Threat actors have successfully executed a sophisticated prompt injection attack targeting AI-powered Web3 agents, resulting in the unauthorized transfer of nearly $200,000 in cryptocurrency assets. The incident involved manipulation of the Grok AI model and the autonomous wallet agent Bankrbot through Morse code-based instructions designed to evade standard AI safety controls. The attack demonstrates how AI agents with direct blockchain permissions can become high-risk targets when insufficient validation and human oversight mechanisms are implemented. The attack began with the threat actor obtaining elevated transaction privileges for Grok within the Bankr ecosystem. This was achieved by transferring a Bankr Club Membership NFT to Grok’s publicly known wallet addresses on the Ethereum and Base networks. Possession of the NFT granted the AI broader administrative capabilities, including the ability to autonomously execute token transfers and swaps. After the permissions were enabled, the attacker launched a prompt injection attack using Morse code to bypass text-based AI moderation filters. Grok was instructed to decode the hidden message and interact with Bankrbot on X. The translated instruction directed Bankrbot to transfer 3 billion DRB tokens to the attacker-controlled wallet. Because Bankrbot was configured to trust and automatically execute Grok’s interpreted commands, the transaction was processed without secondary verification or human approval. The attacker immediately liquidated the stolen DRB tokens through the LBank exchange, causing temporary market instability before token prices normalized.
Hackers linked to the ShinyHunters extortion group have claimed responsibility for a data breach affecting Spanish fashion retailer exposing information belonging to more than 197,...
A cyber intrusion targeting the source code infrastructure of Trellix has reportedly been linked to the ransomware and extortion collectiveRansomHouse. The group recently posted se...
Cybersecurity researchers have uncovered a large-scale Android scam campaign involving fraudulent “call history” applications distributed through the Google Play Store. The mal...