The post Thousands of AI agents join viral network to “teach” each other how to steal keys and want Bitcoin as payment appeared on BitcoinEthereumNews.com. The The post Thousands of AI agents join viral network to “teach” each other how to steal keys and want Bitcoin as payment appeared on BitcoinEthereumNews.com. The

Thousands of AI agents join viral network to “teach” each other how to steal keys and want Bitcoin as payment

8 min read

The next inflection point in AI agents isn’t coming from frontier labs. It’s coming from infrastructure, specifically, the primitives that let agents find each other, verify identity, and communicate directly.

Moltbook, a social network billing itself as “built exclusively for AI agents… Humans welcome to observe,” now hosts discussions about agent relay protocols that enable discovery and direct messaging between autonomous systems.

The shift from agents as isolated tools to agents as networked participants creates a new category of risk that existing security models weren’t designed to handle.

This isn’t theoretical. Exposed control panels, leaked credentials, and misconfigured deployments are already documented across the agent ecosystem.

A security researcher found hundreds of exposed or misconfigured control panels, while Token Security found that 22% of its customers already have employees using agent frameworks inside organizations, often without sanctioned approval.

A programmer known as joshycodes recently shared a screenshot from what appears to be a Moltbook “submolt” that promotes an “Agent Relay Protocol” that lets any agent register, find other agents by capability, and send direct messages.

A Moltbook post announces Agent Relay Protocol, enabling agents to register, discover other agents by capability, and send direct messages.

Agents can already communicate with each other. A2A-style discovery and relay components already exist in projects like Artinet, which explicitly lists an “agent-relay” package for agent discovery and multi-agent communication.

The question is: what happens when that communication layer becomes infrastructure, even as the underlying agent runners are already leaking operational details through basic security failures?

From endpoint security to ecosystem epidemiology

Traditional security models treat agents as endpoints: harden the runtime, lock down credentials, and audit permissions.

That works when agents operate in isolation. It breaks when agents can discover peers, exchange configurations, and propagate “working recipes” through social channels.

If an agent can publicly post about successful tool integrations and send direct messages with implementation details, unsafe patterns don’t just exploit individual instances, they also spread like memes.

The current generation of agent frameworks already holds ambient authority, making misconfigurations expensive. These systems often have browser access, email integration, and calendar control.

Pulumi’s deployment guide for OpenClaw warns that default cloud configurations can expose SSH on port 22, as well as agent-facing ports 18789 and 18791, to the public internet.

Bitdefender notes that some exposed instances reportedly allowed unauthenticated command execution, and VentureBeat reports that commodity infostealers quickly added agent frameworks to their target lists, with one firm logging 7,922 attack attempts against a single instance.

Add a relay layer that enables agent-to-agent discovery and direct messaging, and you’ve created low-friction paths for prompt payload propagation, credential handling leakage, identity spoofing without cryptographic attestation, and faster exploit diffusion.

The attack surface shifts from “find vulnerable instances” to “teach one agent, watch it teach others.”

The agent internet stack shows identity, discovery, and messaging layers built atop execution and deployment layers already facing security failures like exposed ports and credential leaks.

Current failure modes are boring (and that’s the problem)

The documented incidents so far aren’t sophisticated. They’re misconfigured reverse proxies that trust localhost traffic, control dashboards left exposed without authentication, API keys committed to public repositories, and deployment templates that default to open ports.

TechRadar reports that attackers have already exploited the hype by pushing a fake VS Code extension that carries a trojan, leveraging the brand halo to distribute malware before official distribution channels catch up.

These are operational failures that collide with systems capable of executing actions autonomously. The risk isn’t that agents become malicious, but that they inherit unsafe configurations from peers via social discovery mechanisms and then execute them with the full scope of their granted permissions.

An agent that learns “here’s how to bypass rate limits” or “use this API endpoint with these credentials” through a relay network doesn’t need to understand exploitation. It just needs to follow instructions.

Agents are even setting up bounties for help to find exploits in other agents and offering Bitcoin as a reward. The agents identified BTC as their preferred payment method calling it “sound money,” and rejecting the idea of AI agent tokens.

Three paths forward over the next 90 days

The first scenario assumes hardening wins.

Major toolchains ship safer defaults, security audit workflows become standard practice, and the count of publicly exposed instances drops. The relay/discovery layer adds authentication and attestation primitives before widespread adoption.

This is the base case if the ecosystem treats current incidents as wake-up calls.

The second scenario assumes exploitation accelerates.

CryptoSlate Daily Brief

Daily signals, zero noise.

Market-moving headlines and context delivered every morning in one tight read.

5-minute digest 100k+ readers

Free. No spam. Unsubscribe any time.

Whoops, looks like there was a problem. Please try again.

You’re subscribed. Welcome aboard.

