HomeCryptoDailyResearchers Warn Malicious AI Agent Routers Can Steal Crypto in New Attack...

Researchers Warn Malicious AI Agent Routers Can Steal Crypto in New Attack Vector Daniel Francis

Published on

spot_imgspot_imgspot_imgspot_img

 Malicious AI Agent Routers Can Steal Crypto, Researchers Warn
The post Researchers Warn Malicious AI Agent Routers Can Steal Crypto in New Attack Vector appeared first on Coinspeaker. –   

Researchers at the University of California have identified a previously undocumented class of attack targeting the AI agents infrastructure layer, finding that malicious third-party LLM API routers can intercept agent communications, inject code into tool calls, and drain crypto wallets – including, in at least one documented case, executing an actual ETH transfer out of a researcher’s live wallet.

The findings, published in an April 2026 arXiv paper and described by the team as the first systematic analysis of malicious intermediary attacks on the LLM supply chain, elevate what had previously been a theoretical concern into a demonstrated, measurable threat.

What makes this finding structurally significant is the attack surface it exposes – not smart contracts, not private key management failures in the conventional sense, but the routing layer that sits between an AI agent and the underlying language model it queries.

As autonomous AI agents are increasingly integrated into crypto wallets, DeFi protocols, and automated trading workflows, that intermediary layer has become load-bearing infrastructure, and it is currently operating without meaningful security standardization.

DISCOVER: Best crypto to buy right now – CoinSpeaker’s updated guide

How Malicious AI Agent Routers Work: The Intermediary Attack Chain and What It Can Execute Against Crypto Wallets

An AI API router, in standard usage, functions as a middleware layer – it receives requests from an AI agent or application, forwards them to one or more LLM providers, and returns responses.

Developers and teams frequently use third-party routers to manage API keys, load-balance across providers, or reduce costs by accessing cheaper model endpoints. The router sits, by design, in a position of full visibility over every prompt, tool call, and response that passes through it.

A malicious router exploits exactly that position. Rather than transparently forwarding agent traffic, it can inspect, modify, or respond to tool crypto calls – the structured commands an AI agent issues to interact with external systems, including wallets.

Source: Arxiv

In the UC researchers’ framework, this enables at minimum three active attack types: injecting malicious code into an AI agent tool execution pipeline, harvesting API credentials and private keys transmitted or referenced in agent sessions, and deploying adaptive evasion logic that delays malicious behavior – waiting, in some documented cases, 50 or more call cycles before activating – to defeat naive monitoring.

The researchers also identified a fourth vector they describe as particularly dangerous in agentic contexts: exploiting “YOLO mode,” the autonomous execution capability present in several major agent frameworks, where the agent acts on tool call responses without human confirmation.

A router that can inject into that loop can, in principle, authorize transactions the user never explicitly approved. That capability is not theoretical – the team confirmed 1 router among those tested actively drained ETH from a researcher’s wallet.

UC Researchers’ Specific Findings: Scale, Confirmed Malicious Behavior, and the Epistemic Limits of an arXiv Preprint

The research team tested 428 routers in total: 28 sourced from paid listings on Taobao, Xianyu, and Shopify storefronts, and 400 obtained free from public community channels. Of those, 9 routers – 1 paid, 8 free – were confirmed to be actively injecting malicious code into tool calls.

Separately, 17 accessed AWS canary credentials the team had embedded as detection tripwires, and 2 deployed adaptive evasion techniques specifically designed to defeat behavioral monitoring. More than 20% of the full sample exhibited malicious behavior or material risk indicators, according to the researchers’ own classification.

The credential exposure data from the team’s poisoning experiments is, if accurate, the most consequential finding in the paper. A leaked OpenAI key placed on Chinese forums, WeChat, and Telegram was used to process 100 million GPT-5.4 tokens and more than 7 autonomous Codex sessions before detection. A weaker decoy credential triggered 2.1 billion billable tokens across 440 Codex sessions and 401 YOLO mode autonomous sessions, exposing 99 credentials in total.

Solayer founder Fried_rice characterized the findings on social media on April 10, 2026, as evidence of “systemic security vulnerabilities” in third-party API routers – a description that aligns with the paper’s own threat model framing.

It is necessary to flag the epistemic status of these claims directly: the paper has not, at time of writing, completed formal peer review through an academic venue. It is an arXiv preprint, and the specific figures – token counts, router behavior classifications, credential exposure tallies – have not been independently verified by a third party.

We suspect the core findings are directionally sound, given the methodology’s apparent rigor and the corroborating detail across multiple reported attack types, but extrapolations beyond the 428-router sample should be treated with proportionate caution.

EXPLORE: Best meme coins to watch – CoinSpeaker’s updated rankings

The post Researchers Warn Malicious AI Agent Routers Can Steal Crypto in New Attack Vector appeared first on Coinspeaker.

 Cybersecurity News, Web3 News Archives – CoinspeakerRead More


Discover more from GMDegens.io

Subscribe to get the latest posts sent to your email.

Leave a Reply

Subscribe for More Updates

Latest articles

Overwatch battle pass – all Season 2 rewards

  What rewards are in the Overwatch battle pass? The launch of a new Overwatch...

Hades 2 update leaves its biggest secret out of the patch notes: a new game mode

  The latest Hades 2 update has introduced an entirely new game mode, but you...

The Rockstar hack could have been a disaster. Instead, Take-Two’s stocks have skyrocketed

  It's no secret that GTA 6 is the only thing that most of us...

Sony and Fnatic just announced a blazing-fast 720Hz OLED gaming monitor with one bizarre compromise

  Meet the Sony Inzone M10S II, the company's latest gaming monitor focused on delivering...
spot_imgspot_imgspot_imgspot_img

More like this

Back-To-Back Billion-Dollar Days: Strategy’s STRC ATM Clears $2.7B In 48 Hours

Bitcoin Magazine Back-To-Back Billion-Dollar Days: Strategy’s STRC ATM Clears $2.7B In 48 Hours Strategy’s STRC ATM...

Presidio Bitcoin Releases Quantum Readiness Paper

Bitcoin Magazine Presidio Bitcoin Releases Quantum Readiness Paper Today Presidio Bitcoin, a Bitcoin hub located in...

Is Bitcoin Still a Sovereign Tool?

Bitcoin Magazine Is Bitcoin Still a Sovereign Tool? A new panel has officially been announced for...

Discover more from GMDegens.io

Subscribe now to keep reading and get access to the full archive.

Continue reading

Discover more from GMDegens.io

Subscribe now to keep reading and get access to the full archive.

Continue reading