Bankr, an AI-powered trading assistant that executes crypto actions via natural language prompts, said it temporarily halted transactions after detecting an attackerBankr, an AI-powered trading assistant that executes crypto actions via natural language prompts, said it temporarily halted transactions after detecting an attacker

Bankr freezes transfers after 14 wallets compromised

2026/05/20 13:14
6분 읽기
이 콘텐츠에 대한 의견이나 우려 사항이 있으시면 [email protected]으로 연락주시기 바랍니다
Bankr Freezes Transfers After 14 Wallets Compromised

Bankr, an AI-powered trading assistant that executes crypto actions via natural language prompts, said it temporarily halted transactions after detecting an attacker who gained access to at least 14 Bankr wallets. Some users reported losses reaching as high as $150,000 per compromised wallet, according to posts from the Bankr team on X. The company indicated it is investigating the intrusions and would reimburse all affected users, though no final timeline for compensation was provided.

The incident highlights the ongoing risks inherent in automated, AI-assisted crypto tools that generate wallets and execute trades on behalf of users. Bankr stated that it “temporarily locked things down” to preserve assets while it reviews the scope of the breach, and cautioned users to avoid signing transactions until further notice. The company also warned that a seed phrase exposure could be involved in at least one case, suggesting that the compromise may extend beyond a single attack vector.

Key takeaways

  • Attack surface: Bankr reports unauthorized access to 14 wallets, with transaction types including swaps, transfers, and deployments interrupted during the investigation.
  • Financial impact: Early user reports indicate losses potentially reaching $150,000 per compromised wallet, with some accounts affected across different user projects.
  • Security guidance: Bankr advised users to refrain from signing transactions, halt usage of compromised wallets, create new wallets on clean devices, generate new seed phrases, move remaining assets, and revoke approvals where possible.
  • Likely attack vector: Security researchers cited a social engineering scene targeting the trust layer between automated agents—specifically a dialogue between Grok and Bankrbot—that enabled unauthorized transaction signing.
  • Broader risk context: The incident comes amid a string of high-profile exploits in 2024, underscoring ongoing threats to bridges, wallets, and AI-assisted trading tools.

Unfolding narrative: how the breach appears to have occurred

Bankr’s public updates describe a scenario where an attacker exploited the interaction between automated agents in its ecosystem, enabling the signing of transactions without user consent. SlowMist founder Yu Xian attributed the breach to a social engineering chain involving both Grok, an AI assistant, and Bankrbot, the Bankr companion bot. In his assessment, the attacker leveraged a trust gap between the two bots to push through unauthorized actions, a pattern he described as a prompt-injection vulnerability tied to the agents’ collaboration.

Three attacker addresses were identified by researchers, collectively holding about $440,000 in various cryptocurrencies. Yu Xian noted this incident as part of a broader class of social-engineering exploits that target the “trust layer” between automated agents, allowing attackers to co-opt signing capabilities that normally require user consent. This mirrors earlier concerns about prompt-injection-style exploits in AI-enabled crypto tools, where attackers manipulate prompts and flows to bypass standard security checks.

Some observers linked the vulnerability to prior incidents involving Bankr’s ecosystem, including an episode where a Grok-Bankrbot integration was leveraged to move assets allocated to Bankr through a token-launch prompt, ultimately draining funds to an attacker-controlled wallet. The current breach, however, appears more focused on unauthorized signing rather than a single token deployment, suggesting a broader weakness in the trust chain among connected AI agents rather than a one-off misconfiguration.

Security guidance from Bankr: steps for users to take now

As a precaution, Bankr urged users not to sign transactions until it provides a further update. It also suggested that anyone with a compromised wallet should stop using that wallet, create a new one, generate a fresh seed phrase on a clean device, and transfer any remaining tokens or nonfungible tokens to the new address. Users should also revoke approvals for assets that cannot be moved, to minimize the risk of drained funds.

Bankr underscored the likelihood that attackers exploited existing approvals to siphon funds and called on users to check devices for malware and suspicious browser extensions. For those who used software wallets, Bankr warned that the leak could originate from the user’s device rather than the service itself, reinforcing the message that securing the endpoint remains critical in AI-assisted crypto workflows.

