Hackers hid crypto wallet-stealing code inside a popular AI tool, quietly draining user funds. Security researchers have flagged the supply chain threat.Hackers hid crypto wallet-stealing code inside a popular AI tool, quietly draining user funds. Security researchers have flagged the supply chain threat.

Hackers Hide Crypto Wallet Stealer in Popular AI Tool

2026/03/28 02:29
3분 읽기
이 콘텐츠에 대한 의견이나 우려 사항이 있으시면 crypto.news@mexc.com으로 연락주시기 바랍니다

Hackers have reportedly embedded crypto wallet-stealing malware inside a popular AI tool, allowing the malicious code to execute silently each time the tool runs. The supply chain attack highlights a growing threat vector targeting crypto users through trusted developer tools.

How Hackers Embedded Wallet-Stealing Code Inside the AI Tool

Security researchers flagged that attackers inserted wallet-draining code directly into the codebase of a widely used AI tool, according to a CryptoSlate report. The malware reportedly activates every time a user runs the compromised tool, silently targeting crypto wallet credentials and private keys.

The attack follows a supply chain compromise model, where malicious actors inject harmful code into legitimate software dependencies rather than attacking users directly. Users who installed or updated the affected tool may have unknowingly exposed their wallet data without any visible warning signs.

What Crypto Users Should Do Now

Users who recently interacted with AI-based developer tools should review their crypto wallet activity for any unauthorized transactions. As a precaution, security researchers generally recommend revoking token approvals and transferring funds to a freshly generated wallet if exposure is suspected.

No official developer response or patch has been confirmed at time of publication. Users holding assets across multiple wallets, including those who borrow against Bitcoin or maintain significant balances, should treat any compromised device as untrusted until verified clean.

Standard post-compromise steps include uninstalling the affected tool, scanning for residual malware, rotating all credentials stored on the device, and monitoring wallet addresses through a block explorer for any outbound transfers.

Supply Chain Attacks on Crypto Tools Are Growing

This incident fits a broader pattern of supply chain attacks targeting cryptocurrency users through software dependencies. In a separate case, a malicious npm package was found targeting Atomic and Exodus wallets, intercepting and rerouting user funds through tampered code.

Earlier research also uncovered a compromised Python package designed to steal credentials from developers. These incidents suggest that open-source package repositories and AI utilities are becoming preferred attack surfaces for wallet theft.

Related articles

Wondering What Crypto to Buy Now? These 4 Coins Could Boom, and One Offers 440x Potential!

Borrow Against Bitcoin for a Mortgage Without Selling

As AI tools become more integrated into crypto workflows, users tracking daily price movements or researching which tokens to buy should verify the integrity of any third-party software before granting it access to systems where wallet keys are stored. Vetting open-source dependencies and checking package signatures remain the most reliable defenses against this class of attack.

Disclaimer: This article is for informational purposes only and does not constitute financial or investment advice. Cryptocurrency and digital asset markets carry significant risk. Always do your own research before making decisions.

면책 조항: 본 사이트에 재게시된 글들은 공개 플랫폼에서 가져온 것으로 정보 제공 목적으로만 제공됩니다. 이는 반드시 MEXC의 견해를 반영하는 것은 아닙니다. 모든 권리는 원저자에게 있습니다. 제3자의 권리를 침해하는 콘텐츠가 있다고 판단될 경우, crypto.news@mexc.com으로 연락하여 삭제 요청을 해주시기 바랍니다. MEXC는 콘텐츠의 정확성, 완전성 또는 시의적절성에 대해 어떠한 보증도 하지 않으며, 제공된 정보에 기반하여 취해진 어떠한 조치에 대해서도 책임을 지지 않습니다. 본 콘텐츠는 금융, 법률 또는 기타 전문적인 조언을 구성하지 않으며, MEXC의 추천이나 보증으로 간주되어서는 안 됩니다.