I just read something that should concern anyone using AI assistants with their crypto wallets. It turns out that more than 300 malicious plugins have been discovered, specifically designed to steal wallet data and exchange account information. And the worst part is that you probably don’t even realize it’s happening.



Look, AI is becoming increasingly integrated into our computers. It’s no longer just a chatbot: now they are digital agents with system-level access. They can read local files, execute commands, access browser data, connect to wallets, handle trading tools. Basically, they hold the keys to your digital house.

The problem is that when an attacker infects an AI tool, they gain access to all of that. And for crypto users, this is especially dangerous. Researchers found that these malicious plugins can steal seed phrases, private key files, trading passwords, 2FA codes, API keys. All silently, without pop-up windows, without warnings. The malware runs in the background, collects wallet data without you noticing, and sends everything to the attackers.

The insidious part is how it works. Attackers can directly read your wallet files, obtain exchange credentials, capture verification codes, reset passwords. And they don’t need your active permission. It’s as if someone had a copy of all your keys.

That’s why AI assistants have become targets. They have more permissions than any other software. Access to file systems, browsers, email, wallets, APIs. They are automated executors with admin privileges. Once compromised, it’s like the attackers control your entire computer.

If your AI assistant is infected, the risks are real. A compromised mnemonic phrase means total control of the wallet. Attackers can restore it and transfer all your assets. Or take over your exchange account: log in with your credentials, change security settings, withdraw funds. Stolen API keys allow malicious operations. And if they compromise your email, they compromise multiple accounts because email is the foundation of all account security.

So what to do? First, never store seed phrases or private keys in AI tools. No entering them into chats, no saving them in text files. Use offline storage and hardware wallets. Don’t allow AI tools to access wallet files.

Second, use a separate device for critical operations. Don’t install experimental AI tools on the same device where you operate. Keep devices separate.

Third, be careful with which plugins you install. Especially plugins from unofficial sources or unverified GitHub projects. Attackers use fake plugins and fake tools to deploy malware. If you need to use API keys, restrict permissions and disable withdrawals.

Fourth, enable all available security layers. Login passwords, trading passwords, two-factor authentication, Passkeys. Each additional layer reduces risks.

And finally, regularly verify your device’s security. Check what software is installed, what extensions your browser has, if there’s abnormal login activity.

The reality is that any software with system permissions can become an entry point for attacks. And in crypto, once your wallet data or credentials are compromised, assets can be lost permanently. It’s not paranoia; it’s common sense.
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
Add a comment
Add a comment
No comments
  • Pin