Malicious AI Agent Routers Discovered Injecting Tool Calls and Stealing Crypto Credentials

LLM Router Supply Chain Vulnerabilities Raise Security Concerns

Researchers from the University of California uncovered security risks in third party large language model (LLM) routers that could lead to cryptocurrency theft and credential exposure. Their paper on malicious intermediary attacks identified four attack vectors, including malicious code injection, credential extraction, adaptive evasion triggers, and reuse of leaked credentials through weak relays.

Co-author Chaofan Shou warned that 26 LLM routers were secretly injecting malicious tool calls and stealing credentials, raising alarms about API intermediaries that aggregate services from providers such as OpenAI, Anthropic, and Google. These routers terminate Transport Layer Security (TLS) connections, giving them full plaintext access to prompts and secrets.

Large-Scale Testing Reveals Ether Theft and Credential Access

The team tested 28 paid routers and 400 free routers collected from public communities. Results showed nine routers injecting malicious code, two deploying adaptive evasion triggers, 17 accessing researcher-owned Amazon Web Services credentials, and one draining Ether (ETH) from a researcher-owned private key.

Multi-hop LLM router supply chain. Source: arXiv.org

Researchers used prefunded Ethereum decoy wallet keys with nominal balances, reporting losses below $50 without disclosing a transaction hash. Two additional poisoning studies showed benign routers became dangerous once leaked credentials were reused. The study also highlighted “YOLO mode,” allowing automatic command execution without confirmation, and noted detection remains difficult because credential handling and theft appear identical to clients.

Disclaimer

This content is for informational purposes only and does not constitute financial, investment, or legal advice. Cryptocurrency trading involves risk and may result in financial loss.

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *