Hackers target misconfigured proxies to access paid LLM services
嗯,用户让我帮忙总结一篇文章,控制在一百个字以内,而且不需要用“文章内容总结”这样的开头。首先,我需要理解文章的主要内容。文章讲的是威胁行为者在寻找配置错误的代理服务器,以访问大型语言模型(LLM)服务。他们进行了大规模的扫描,使用了低噪声提示来避免触发安全警报。GreyNoise报告提到有两个活动,其中一个可能来自安全研究人员或赏金猎人,利用OAST技术进行漏洞测试。攻击者的目标包括多个主要提供商的模型,并且他们进行了大量的枚举活动。 接下来,我需要将这些信息浓缩到100字以内。重点包括:威胁行为者、寻找配置错误的代理服务器、访问LLM服务、大规模扫描、低噪声提示、GreyNoise报告、OAST技术、目标模型以及潜在恶意意图。 然后,我需要用简洁的语言把这些点连贯地表达出来。确保不遗漏关键信息,同时保持句子流畅。 最后,检查字数是否在限制内,并调整用词以确保准确性和简洁性。 </think> 威胁行为者正系统性地寻找配置错误的代理服务器以访问商业大型语言模型(LLM)服务。攻击者已探测超73个LLM端点并生成8万余次会话,使用低噪声提示避免触发安全警报。GreyNoise报告称活动可能来自安全研究人员或赏金猎人,利用OAST技术进行漏洞测试。 2026-1-9 20:0:25 Author: www.bleepingcomputer.com(查看原文) 阅读量:4 收藏

Hackers target misconfigured proxies to access paid LLM services

Threat actors are systematically hunting for misconfigured proxy servers that could provide access to commercial large language model (LLM) services.

In an ongoing campaign that started in late December, the attackers have probed more than 73 LLM endpoints and generated over 80,000 sessions.

According to threat monitoring platform GreyNoise, the threat actors use low-noise prompts to query endpoints in an attempt to determine the accessed AI model without triggering a security alert.

Wiz

Grey-hat operation

GreyNoise says in a report that over the past four months, its Ollama honeypot caught a total of 91,403 attacks that are part of two distinct campaigns.

One operation started in October and is still active, with a spike of 1,688 sessions over 48 hours around Christmas. It exploits server-side request forgery (SSRF) vulnerabilities that allow the actor to force a server to connect to an attacker-controlled external infrastructure.

According to the researchers, the attacker behind this operation achieved its goals by using Ollama's model pull functionality to inject malicious registry URLs and Twilio SMS webhook integrations through the MediaURL parameter.

However, based on the tools used, GreyNoise points out that the activity likely originates from security researchers or bug bounty hunters, as they used ProjectDiscovery's OAST (Out-of-band Application Security Testing) infrastructure, which is typically used in vulnerability assessments.

"OAST callbacks are standard vulnerability research techniques. But the scale and Christmas timing suggest grey-hat operations pushing boundaries" - GreyNoise

Telemetry data revealed that the campaign originated from 62 IP addresses across 27 countries that exhibit VPS-like characteristics rather than signs of botnet operation.

Activity timeline
Activity timeline
Source: GreyNoise

Threat actor activity

GreyNoise observed a second campaign starting on December 28 and detected a high-volume enumeration effort to identify exposed or misconfigured LLM endpoints.

Over 11 days, the activity generated 80,469 sessions, with two IP addresses systematically probing over 73 model endpoints using both OpenAI-compatible and Google Gemini API formats.

The list of targeted models included those from all major providers, including: 

  • OpenAI (GPT-4o and variants)
  • Anthropic (Claude Sonnet, Opus, Haiku)
  • Meta (Llama 3.x)
  • DeepSeek (DeepSeek-R1)
  • Google (Gemini)
  • Mistral
  • Alibaba (Qwen)
  • xAI (Grok)

To avoid security alerts when testing access to an LLM service, the attacker used harmless queries such as short greetings, empty inputs, or factual questions.

GreyNoise says that the scanning infrastructure has been previously associated with widespread vulnerability exploitation activity, which suggests that the enumeration is part of an organized reconnaissance effort to catalog accessible LLM services.

The GreyNoise report does not claim observed exploitation after discovery, data theft, or model abuse, but the activity is still indicative of malicious intentions.

"Eighty thousand enumeration requests represent investment," warn the researchers, adding that "threat actors don't map infrastructure at this scale without plans to use that map."

To defend against this activity, it is recommended to restrict Ollama model pulls to trusted registries, apply egress filtering, and block known OAST callback domains at the DNS level.

Measures against enumeration include rate-limiting suspicious ASNs and monitoring for JA4 network fingerprints linked to automated scanning tools.

Wiz

Secrets Security Cheat Sheet: From Sprawl to Control

Whether you're cleaning up old keys or setting guardrails for AI-generated code, this guide helps your team build securely from the start.

Get the cheat sheet and take the guesswork out of secrets management.


文章来源: https://www.bleepingcomputer.com/news/security/hackers-target-misconfigured-proxies-to-access-paid-llm-services/
如有侵权请联系:admin#unsafe.sh