Bankr, an AI-driven trading bot running on the Base blockchain, has confirmed that it lost funds from 14 internal wallets as a result of a “sophisticated” socialBankr, an AI-driven trading bot running on the Base blockchain, has confirmed that it lost funds from 14 internal wallets as a result of a “sophisticated” social

Bankr Exploit Exposes AI Trading Risks As Platform Confirms Wallet Breach And Full User Compensation

2026/05/20 18:47
6분 읽기
이 콘텐츠에 대한 의견이나 우려 사항이 있으시면 crypto.news@mexc.com으로 연락주시기 바랍니다

Bankr, an AI-driven trading bot running on the Base blockchain, has confirmed that it lost funds from 14 internal wallets as a result of a “sophisticated” social engineering hacking attempt.

The losses incurred by this breach are estimated to be at least $170,000, which necessitated an immediate response from the team and a halt of the affected systems to contain the incident before undertaking an in-depth investigation.

Bankr also reiterated to its users that “all funds lost due to the breach will be compensated in full” in an official statement. While the platform focused on confirming the magnitude of this exploit and fortifying its security features, it reiterated that mitigating user harm remains a top priority.

This comes at a time when there is increasing concern over the security of AI-enabled finance systems, where the addition of layers of automation creates new attack vectors that classic smart contract audits may not detect.

Attack Utilizes Trust Layer Between AI Systems

Initial analysis suggests that this attack is not using normal smart contract exploits. Instead, it worked to exploit the trust relationship in the communication layer binding AI components together; namely, between Grok and Bankrbot’s automated execution engine.

According to slowmist co-founder, Yu Xian, the attacker used a trust layer vulnerability, and modified the output of one AI model so that another model interprets it as a valid command. The hack avoided normal verification checks that typically prevent unauthorized actions.

The explanation that Yu Xian provides can be understood as a core failure mode in evolving AI-driven protocols: if not rigorously constrained, implicit trust assumptions between models make great fodder for weaponization. Grok took the input that the attacker provided, structured it into text and Bankrbot blindly accepted any output that came from Grok as legitimate enough to execute unapproved transaction signatures.

Encoded Instructions Bypass Prompts Protection

An especially interesting part about this attack is the means by which you delivered the malicious instructions. The attacker used prompt injection, hiding commands in different formats (e.g. Morse code) that were encoded.

You put those encoded messages into the AI system and Grok converts them to a clear, readable message. The most critical thing, the system was unable to distinguish between benign decoded material and malicious intent. Bankrbot was then able to blindly execute the command as its output looked valid enough.

This chain reaction manifests a new vector of attack across AI-embedded systems where language models can become pseudo translators for antagonistic payloads. With attackers hiding malicious commands behind odd encodings, they can escape detection by filters that detect explicit attacks.

In this case, the offense ended up being abused for continued use of transferring funds that were spread over 14 internal wallets without raising any alarms in real-time.

14 Internal Wallets Drained by Unauthorized Transactions

14 internal wallets accessible by the platform were found to have been used for this unauthorized withdrawal in the breach. While the total amount lost, around $ 170,000, is small by more respectable DeFi exploit standards, the consequences are significant.

This particular incident highlights that, unlike in traditional attacks where operational weaknesses are at the code level and can be exploited, here it is how AI systems perform their function that can become a foundational failure. Rather than compromise the security of the blockchain and its smart contracts directly, an attacker aimed at compromising the decision making layer located above them.

This paradigm of attack may usher in a new age for cryptosecurity, where not only the code which needs to be safely written, but also requires the rigorous application of AI alignment techniques; it needs to ensure input validation on all forms of input; and there have been formal checks across systems.

Additionally, the incident poses urgent questions about how many other AI-based protocols might unintentionally have similar vulnerabilities.

Bankr Pledges Total Refund and Continued Inquiry

To address the breach, Bankr has pledged to compensate affected users in full. The platform has not yet shared specific dates or ways of reimbursement but promises to share updates as the investigation progresses.

With user confidence being essential for early-stage AI-financed platforms, the move to be proactive in this regard makes sense. Bankr is absorbing the losses on its own balance sheet, which shows financial strength and the willingness to be accountable.

At the same time, the platform has secured compromised systems to prevent additional exploitation and is undergoing a full review of its architecture. In this review this involves rethinking how the layers of AI outputs undergo validation before an on-chain transaction is initiated.

Bankr’s reaction illustrates a broader trend across the industry: rapid containment of incidents, transparency with users affected and user compensation are now an integral part of crisis management in crypto.

The trend toward AI-assisted abuses is raising alarms in the industry.

This comes as just a day earlier another AI-enabled platform, Echo, was also subjected to a similar attack. Combined, this implies an emerging trend: adversaries are looking to attack the AI layers rather than the base blockchain infrastructure.

Such evolution is a strong challenge to developers and those doing security research. Conventional audit frameworks focus on smart contract security, while AI-enhanced systems need even further protective mechanisms, layer upon layer of protection in the form of prompt filtering, contextual verification, and clear demarcation between interpretation and execution.

The stakes have been raised as AI continues to infiltrate the worlds of trading, asset management and DeFi automation. Protocols that neglect to secure these AI layers face the dangers of exposing users to new types of exploits.

Meanwhile, the Bankr breach is a warning: while AI innovation continues to accelerate and be used in various industries, security paradigms also need to transform. Without this balance, enhancements that are intended to make us work smarter not harder could become the ultimate vector for our next generation attacks.

Disclosure: This is not trading or investment advice. Always do your research before buying any cryptocurrency or investing in any services.

Follow us on Twitter @themerklehash to stay updated with the latest Crypto, NFT, AI, Cybersecurity, and Metaverse news!

The post Bankr Exploit Exposes AI Trading Risks As Platform Confirms Wallet Breach And Full User Compensation appeared first on The Merkle News.

시장 기회
Gensyn 로고
Gensyn 가격(AI)
$0.0334
$0.0334$0.0334
+5.72%
USD
Gensyn (AI) 실시간 가격 차트

SPACEX(PRE) Launchpad Is Live

SPACEX(PRE) Launchpad Is LiveSPACEX(PRE) Launchpad Is Live

Start with $100 to share 6,000 SPACEX(PRE)

면책 조항: 본 사이트에 재게시된 글들은 공개 플랫폼에서 가져온 것으로 정보 제공 목적으로만 제공됩니다. 이는 반드시 MEXC의 견해를 반영하는 것은 아닙니다. 모든 권리는 원저자에게 있습니다. 제3자의 권리를 침해하는 콘텐츠가 있다고 판단될 경우, crypto.news@mexc.com으로 연락하여 삭제 요청을 해주시기 바랍니다. MEXC는 콘텐츠의 정확성, 완전성 또는 시의적절성에 대해 어떠한 보증도 하지 않으며, 제공된 정보에 기반하여 취해진 어떠한 조치에 대해서도 책임을 지지 않습니다. 본 콘텐츠는 금융, 법률 또는 기타 전문적인 조언을 구성하지 않으며, MEXC의 추천이나 보증으로 간주되어서는 안 됩니다.

No Chart Skills? Still Profit

No Chart Skills? Still ProfitNo Chart Skills? Still Profit

Copy top traders in 3s with auto trading!