About 175,000 private servers are reportedly exposed to the public internet, giving hackers the opportunity to carry out their illicit activities.  The problem About 175,000 private servers are reportedly exposed to the public internet, giving hackers the opportunity to carry out their illicit activities.  The problem

Hackers are hijacking unprotected AI models to steal computing power

2026/01/30 01:45
4 min read
For feedback or concerns regarding this content, please contact us at [email protected]

About 175,000 private servers are reportedly exposed to the public internet, giving hackers the opportunity to carry out their illicit activities. 

The problem was reported by the security researchers, SentinelOne and Censys, who tracked 7.23 million observations in over 300 days. 

Hackers exploit Ollama setting

A recent report from SentinelOne and Censys found that over 175,000 private AI servers are accidentally exposed to the internet. These systems use Ollama, an open-source software that lets people run powerful AI models, like Meta’s Llama or Google’s Gemma, on their own computers instead of using a website like ChatGPT. 

By default, Ollama only talks to the computer it is installed on. However, a user can change the settings to make it easier to access remotely, which can accidentally expose the entire system to the public internet.

They tracked 7.23 million observations over nearly 300 days and discovered that while many of these AI “hosts” are temporary, about 23,000 of them stay online almost all the time. These “always-on” systems are perfect targets for hackers because they provide free, powerful hardware that is not monitored by any big tech company.

In the United States, about 18% of these exposed systems are in Virginia, likely due to the high density of data centers there. China has 30% of hosts located in Beijing. 

Surprisingly, 56% of all these exposed AI systems are running on home or residential internet connections. This is a major problem because hackers can use these home IP addresses to hide their identity. 

When a hacker sends a malicious message through someone’s home AI, it looks like it is coming from a regular person rather than a criminal botnet.

How are criminals using these hijacked AI systems?

According to Pillar Security, a new criminal network known as Operation Bizarre Bazaar is actively hunting for these exposed AI endpoints. They look for systems running on the default port 11434 that don’t require a password. Once they find one, they steal the “compute” and sell it to others who want to run AI tasks for cheap, like generating thousands of phishing emails or creating deepfake content.

Between October 2025 and January 2026, the security firm GreyNoise recorded over 91,403 attack sessions targeting these AI setups. They found two main types of attacks. 

  • The first uses a technique called Server-Side Request Forgery (SSRF) to force the AI to connect to the hacker’s own servers. 
  • The second is a massive “scanning” campaign where hackers send thousands of simple questions to find out exactly which AI model is running and what it is capable of doing.

About 48% of these systems are configured for “tool-calling.” This means the AI is allowed to interact with other software, search the web, or read files on the computer. 

If a hacker finds a system like this, they can use “prompt injection” to trick the AI. Instead of asking for a poem, they might tell the AI to “list all the API keys in the codebase” or “summarize the secret project files.” Since there is no human watching, the AI often obeys these commands.

The Check Point 2026 Cyber Security Report shows that total cyber attacks increased by 70% between 2023 and 2025. In November 2025, Anthropic reported the first documented case of an AI-orchestrated cyber espionage campaign where a state-sponsored group used AI agents to perform 80% of a hack without human help.

Several new vulnerabilities, like CVE-2025-1975 and CVE-2025-66959, were discovered just this month. They are flaws that allow hackers to crash an Ollama server by sending it a specially crafted model file. 

Because 72% of these hosts use the same specific file format called Q4_K_M, a single successful attack could take down thousands of systems at once.

Don’t just read crypto news. Understand it. Subscribe to our newsletter. It's free.

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Which Crypto Hits $1 First? Comparing ADA, DOGE & This Altcoin

Which Crypto Hits $1 First? Comparing ADA, DOGE & This Altcoin

The race to the one-dollar milestone is a frequent topic of discussion in April 2026. However, the mathematical reality for each project is very different. When
Share
Techbullion2026/04/03 20:29
For Users Who Prioritize Confidentiality In Their Transactions

For Users Who Prioritize Confidentiality In Their Transactions

The post For Users Who Prioritize Confidentiality In Their Transactions appeared on BitcoinEthereumNews.com. Verge is a privacy-focused cryptocurrency and blockchain platform designed to provide anonymous and secure transactions. XVG coin review by Coinidol.com. Privacy and anonymity A project DogeCoinDark was launched in 2014 but later in 2016 it was rebranded as Verge. The project focuses on enabling private and untraceable transactions while maintaining fast transaction speeds and a user-friendly experience. Verge employs multiple privacy mechanisms, including the use of Tor and I2P networks to obfuscate users’ IP addresses and hide transaction origins, enhancing privacy and anonymity. The Wraith Protocol of the platorm is a feature that allows users to switch between public and private ledgers, giving them the option to make transactions visible or private. By utilizing a proof-of-work (PoW) consensus algorithm and implementing technologies to enhance scalability Verge aims to provide fast transaction speeds. XVG is the native cryptocurrency of the Verge network.  The atomic swaps available on Verge, allow users to exchange XVG with other cryptocurrencies without the need for intermediaries. Moreover, it offers mobile wallets that allow users to send and receive XVG on the go. Disclaimer. This article is for informational purposes only and should not be viewed as an endorsement by Coinidol.com. The data provided is collected by the author and is not sponsored by any company or token developer. They are not a recommendation to buy or sell cryptocurrency. Readers should do their research before investing in funds. Source: https://coinidol.com/verge-xvg-token/
Share
BitcoinEthereumNews2025/09/18 17:15
Bitcoin ETFs Surge with 20,685 BTC Inflows, Marking Strongest Week

Bitcoin ETFs Surge with 20,685 BTC Inflows, Marking Strongest Week

TLDR Bitcoin ETFs recorded their strongest weekly inflows since July, reaching 20,685 BTC. U.S. Bitcoin ETFs contributed nearly 97% of the total inflows last week. The surge in Bitcoin ETF inflows pushed holdings to a new high of 1.32 million BTC. Fidelity’s FBTC product accounted for 36% of the total inflows, marking an 18-month high. [...] The post Bitcoin ETFs Surge with 20,685 BTC Inflows, Marking Strongest Week appeared first on CoinCentral.
Share
Coincentral2025/09/18 02:30

$30,000 in PRL + 15,000 USDT

$30,000 in PRL + 15,000 USDT$30,000 in PRL + 15,000 USDT

Deposit & trade PRL to boost your rewards!