Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»WiFi / Internet & Networking»Crooks are hijacking and reselling AI infrastructure: Report
    WiFi / Internet & Networking

    Crooks are hijacking and reselling AI infrastructure: Report

    adminBy adminJanuary 29, 2026No Comments2 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Computer hacker silhouette of hooded, man using laptop and monitor for steal data. Cyber crime concept.
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Threat actors may not only be stealing AI access from fully developed applications, the researchers added. A developer trying to prototype an app, who, through carelessness, doesn’t secure a server, could be victimized through credential theft as well.

    Joseph Steinberg, a US-based AI and cybersecurity expert, said the report is another illustration of how new technology like artificial intelligence creates new risks and the need for new security solutions beyond the traditional IT controls.

    CSOs need to ask themselves if their organization has the skills needed to safely deploy and protect an AI project, or whether the work should be outsourced to a provider with the needed expertise.

    Mitigation

    Pillar Security said CSOs with externally-facing LLMs and MCP servers should:

    • enable authentication on all LLM endpoints. Requiring authentication eliminates opportunistic attacks. Organizations should verify that Ollama, vLLM, and similar services require valid credentials for all requests;
    • audit MCP server exposure. MCP servers must never be directly accessible from the internet. Verify firewall rules, review cloud security groups, confirm authentication requirements;
    • block known malicious infrastructure.  Add the 204.76.203.0/24 subnet to deny lists. For the MCP reconnaissance campaign, block AS135377 ranges;
    • implement rate limiting. Stop burst exploitation attempts. Deploy WAF/CDN rules for AI-specific traffic patterns;
    • audit production chatbot exposure. Every customer-facing chatbot, sales assistant, and internal AI agent must implement security controls to prevent abuse.

    Don’t give up

    Despite the number of news stories in the past year about AI vulnerabilities, Meghu said the answer is not to give up on AI, but to keep strict controls on its usage. “Do not just ban it, bring it into the light and help your users understand the risk, as well as work on ways for them to use AI/LLM in a safe way that benefits the business,” he advised.

    “It is probably time to have dedicated training on AI use and risk,” he added. “Make sure you take feedback from users on how they want to interact with an AI service and make sure you support and get ahead of it. Just banning it sends users into a shadow IT realm, and the impact from this is too frightening to risk people hiding it. Embrace and make it part of your communications and planning with your employees.”

    Crooks hijacking infrastructure Report reselling
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleMesh Security Raises $12 Million for CSMA Platform
    Next Article Firefox Nightly for Developers 149.0a1 APK Download by Mozilla
    admin
    • Website

    Related Posts

    When 170,000 people show up: Network refresh readies Churchill Downs for Kentucky Derby

    May 1, 2026

    HPE expands ProLiant line with rugged edge servers

    April 30, 2026

    The SEO Services Report

    April 30, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Microsoft fixes Remote Desktop warnings displaying incorrectly

    May 1, 2026

    Two US Security Experts Sentenced to Prison for Helping Ransomware Gang

    May 1, 2026

    AI Overviews Clicks Get Tested, Earnings Tell Two Stories

    May 1, 2026

    Here’s What Comes Next for Cyber

    May 1, 2026
    Categories
    • Blogging (71)
    • Cybersecurity (1,620)
    • Privacy & Online Earning (193)
    • SEO & Digital Marketing (1,000)
    • Tech Tools & Mobile / Apps (1,796)
    • WiFi / Internet & Networking (258)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Microsoft fixes Remote Desktop warnings displaying incorrectly

    May 1, 2026

    Two US Security Experts Sentenced to Prison for Helping Ransomware Gang

    May 1, 2026

    AI Overviews Clicks Get Tested, Earnings Tell Two Stories

    May 1, 2026
    Most Popular
    • Microsoft fixes Remote Desktop warnings displaying incorrectly
    • Two US Security Experts Sentenced to Prison for Helping Ransomware Gang
    • AI Overviews Clicks Get Tested, Earnings Tell Two Stories
    • Here’s What Comes Next for Cyber
    • Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft
    • Your new 2026 search strategy
    • Open-source privacy proxy masks PII before prompts reach external AI services
    • US ransomware negotiators get 4 years in prison over BlackCat attacks
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.