AI-powered crypto buying and selling assistant Bankr mentioned it disabled transactions after figuring out an attacker who gained entry to at the least 14 wallets, with customers reporting that as a lot as $150,000 in crypto was drained from some wallets.
In an X put up on Tuesday, Bankr mentioned it was investigating studies that a number of wallets had been compromised and that transaction exercise, together with swaps, transfers and deployments, had been disabled “out of warning” whereas the investigation continues.
“We have recognized an attacker was capable of entry 14 Bankr wallets. We have briefly locked issues down whereas we work by way of the small print. We shall be reimbursing any and all misplaced funds. Will present extra updates as we have now them,” it added.
Bankr permits customers to immediate AI to commerce, switch and launch tokens utilizing plain language moderately than a typical pockets interface. It additionally routinely creates a crypto pockets for each X deal with that interacts with its bot. Earlier this yr, somebody reportedly exploited this characteristic and tricked Grok into requesting that Bankr launch a token, then drained funds from the token right into a pockets they managed.

Supply: Bankr
Crypto hackers have been energetic in current months. Unhealthy actors stole greater than $168.6 million in crypto within the first quarter. April noticed the 2 largest hacks of the yr to date: the $280 million Drift Protocol exploit at the beginning of the month and the $292 million Kelp exploit. Extra lately, Verus Protocol’s Ethereum bridge was exploited Monday.
Social engineering assault focusing on bot could possibly be accountable
SlowMist founder Yu Xian mentioned the exploit, from Bankrbots’ personal reply, was probably a social engineering scheme focusing on the AI agent. Three recognized attacker addresses collectively maintain $440,000 in crypto.
“It was a social engineering exploit focusing on the belief layer between automated brokers—particularly an interplay between grok and Bankrbot that allowed unauthorized transaction signing,” Xian mentioned.

Supply: Yu Xian
“It looks as if a combo of social engineering exploits focusing on Grok + Bankrbot. Beforehand, the wallet-related property allotted by Bankrbot to Grok had been additionally stolen by way of an analogous combo, immediate injection exploitation,” he added.
Don’t signal transactions till additional discover: Bankr
Bankr has advisable that customers keep away from signing transactions till additional discover and warned one person that their seed phrase “is probably going within the arms of an attacker.”
Bankr additionally mentioned anybody with a compromised pockets ought to cease utilizing it, create a brand new pockets, generate a brand new seed phrase on a clear machine, transfer any remaining tokens or nonfungible tokens to the brand new deal with and revoke approvals if remaining property can’t be moved.
Associated: Aethir halts bridge exploit, guarantees compensation after $90K loss
“Attackers typically use current approvals to empty funds. Verify your units, scan your pc and telephone for malware or suspicious browser extensions. If you happen to used a software program pockets, the leak probably got here out of your machine,” Bankr added.
Losses might reportedly be as much as $150,000 per pockets
Some X customers reported that as much as $150,000 in crypto had been drained from affected wallets.
Tech entrepreneur Austen Allred mentioned a Bankr pockets linked to his Kelly Claude AI assistant challenge was amongst these compromised. The hacker stole Ether (ETH), however not one of the challenge’s memecoin stash was touched.

Supply: Austen Allred
“There’s no proof anybody aside from myself ever logged into the Bankr account; they should have accessed the keys another method,” Allred added.
Journal: The authorized battle over who can declare DeFi’s stolen tens of millions