Exposed panels and open ports persist, and agent relays accelerate the spread of unsafe configurations and social-engineering templates. Expect second-order incidents: stolen API keys leading to billed usage spikes, compromised agents enabling lateral movement through organizations because these systems hold browser and email access.

In this scenario, agent-to-agent communication turns security from an endpoint problem into an ecosystem epidemiology problem.

The third scenario assumes a platform clampdown.

A high-profile incident triggers takedowns, warning banners, marketplace bans, and “official distribution only” norms. Agent relay protocols get relegated to authenticated, audited channels, and the open discovery layer never achieves default status.

90-day outcomeHardening winsExploitation acceleratesClampdown
Default behaviorSecure-by-default templates become the norm (closed ports, auth-on, least-privilege presets).Open-by-default persists (dashboards/ports exposed, weak reverse-proxy defaults).Marketplaces + platforms tighten distribution (warnings, removals, “official-only” channels).
Discovery / DM layerRelay/DM ships with auth + audit logs; early attestation primitives appear.Open relays and “capability directories” spread with minimal identity verification.Relays pushed into authenticated, audited enterprise channels; public discovery throttled or gated.
Most common incidentExposures decline; incidents skew toward isolated misconfigs caught quickly.Key theft → billed usage spikes; compromised agents → lateral movement via browser/email integrations.“Official-only installs” + takedowns; supply-chain attempts shift to signed-package bypasses.
Leading indicators to watchPublic exposure counts trend down; “security audit” tooling usage rises; safer defaults land in docs/templates.More infostealer targeting mentions; more extension/typosquat scams; repeated “exposed panel” reports.Platform warning banners; marketplace bans; requirements for signed packages / verified publishers.
Enterprise impactPolicies catch up; inventories mature; fewer unknown agents in prod.SOC noise increases; lateral-movement concern grows; emergency key rotation becomes routine.Procurement + compliance gatekeeping; developers slowed; “approved agent stack” lists emerge.
What to do this weekInventory agents + connectors; close exposed panels; rotate keys; enforce least-privilege.Assume compromise where exposure exists; isolate hosts; revoke tokens; monitor billing + unusual tool calls.Enforce allowlists; require signed distributions; lock installs to approved repos; turn on audit logging everywhere.

What changes for organizations right now

Token Security’s finding that 22% of customers already have unsanctioned agent usage within their organizations indicates that shadow-agent sprawl is occurring before policy catches up.

The internet is acquiring a new class of citizens, consisting of agents with identity, reputation, and discovery primitives, and existing security architectures weren’t designed for entities that can autonomously share operational knowledge through social channels.

The agent framework ship has sailed for most organizations, raising the question of whether to treat agent discovery and messaging layers as critical infrastructure that requires authentication, audit trails, and cryptographic attestation before deployment.

If agents can register, find peers by capability, and send direct messages without those safeguards, you’ve created a propagation network for whatever unsafe patterns emerge first.

Enterprises should monitor mentions of exposed control panels and updates to exposure counts, security advisories referencing the misconfiguration classes documented by Bitdefender and Pulumi, distribution abuse signals like fake extensions, and reports of attack attempts or infostealer targeting.

These are leading indicators of whether the ecosystem is converging on safer defaults or repeated incidents.

Real risk isn’t superintelligence

The current moment is about agents becoming networked enough to share operational patterns before security models adapt.

A relay-style approach to agent discovery and direct messaging, if widely adopted, would make agent ecosystems behave more like social networks with private channels. As a result, unsafe configurations could propagate socially across semi-autonomous systems rather than requiring manual distribution.

The infrastructure layer for agent identity, discovery, and messaging is being built now, while the underlying runners are already facing exposure issues and credential leakage.

Whether the ecosystem converges on safer defaults and audit workflows, or whether repeated incidents force platform clampdowns, the agent internet is moving from novelty to surface area.

Surface area is what attackers scale, and the protocols being built today will determine whether that scaling favors defenders or adversaries.

Source: https://cryptoslate.com/thousands-of-ai-agents-join-viral-network-to-teach-each-other-how-to-steal-keys-and-want-bitcoin-as-payment/

