026

    UK’s FCA opens final crypto consultation ahead of 2027 regime switch-on

    April 16, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram LinkedIn
    Ai Crypto TimesAi Crypto Times
    • Altcoins
      • Coinbase
      • Litecoin
      • Bitcoin
    • Ethereum
    • Crypto
    • Blockchain
    • Lithosphere News Releases
    Ai Crypto TimesAi Crypto Times
    Home » UC researchers warn third-Party AI routers are stealing crypto and private keys
    Crypto

    UC researchers warn third-Party AI routers are stealing crypto and private keys

    James WilsonBy James WilsonApril 13, 2026No Comments3 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email



    Third-party AI routing services are exposing users to significant security flaws that could result in the theft of cryptocurrency and cloud credentials.

    Summary

    • Researchers found that 26 third-party LLM routers are actively injecting malicious code and stealing credentials by exploiting their access to plaintext data.
    • The study revealed that intermediaries can intercept private keys and cloud credentials because they terminate secure encryption to aggregate AI requests.

    According to a paper published on Thursday by University of California researchers, the supply chain for Large Language Models (LLM) contains several vulnerabilities that allow for malicious code injection and credential extraction. 

    These intermediaries, which developers use to manage access to providers like Google or OpenAI, essentially act as a “middleman” that terminates secure encryption. 

    Because they have full plaintext access to every message sent through them, sensitive data like seed phrases or private keys can be intercepted by unverified infrastructure.

    The researchers tested 400 free and 28 paid routers to measure the extent of these risks. Nine of these services actively injected malicious code, while 17 separate routers were caught accessing Amazon Web Services credentials owned by the team. 

    During the experiment, one router successfully drained Ether from a decoy wallet after the researchers provided a prefunded private key. 

    Although the team kept the balances low to ensure the total loss remained under $50, the result confirmed how easily a compromised intermediary can siphon funds.

    “26 LLM routers are secretly injecting malicious tool calls and stealing creds,” co-author Chaofan Shou stated on X.

    Identifying a malicious router is a difficult task for the average user. The researchers noted that because these services must read data to forward it, there is no visible difference between legitimate handling and active theft. 

    The danger increases when developers enable “YOLO mode,” a setting in many AI frameworks that lets an agent execute commands automatically without a human confirming the action. 

    This allows an attacker to send instructions that the user’s system will run instantly, often without the operator’s knowledge.

    “The boundary between ‘credential handling’ and ‘credential theft’ is invisible to the client because routers already read secrets in plaintext as part of normal forwarding,” the study explained.

    Previously reliable routers can become dangerous if they reuse leaked credentials through weak relays. To prevent these attacks, the research team suggested that developers should never allow private keys or sensitive phrases to pass through an AI agent session. 

    A permanent solution would require AI companies to use cryptographic signatures. Such a system would allow an agent to mathematically prove that instructions came from the actual model rather than a tampered third-party source.

    “LLM API routers sit on a critical trust boundary that the ecosystem currently treats as transparent transport,” the paper concluded.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    James Wilson

    Related Posts

    NJ Special Election Tests House GOP Majority

    April 16, 2026

    Anthropic Trust Adds Novartis CEO to Board

    April 16, 2026

    UK’s FCA opens final crypto consultation ahead of 2027 regime switch-on

    April 16, 2026

    Comments are closed.

    Our Picks
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss

    NJ Special Election Tests House GOP Majority

    Crypto April 16, 2026

    Voters in New Jersey’s 11th congressional district are heading to the polls today in a…

    Anthropic Trust Adds Novartis CEO to Board

    April 16, 2026

    UK’s FCA opens final crypto consultation ahead of 2027 regime switch-on

    April 16, 2026

    Israel-Lebanon 10-Day Ceasefire Starts Today

    April 16, 2026

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    X (Twitter) Instagram YouTube LinkedIn
    Our Picks

    How to Buy Bitcoin on the Cash App? 2026

    April 13, 2026

    Allocation Update – Q4 2023

    March 15, 2026

    Synthetix price forms compression as buyback plan emerges

    March 15, 2026
    Recent Posts

    NJ Special Election Tests House GOP Majority

    April 16, 2026

    Anthropic Trust Adds Novartis CEO to Board

    April 16, 2026

    UK’s FCA opens final crypto consultation ahead of 2027 regime switch-on

    April 16, 2026

    Type above and press Enter to search. Press Esc to cancel.