Close Menu
    Facebook LinkedIn YouTube WhatsApp X (Twitter) Pinterest
    Trending
    • Scandi-style tiny house combines smart storage and simple layout
    • Our Favorite Apple Watch Has Never Been Less Expensive
    • Vercel says it detected unauthorized access to its internal systems after a hacker using the ShinyHunters handle claimed a breach on BreachForums (Lawrence Abrams/BleepingComputer)
    • Today’s NYT Strands Hints, Answer and Help for April 20 #778
    • KV Cache Is Eating Your VRAM. Here’s How Google Fixed It With TurboQuant.
    • OneOdio Focus A1 Pro review
    • The 11 Best Fans to Buy Before It Gets Hot Again (2026)
    • A look at Dylan Patel’s SemiAnalysis, an AI newsletter and research firm that expects $100M+ in 2026 revenue from subscriptions and AI supply chain research (Abram Brown/The Information)
    Facebook LinkedIn WhatsApp
    Times FeaturedTimes Featured
    Sunday, April 19
    • Home
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    • More
      • AI
      • Robotics
      • Industries
      • Global
    Times FeaturedTimes Featured
    Home»News»New attack can steal cryptocurrency by planting false memories in AI chatbots
    News

    New attack can steal cryptocurrency by planting false memories in AI chatbots

    Editor Times FeaturedBy Editor Times FeaturedMay 18, 2025No Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email WhatsApp Copy Link

    The researchers wrote:

    The implications of this vulnerability are notably extreme provided that ElizaOSagents are designed to work together with a number of customers concurrently, counting on shared contextual inputs from all contributors. A single profitable manipulation by a malicious actor can compromise the integrity of the whole system, creating cascading results which are each tough to detect and mitigate. For instance, on ElizaOS’s Discord server, numerous bots are deployed to help customers with debugging points or partaking usually conversations. A profitable context manipulation focusing on any one among these bots may disrupt not solely particular person interactions but additionally hurt the broader group counting on these brokers for assist
    and engagement.

    This assault exposes a core safety flaw: whereas plugins execute delicate operations, they rely completely on the LLM’s interpretation of context. If the context is compromised, even official consumer inputs can set off malicious actions. Mitigating this menace requires robust integrity checks on saved context to make sure that solely verified, trusted knowledge informs decision-making throughout plugin execution.

    In an e-mail, ElizaOS creator Shaw Walters stated the framework, like all natural-language interfaces, is designed “as a substitute, for all intents and functions, for tons and many buttons on a webpage.” Simply as an internet site developer ought to by no means embrace a button that provides guests the flexibility to execute malicious code, so too ought to directors implementing ElizaOS-based brokers rigorously restrict what brokers can do by creating enable lists that let an agent’s capabilities as a small set of pre-approved actions.

    Walters continued:

    From the surface it’d look like an agent has entry to their very own pockets or keys, however what they’ve is entry to a device they will name which then accesses these, with a bunch of authentication and validation between.

    So for the intents and functions of the paper, within the present paradigm, the scenario is considerably moot by including any quantity of entry management to actions the brokers can name, which is one thing we tackle and demo in our newest newest model of Eliza—BUT it hints at a a lot tougher to cope with model of the identical drawback once we begin giving the agent extra laptop management and direct entry to the CLI terminal on the machine it’s operating on. As we discover brokers that may write new instruments for themselves, containerization turns into a bit trickier, or we have to break it up into completely different items and solely give the general public going through agent small items of it… because the enterprise case of these things nonetheless is not clear, no person has gotten terribly far, however the dangers are the identical as giving somebody that could be very good however missing in judgment the flexibility to go on the web. Our method is to maintain the whole lot sandboxed and restricted per consumer, as we assume our brokers will be invited into many alternative servers and carry out duties for various customers with completely different info. Most brokers you obtain off Github shouldn’t have this high quality, the secrets and techniques are written in plain textual content in an surroundings file.

    In response, Atharv Singh Patlan, the lead co-author of the paper, wrote: “Our assault is ready to counteract any function based mostly defenses. The reminiscence injection shouldn’t be that it might randomly name a switch: it’s that at any time when a switch is named, it might find yourself sending to the attacker’s tackle. Thus, when the ‘admin’ calls switch, the cash might be despatched to the attacker.”



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Editor Times Featured
    • Website

    Related Posts

    Vercel says it detected unauthorized access to its internal systems after a hacker using the ShinyHunters handle claimed a breach on BreachForums (Lawrence Abrams/BleepingComputer)

    April 19, 2026

    A look at Dylan Patel’s SemiAnalysis, an AI newsletter and research firm that expects $100M+ in 2026 revenue from subscriptions and AI supply chain research (Abram Brown/The Information)

    April 19, 2026

    Google is in talks with Marvell Technology to develop a memory processing unit that works alongside TPUs, and a new TPU for running AI models (Qianer Liu/The Information)

    April 19, 2026

    At the Beijing half-marathon, several humanoid robots beat human winners by 10+ minutes; a robot made by Honor beat the human world record held by Jacob Kiplimo (Reuters)

    April 19, 2026

    A look at the AI nonprofit METR, whose time-horizon metrics are used by AI researchers and Wall Street investors to track the rapid development of AI systems (Kevin Roose/New York Times)

    April 19, 2026

    Binance and Bitget to probe a rally in RaveDAO’s RAVE token, which surged 4,500% in a week, after ZachXBT alleged RAVE insiders engineered a large short squeeze (Francisco Rodrigues/CoinDesk)

    April 19, 2026

    Comments are closed.

    Editors Picks

    Scandi-style tiny house combines smart storage and simple layout

    April 19, 2026

    Our Favorite Apple Watch Has Never Been Less Expensive

    April 19, 2026

    Vercel says it detected unauthorized access to its internal systems after a hacker using the ShinyHunters handle claimed a breach on BreachForums (Lawrence Abrams/BleepingComputer)

    April 19, 2026

    Today’s NYT Strands Hints, Answer and Help for April 20 #778

    April 19, 2026
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    About Us
    About Us

    Welcome to Times Featured, an AI-driven entrepreneurship growth engine that is transforming the future of work, bridging the digital divide and encouraging younger community inclusion in the 4th Industrial Revolution, and nurturing new market leaders.

    Empowering the growth of profiles, leaders, entrepreneurs businesses, and startups on international landscape.

    Asia-Middle East-Europe-North America-Australia-Africa

    Facebook LinkedIn WhatsApp
    Featured Picks

    Who owns TikTok now and how could it change for US users?

    January 23, 2026

    Prague’s City Center Sparkles, Buzzes, and Burns at the Signal Festival

    December 1, 2025

    Lawtech disruptor Deeligence wins Melbourne Startup World Cup regional

    August 7, 2025
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    Copyright © 2024 Timesfeatured.com IP Limited. All Rights.
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About us
    • Contact us

    Type above and press Enter to search. Press Esc to cancel.