Hackers hid crypto wallet-stealing code inside a popular AI tool, quietly draining user funds. Security researchers have flagged the supply chain threat.Hackers hid crypto wallet-stealing code inside a popular AI tool, quietly draining user funds. Security researchers have flagged the supply chain threat.

Hackers Hide Crypto Wallet Stealer in Popular AI Tool

2026/03/28 02:29
3 min read
For feedback or concerns regarding this content, please contact us at crypto.news@mexc.com

Hackers have reportedly embedded crypto wallet-stealing malware inside a popular AI tool, allowing the malicious code to execute silently each time the tool runs. The supply chain attack highlights a growing threat vector targeting crypto users through trusted developer tools.

How Hackers Embedded Wallet-Stealing Code Inside the AI Tool

Security researchers flagged that attackers inserted wallet-draining code directly into the codebase of a widely used AI tool, according to a CryptoSlate report. The malware reportedly activates every time a user runs the compromised tool, silently targeting crypto wallet credentials and private keys.

The attack follows a supply chain compromise model, where malicious actors inject harmful code into legitimate software dependencies rather than attacking users directly. Users who installed or updated the affected tool may have unknowingly exposed their wallet data without any visible warning signs.

What Crypto Users Should Do Now

Users who recently interacted with AI-based developer tools should review their crypto wallet activity for any unauthorized transactions. As a precaution, security researchers generally recommend revoking token approvals and transferring funds to a freshly generated wallet if exposure is suspected.

No official developer response or patch has been confirmed at time of publication. Users holding assets across multiple wallets, including those who borrow against Bitcoin or maintain significant balances, should treat any compromised device as untrusted until verified clean.

Standard post-compromise steps include uninstalling the affected tool, scanning for residual malware, rotating all credentials stored on the device, and monitoring wallet addresses through a block explorer for any outbound transfers.

Supply Chain Attacks on Crypto Tools Are Growing

This incident fits a broader pattern of supply chain attacks targeting cryptocurrency users through software dependencies. In a separate case, a malicious npm package was found targeting Atomic and Exodus wallets, intercepting and rerouting user funds through tampered code.

Earlier research also uncovered a compromised Python package designed to steal credentials from developers. These incidents suggest that open-source package repositories and AI utilities are becoming preferred attack surfaces for wallet theft.

Related articles

Wondering What Crypto to Buy Now? These 4 Coins Could Boom, and One Offers 440x Potential!

Borrow Against Bitcoin for a Mortgage Without Selling

As AI tools become more integrated into crypto workflows, users tracking daily price movements or researching which tokens to buy should verify the integrity of any third-party software before granting it access to systems where wallet keys are stored. Vetting open-source dependencies and checking package signatures remain the most reliable defenses against this class of attack.

Disclaimer: This article is for informational purposes only and does not constitute financial or investment advice. Cryptocurrency and digital asset markets carry significant risk. Always do your own research before making decisions.

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact crypto.news@mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.