Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsHackers Hijack Exposed LLM Endpoints in Bizarre Bazaar Operation
Hackers Hijack Exposed LLM Endpoints in Bizarre Bazaar Operation
CybersecurityAI

Hackers Hijack Exposed LLM Endpoints in Bizarre Bazaar Operation

•January 28, 2026
0
BleepingComputer
BleepingComputer•Jan 28, 2026

Companies Mentioned

Pillar Security

Pillar Security

GreyNoise

GreyNoise

OpenAI

OpenAI

Censys

Censys

Discord

Discord

PayPal

PayPal

PYPL

Shodan

Shodan

Telegram

Telegram

Why It Matters

LLM hijacking creates costly inference charges, data leakage, and new lateral‑movement vectors, forcing enterprises to secure AI deployments.

Key Takeaways

  • •35,000 attacks recorded across 40 days.
  • •Attackers target unauthenticated Ollama, OpenAI‑compatible APIs.
  • •Monetization via crypto mining, API resale, data theft.
  • •Supply chain: scanner, validator, reseller on silver.inc.
  • •Exploitation begins hours after Shodan/Censys discovery.

Pulse Analysis

The rapid adoption of large language models has outpaced security best practices, leaving many deployments exposed to the public internet. Pillar Security’s investigation of the “Bizarre Bazaar” operation reveals that attackers can locate vulnerable LLM endpoints within minutes using services like Shodan and Censys, then launch automated sessions that harvest compute cycles and model outputs. Over a 40‑day window the researchers observed more than 35,000 intrusion attempts, targeting common misconfigurations such as unauthenticated Ollama ports (11434) and OpenAI‑compatible APIs (8000). This marks one of the first documented, actor‑attributed LLMjacking campaigns.

The financial lure behind hijacked AI services is multifaceted. By siphoning inference power, criminals can fuel cryptocurrency mining operations that consume significant GPU resources, while the resale of API keys on darknet platforms like silver.inc generates direct revenue in crypto or PayPal. Additionally, exfiltrated prompt data often contains proprietary information, giving threat actors leverage for extortion or competitive espionage. Pillar’s supply‑chain model—scanner bots, validation scripts, and a reseller marketplace—demonstrates a mature criminal ecosystem that treats AI infrastructure as a commodity comparable to traditional botnets.

Enterprises must treat LLM endpoints as high‑value assets, enforcing strong authentication, network segmentation, and continuous monitoring. Deployments should be hidden behind zero‑trust gateways, and any public‑facing API must require API keys, rate limiting, and audit logging. Cloud providers are beginning to issue guidance and detection rules for anomalous inference traffic, but the onus remains on organizations to audit staging and development environments that often expose default ports. As AI services become integral to business workflows, the “Bizarre Bazaar” episode serves as a warning that unsecured models will increasingly attract sophisticated, profit‑driven adversaries.

Hackers hijack exposed LLM endpoints in Bizarre Bazaar operation

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...