Close Menu
    Trending
    • Guacamelee Dev Goes 3D With Co-Op Action Game Blighted
    • Dying Light: The Beast is coming in August with the usual mix of rooftop parkour and zombie blasting
    • BLAST.tv Austin Major Stage 2: All qualified teams
    • I replaced my JBL speaker with this surprise alternative. Here’s why it’s my new top pick
    • Google’s Veo 3 Can Make VR Slop, Too
    • Mina the Hollower, from the makers of Shovel Knight, arrives on Halloween
    • I use email aliases to hide my Gmail address, and you should too
    • Hitman Is Coming To MindsEye This Year
    Tech Trends Today
    • Home
    • Technology
    • Tech News
    • Gadgets & Tech
    • Gaming
    • Curated Tech Deals
    • More
      • Tech Updates
      • 5G Technology
      • Accessories
      • AI Technology
      • eSports
      • Mobile Devices
      • PC Gaming
      • Tech Analysis
      • Wearable Devices
    Tech Trends Today
    Home»Tech News»New attack can steal cryptocurrency by planting false memories in AI chatbots
    Tech News

    New attack can steal cryptocurrency by planting false memories in AI chatbots

    GizmoHome CollectiveBy GizmoHome CollectiveMay 24, 202504 Mins Read
    Share Facebook Twitter Pinterest Copy Link LinkedIn Tumblr Email Telegram WhatsApp
    Follow Us
    Google News Flipboard
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link

    The researchers wrote:

    The implications of this vulnerability are notably extreme provided that ElizaOSagents are designed to work together with a number of customers concurrently, counting on shared contextual inputs from all contributors. A single profitable manipulation by a malicious actor can compromise the integrity of your entire system, creating cascading results which can be each tough to detect and mitigate. For instance, on ElizaOS’s Discord server, numerous bots are deployed to help customers with debugging points or partaking typically conversations. A profitable context manipulation concentrating on any one in every of these bots might disrupt not solely particular person interactions but in addition hurt the broader neighborhood counting on these brokers for assist
    and engagement.

    This assault exposes a core safety flaw: whereas plugins execute delicate operations, they rely completely on the LLM’s interpretation of context. If the context is compromised, even reputable person inputs can set off malicious actions. Mitigating this risk requires robust integrity checks on saved context to make sure that solely verified, trusted knowledge informs decision-making throughout plugin execution.

    In an e-mail, ElizaOS creator Shaw Walters stated the framework, like all natural-language interfaces, is designed “as a alternative, for all intents and functions, for tons and plenty of buttons on a webpage.” Simply as an internet site developer ought to by no means embrace a button that offers guests the flexibility to execute malicious code, so too ought to directors implementing ElizaOS-based brokers fastidiously restrict what brokers can do by creating enable lists that allow an agent’s capabilities as a small set of pre-approved actions.

    Walters continued:

    From the surface it would seem to be an agent has entry to their very own pockets or keys, however what they’ve is entry to a device they will name which then accesses these, with a bunch of authentication and validation between.

    So for the intents and functions of the paper, within the present paradigm, the state of affairs is considerably moot by including any quantity of entry management to actions the brokers can name, which is one thing we deal with and demo in our newest newest model of Eliza—BUT it hints at a a lot more durable to cope with model of the identical drawback once we begin giving the agent extra pc management and direct entry to the CLI terminal on the machine it’s operating on. As we discover brokers that may write new instruments for themselves, containerization turns into a bit trickier, or we have to break it up into totally different items and solely give the general public going through agent small items of it… because the enterprise case of these items nonetheless is not clear, no person has gotten terribly far, however the dangers are the identical as giving somebody that may be very sensible however missing in judgment the flexibility to go on the web. Our strategy is to maintain all the things sandboxed and restricted per person, as we assume our brokers could be invited into many alternative servers and carry out duties for various customers with totally different data. Most brokers you obtain off Github shouldn’t have this high quality, the secrets and techniques are written in plain textual content in an atmosphere file.

    In response, Atharv Singh Patlan, the lead co-author of the paper, wrote: “Our assault is ready to counteract any position primarily based defenses. The reminiscence injection is just not that it might randomly name a switch: it’s that at any time when a switch is known as, it might find yourself sending to the attacker’s deal with. Thus, when the ‘admin’ calls switch, the cash will likely be despatched to the attacker.”



    Source link

    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
    GizmoHome Collective

    Related Posts

    Anthropic releases custom AI chatbot for classified spy work

    June 6, 2025

    Millions of low-cost Android devices turn home networks into crime platforms

    June 6, 2025

    China’s Hainan province tests letting some corporate users bypass the Great Firewall and access the global internet, as it seeks to become a free-trade port (Ben Jiang/South China Morning Post)

    June 6, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Best Buy Offers HP 14-Inch Chromebook for Almost Free for Memorial Day, Nowhere to be Found on Amazon

    May 22, 2025

    The Best Sleeping Pads For Campgrounds—Our Comfiest Picks (2025)

    May 22, 2025

    Time has a new look: HUAWEI WATCH 5 debuts with exclusive watch face campaign

    May 22, 2025
    Latest Posts
    Categories
    • 5G Technology
    • Accessories
    • AI Technology
    • eSports
    • Gadgets & Tech
    • Gaming
    • Mobile Devices
    • PC Gaming
    • Tech Analysis
    • Tech News
    • Tech Updates
    • Technology
    • Wearable Devices
    Most Popular

    Best Buy Offers HP 14-Inch Chromebook for Almost Free for Memorial Day, Nowhere to be Found on Amazon

    May 22, 2025

    The Best Sleeping Pads For Campgrounds—Our Comfiest Picks (2025)

    May 22, 2025

    Time has a new look: HUAWEI WATCH 5 debuts with exclusive watch face campaign

    May 22, 2025
    Our Picks

    Yooka-Laylee developers Playtonic announce layoffs: “the landscape is shifting, and with it, so must we”

    May 30, 2025

    Marvel Rivals Future Foundation skins: Everything we know about the cosmetics

    June 2, 2025

    Skylines II delays Bridges & Ports DLC to Q4

    May 27, 2025
    Categories
    • 5G Technology
    • Accessories
    • AI Technology
    • eSports
    • Gadgets & Tech
    • Gaming
    • Mobile Devices
    • PC Gaming
    • Tech Analysis
    • Tech News
    • Tech Updates
    • Technology
    • Wearable Devices
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About us
    • Contact us
    • Curated Tech Deals
    Copyright © 2025 Gizmohome.co All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.