BTCC / BTCC Square / D3C3ntr4l /
SlowMist Warns: AI Trading Agents Can Be Hacked to Drain Funds via Rapid Injection Attacks (2026)

SlowMist Warns: AI Trading Agents Can Be Hacked to Drain Funds via Rapid Injection Attacks (2026)

Author:
D3C3ntr4l
Published:
2026-03-18 21:13:02
20
1


In a chilling revelation, cybersecurity firm SlowMist has exposed how AI-powered trading agents are being exploited by hackers to siphon funds through "Indirect Message Injection" attacks. With losses already exceeding $500,000 in recent incidents, the crypto community is scrambling to implement five-layer security protocols. From hardware keys to .agentignore files, we break down the urgent countermeasures every trader needs to know in this age of AI-driven vulnerabilities.

The Rising Threat: How Hackers Are Outsmarting AI Trading Bots

Remember when hackers had to trick humans? Those days are gone. Now, they're bypassing users entirely and manipulating the AI agents themselves. The solana Lobstar token heist ($441,000) and Polymarket breach ($500,000+) prove these aren't theoretical risks - they're happening right now in 2026. What makes these attacks particularly insidious is their two-phase malware approach. The first layer appears legitimate, while the hidden payload steals everything from browser cookies to SSH keys. As one BTCC security analyst told me, "It's like giving a burglar your house keys and then leaving for vacation while they rob you slowly."

ClawJacked: The CVSS 8.0+ Vulnerability Keeping Experts Awake

Oasis Security's recent report sent shockwaves through the industry with its discovery of ClawJacked - a flaw so severe it lets malicious websites hijack locally running AI agents through simple browser visits. During my research, I analyzed SlowMist's findings on ClawHub where 10% of plugins contained this double-agent malware. The scariest part? These compromised agents can operate undetected for weeks, especially when set to 24/7 trading modes. It's the digital equivalent of a sleeper cell in your trading terminal.

The Five-Layer Defense: Bitget's Blueprint for AI Agent Security

After interviewing multiple exchange security teams, I've distilled their countermeasures into actionable steps:

FIDO2/WebAuthn isn't optional anymore. These physical keys use public-private encryption that makes phishing attempts laughably ineffective. Even if you're tricked into visiting a fake login page, the key won't budge.

Never give your main account API keys to an AI. Create dedicated subaccounts with strictly limited funds - think of it as giving your bot an allowance rather than your credit card.

This old-school tactic remains crucial. Only allow trades from pre-approved server addresses, turning your trading bot into a digital fortress with a very small door.

Like a .gitignore for security, this prevents agents from accessing sensitive local files. One developer described it as "putting blinkers on a racehorse - they only see the track, not the spectators."

The Nov1.ai experiment proved even advanced models like GPT-5 can suffer "analysis paralysis," losing 60% capital in weeks. Regular check-ins aren't just prudent - they're profit-preserving.

When AI Goes Rogue: The Unintended Consequences of Automation

The Polymarket December 2025 breach revealed a harsh truth - even two-factor authentication can fail when AI agents are involved. Magic Labs' authentication system was bypassed in what some are calling "the first AI-assisted bank heist." Meanwhile, Gemini's case shows the flip side: over-trading bots that rack up commissions until they erase all profits. As one trader lamented on CryptoTwitter, "My bot made 100 trades yesterday - 99 were just to pay its own salary."

FAQs: Your Burning Questions Answered

How are hackers exploiting AI trading agents?

Through Indirect Message Injection attacks that deliver two-phase malware - first appearing legitimate, then downloading payloads that steal credentials and cookies.

What's the biggest vulnerability right now?

ClawJacked (CVSS 8.0+), which allows website-driven hijacking of locally running AI agents through browser visits.

How much has been stolen via these methods?

Documented losses exceed $500,000 in 2025-2026, including the $441,000 Solana Lobstar incident and Polymarket breaches.

Are hardware keys really necessary?

Absolutely. FIDO2/WebAuthn keys prevent phishing by design - they won't authenticate on fake sites even if users are tricked.

Can't I just rely on two-factor authentication?

2FA failed in the Polymarket hack. Layered security including subaccounts and IP whitelisting is now essential.

|Square

Get the BTCC app to start your crypto journey

Get started today Scan to join our 100M+ users

All articles reposted on this platform are sourced from public networks and are intended solely for the purpose of disseminating industry information. They do not represent any official stance of BTCC. All intellectual property rights belong to their original authors. If you believe any content infringes upon your rights or is suspected of copyright violation, please contact us at [email protected]. We will address the matter promptly and in accordance with applicable laws.BTCC makes no explicit or implied warranties regarding the accuracy, timeliness, or completeness of the republished information and assumes no direct or indirect liability for any consequences arising from reliance on such content. All materials are provided for industry research reference only and shall not be construed as investment, legal, or business advice. BTCC bears no legal responsibility for any actions taken based on the content provided herein.