Close Menu
    Facebook LinkedIn YouTube WhatsApp X (Twitter) Pinterest
    Trending
    • User Authorisation in Streamlit With OIDC and Google
    • New contact lenses monitor glaucoma signs during sleep
    • The Mysterious Inner Workings of Io, Jupiter’s Volcanic Moon
    • America250, the nonprofit organizing the US Semiquincentennial celebration, says it received sponsorship commitments from Oracle, Amazon, Coinbase, and Palantir (Meridith McGraw/Wall Street Journal)
    • FIFA Club World Cup Soccer: Stream PSG vs. Atlético Madrid Live From Anywhere
    • Tested an NSFW AI Video Generator with Voice
    • Bitter taste gene linked to kidney and mental health
    • Nolah Evolution Hybrid Mattress Review: A Jack of All Trades
    Facebook LinkedIn WhatsApp
    Times FeaturedTimes Featured
    Sunday, June 15
    • Home
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    • More
      • AI
      • Robotics
      • Industries
      • Global
    Times FeaturedTimes Featured
    Home»News»New attack can steal cryptocurrency by planting false memories in AI chatbots
    News

    New attack can steal cryptocurrency by planting false memories in AI chatbots

    Editor Times FeaturedBy Editor Times FeaturedMay 18, 2025No Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email WhatsApp Copy Link

    The researchers wrote:

    The implications of this vulnerability are notably extreme provided that ElizaOSagents are designed to work together with a number of customers concurrently, counting on shared contextual inputs from all contributors. A single profitable manipulation by a malicious actor can compromise the integrity of the whole system, creating cascading results which are each tough to detect and mitigate. For instance, on ElizaOS’s Discord server, numerous bots are deployed to help customers with debugging points or partaking usually conversations. A profitable context manipulation focusing on any one among these bots may disrupt not solely particular person interactions but additionally hurt the broader group counting on these brokers for assist
    and engagement.

    This assault exposes a core safety flaw: whereas plugins execute delicate operations, they rely completely on the LLM’s interpretation of context. If the context is compromised, even official consumer inputs can set off malicious actions. Mitigating this menace requires robust integrity checks on saved context to make sure that solely verified, trusted knowledge informs decision-making throughout plugin execution.

    In an e-mail, ElizaOS creator Shaw Walters stated the framework, like all natural-language interfaces, is designed “as a substitute, for all intents and functions, for tons and many buttons on a webpage.” Simply as an internet site developer ought to by no means embrace a button that provides guests the flexibility to execute malicious code, so too ought to directors implementing ElizaOS-based brokers rigorously restrict what brokers can do by creating enable lists that let an agent’s capabilities as a small set of pre-approved actions.

    Walters continued:

    From the surface it’d look like an agent has entry to their very own pockets or keys, however what they’ve is entry to a device they will name which then accesses these, with a bunch of authentication and validation between.

    So for the intents and functions of the paper, within the present paradigm, the scenario is considerably moot by including any quantity of entry management to actions the brokers can name, which is one thing we tackle and demo in our newest newest model of Eliza—BUT it hints at a a lot tougher to cope with model of the identical drawback once we begin giving the agent extra laptop management and direct entry to the CLI terminal on the machine it’s operating on. As we discover brokers that may write new instruments for themselves, containerization turns into a bit trickier, or we have to break it up into completely different items and solely give the general public going through agent small items of it… because the enterprise case of these things nonetheless is not clear, no person has gotten terribly far, however the dangers are the identical as giving somebody that could be very good however missing in judgment the flexibility to go on the web. Our method is to maintain the whole lot sandboxed and restricted per consumer, as we assume our brokers will be invited into many alternative servers and carry out duties for various customers with completely different info. Most brokers you obtain off Github shouldn’t have this high quality, the secrets and techniques are written in plain textual content in an surroundings file.

    In response, Atharv Singh Patlan, the lead co-author of the paper, wrote: “Our assault is ready to counteract any function based mostly defenses. The reminiscence injection shouldn’t be that it might randomly name a switch: it’s that at any time when a switch is named, it might find yourself sending to the attacker’s tackle. Thus, when the ‘admin’ calls switch, the cash might be despatched to the attacker.”



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Editor Times Featured
    • Website

    Related Posts

    America250, the nonprofit organizing the US Semiquincentennial celebration, says it received sponsorship commitments from Oracle, Amazon, Coinbase, and Palantir (Meridith McGraw/Wall Street Journal)

    June 15, 2025

    tech deals accounted for $421B of the $1.67T in global deals announced in the first five months of 2025, with 75% of tech M&A involving AI software (Milana Vinn/Reuters)

    June 15, 2025

    Anthropic details how it built its multi-agent Claude Research system, claiming significant improvements in internal evaluations over single-agent systems (Anthropic)

    June 15, 2025

    Researchers find Llama 3.1 recalls large parts of popular copyrighted books, possibly weakening AI industry claims that such memorization is fringe behavior (Timothy B. Lee/Understanding AI)

    June 15, 2025

    the global influencer marketing industry is projected to grow 36% between 2024 and 2025, reaching $33B, as brands tighten overall ad budgets (Bloomberg)

    June 15, 2025

    Taiwan imposes export controls on Huawei, SMIC, and some of their subsidiaries, restricting their access to tech and equipment necessary for AI chip production (Debby Wu/Bloomberg)

    June 14, 2025

    Comments are closed.

    Editors Picks

    User Authorisation in Streamlit With OIDC and Google

    June 15, 2025

    New contact lenses monitor glaucoma signs during sleep

    June 15, 2025

    The Mysterious Inner Workings of Io, Jupiter’s Volcanic Moon

    June 15, 2025

    America250, the nonprofit organizing the US Semiquincentennial celebration, says it received sponsorship commitments from Oracle, Amazon, Coinbase, and Palantir (Meridith McGraw/Wall Street Journal)

    June 15, 2025
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    About Us
    About Us

    Welcome to Times Featured, an AI-driven entrepreneurship growth engine that is transforming the future of work, bridging the digital divide and encouraging younger community inclusion in the 4th Industrial Revolution, and nurturing new market leaders.

    Empowering the growth of profiles, leaders, entrepreneurs businesses, and startups on international landscape.

    Asia-Middle East-Europe-North America-Australia-Africa

    Facebook LinkedIn WhatsApp
    Featured Picks

    Apple Is Pushing AI Into More of Its Products—but Still Lacks a State-of-the-Art Model

    June 10, 2025

    Visit the Arctic vault holding back-ups of great works

    May 21, 2025

    Future Trends in AI and Adult Entertainment: What to Expect

    April 19, 2025
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    Copyright © 2024 Timesfeatured.com IP Limited. All Rights.
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About us
    • Contact us

    Type above and press Enter to search. Press Esc to cancel.