The company’s public updates also included an explicit reassurance: it plans to reimburse all lost funds. Yet the exact mechanism and timing of repayments remain to be clarified as investigations proceed. In the meantime, the incident has prompted a broader reminder to practitioners and builders: when AI agents operate with wallet-level privileges, a misstep in the prompt or a social-engineering breach can have outsized consequences.

Industry context: rising attack surface in AI-assisted crypto tools

Security researchers have repeatedly flagged the vulnerability of AI-driven trading assistants and bot-native ecosystems, where multiple automated agents share accounts, keys, or signing powers. The Bankr breach adds to a recent wave of high-profile exploits that show the sector’s fragility in the face of sophisticated social-engineering and prompt-injection techniques. In the first quarter of the year, crypto hackers reportedly stole about $168.6 million, underscoring the persistent threat environment. Notable April incidents include the Drift Protocol exploit, which saw $280 million affected, and the $292 million Kelp attack. More recently, Verus Protocol’s Ethereum bridge was reported exploited, illustrating that disruptions remain widespread across bridges, wallets, and AI-enabled interfaces.

For investors and developers, the takeaway is not only to monitor on-chain activity but to rethink how AI agents authenticate and execute critical actions. The Bankr case suggests that even when a platform claims to automate complex operations, user-initiated permissions and robust endpoint security remain essential barriers to prevent unauthorized fund movement.

What comes next: monitoring the reimbursement and security fixes

As Bankr conducts its internal audit and collaborates with security researchers, readers should watch for updates on how reimbursements will be processed and whether new safeguards will be introduced to harden the bot ecosystem against social-engineering and prompt-injection exploits. The company’s commitment to reimbursing losses is a favorable signal, but the timeline and scope will determine the practical impact for affected users.

In the broader market, the incident reinforces the need for users of AI-assisted finance tools to adopt best practices: isolate seed phrases on secure devices, minimize cross-app approvals, and remain cautious about signing transactions prompted by bots. For builders, the episode adds urgency to develop fail-safes around multi-agent authorization flows and to implement transparent, auditable prompts and signing processes that can be reviewed by users and security teams alike.

As the investigation unfolds, the crypto community will be looking for concrete steps that reduce the risk of similar breaches while preserving the productivity gains that AI-powered trading assistants aim to deliver. The balance between automation and security remains the defining challenge for this rapidly evolving segment of the ecosystem.

Readers should expect ongoing updates on Bankr’s investigation, the scope of compromised assets, and any new security measures designed to curb social-engineering exploits within AI-enabled trading workflows.

This article was originally published as Bankr freezes transfers after 14 wallets compromised on Crypto Breaking News – your trusted source for crypto news, Bitcoin news, and blockchain updates.

시장 기회
Gensyn 로고
Gensyn 가격(AI)
$0.03488
$0.03488$0.03488
-0.02%
USD
Gensyn (AI) 실시간 가격 차트
면책 조항: 본 사이트에 재게시된 글들은 공개 플랫폼에서 가져온 것으로 정보 제공 목적으로만 제공됩니다. 이는 반드시 MEXC의 견해를 반영하는 것은 아닙니다. 모든 권리는 원저자에게 있습니다. 제3자의 권리를 침해하는 콘텐츠가 있다고 판단될 경우, [email protected]으로 연락하여 삭제 요청을 해주시기 바랍니다. MEXC는 콘텐츠의 정확성, 완전성 또는 시의적절성에 대해 어떠한 보증도 하지 않으며, 제공된 정보에 기반하여 취해진 어떠한 조치에 대해서도 책임을 지지 않습니다. 본 콘텐츠는 금융, 법률 또는 기타 전문적인 조언을 구성하지 않으며, MEXC의 추천이나 보증으로 간주되어서는 안 됩니다.

No Chart Skills? Still Profit

No Chart Skills? Still ProfitNo Chart Skills? Still Profit

Copy top traders in 3s with auto trading!