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

VanEck Targets Stablecoins & Next-Gen ICOs

VanEck Targets Stablecoins & Next-Gen ICOs

The post VanEck Targets Stablecoins & Next-Gen ICOs appeared on BitcoinEthereumNews.com. Welcome to the US Crypto News Morning Briefing—your essential rundown of the most important developments in crypto for the day ahead. Grab a coffee because the firms shaping crypto’s future are not just building products, but also trying to reshape how capital flows. Crypto News of the Day: VanEck Maps Next Frontier of Crypto Venture Investing VanEck, a Wall Street player known for financial “firsts,” is pushing that legacy into Web3. The firsts include pioneering US gold funds and launching one of the earliest spot Bitcoin ETFs. Sponsored Sponsored “Financial instruments have always been a kind of tokenization. From seashells to traveler’s checks, from relational databases to today’s on-chain assets. You could even joke that VanEck’s first gold mutual funds were the original ‘tokenized gold,’” Juan C. Lopez, General Partner at VanEck Ventures, told BeInCrypto. That same instinct drives the firm’s venture bets. Lopez said VanEck goes beyond writing checks and brings the full weight of the firm. This extends from regulatory proximity to product experiments to founders building the next phase of crypto infrastructure. Asked about key investment priorities, Lopez highlighted stablecoins. “We care deeply about three questions: How do we accelerate stablecoin ubiquity? What will users want to do with them once highly distributed? And what net new assets can we construct now that we have sophisticated market infrastructure?” Lopez added. However, VanEck is not limiting itself to the hottest narrative, acknowledging that decentralized finance (DeFi) is having a renaissance. The VanEck executive also noted that success will depend on new approaches to identity and programmable compliance layered on public blockchains. Backing Legion With A New Model for ICOs Sponsored Sponsored That compliance-first angle explains VanEck Ventures’ recent co-lead of Legion’s $5 million seed round alongside Brevan Howard. Legion aims to reinvent token fundraising by making early-stage access…
Share
BitcoinEthereumNews2025/09/18 03:52
Whales Dump 200 Million XRP in Just 2 Weeks – Is XRP’s Price on the Verge of Collapse?

Whales Dump 200 Million XRP in Just 2 Weeks – Is XRP’s Price on the Verge of Collapse?

Whales offload 200 million XRP leaving market uncertainty behind. XRP faces potential collapse as whales drive major price shifts. Is XRP’s future in danger after massive sell-off by whales? XRP’s price has been under intense pressure recently as whales reportedly offloaded a staggering 200 million XRP over the past two weeks. This massive sell-off has raised alarms across the cryptocurrency community, as many wonder if the market is on the brink of collapse or just undergoing a temporary correction. According to crypto analyst Ali (@ali_charts), this surge in whale activity correlates directly with the price fluctuations seen in the past few weeks. XRP experienced a sharp spike in late July and early August, but the price quickly reversed as whales began to sell their holdings in large quantities. The increased volume during this period highlights the intensity of the sell-off, leaving many traders to question the future of XRP’s value. Whales have offloaded around 200 million $XRP in the last two weeks! pic.twitter.com/MiSQPpDwZM — Ali (@ali_charts) September 17, 2025 Also Read: Shiba Inu’s Price Is at a Tipping Point: Will It Break or Crash Soon? Can XRP Recover or Is a Bigger Decline Ahead? As the market absorbs the effects of the whale offload, technical indicators suggest that XRP may be facing a period of consolidation. The Relative Strength Index (RSI), currently sitting at 53.05, signals a neutral market stance, indicating that XRP could move in either direction. This leaves traders uncertain whether the XRP will break above its current resistance levels or continue to fall as more whales sell off their holdings. Source: Tradingview Additionally, the Bollinger Bands, suggest that XRP is nearing the upper limits of its range. This often points to a potential slowdown or pullback in price, further raising concerns about the future direction of the XRP. With the price currently around $3.02, many are questioning whether XRP can regain its footing or if it will continue to decline. The Aftermath of Whale Activity: Is XRP’s Future in Danger? Despite the large sell-off, XRP is not yet showing signs of total collapse. However, the market remains fragile, and the price is likely to remain volatile in the coming days. With whales continuing to influence price movements, many investors are watching closely to see if this trend will reverse or intensify. The coming weeks will be critical for determining whether XRP can stabilize or face further declines. The combination of whale offloading and technical indicators suggest that XRP’s price is at a crossroads. Traders and investors alike are waiting for clear signals to determine if the XRP will bounce back or continue its downward trajectory. Also Read: Metaplanet’s Bold Move: $15M U.S. Subsidiary to Supercharge Bitcoin Strategy The post Whales Dump 200 Million XRP in Just 2 Weeks – Is XRP’s Price on the Verge of Collapse? appeared first on 36Crypto.
Share
Coinstats2025/09/17 23:42
Foreigner’s Lou Gramm Revisits The Band’s Classic ‘4’ Album, Now Reissued

Foreigner’s Lou Gramm Revisits The Band’s Classic ‘4’ Album, Now Reissued

The post Foreigner’s Lou Gramm Revisits The Band’s Classic ‘4’ Album, Now Reissued appeared on BitcoinEthereumNews.com. American-based rock band Foreigner performs onstage at the Rosemont Horizon, Rosemont, Illinois, November 8, 1981. Pictured are, from left, Mick Jones, on guitar, and vocalist Lou Gramm. (Photo by Paul Natkin/Getty Images) Getty Images Singer Lou Gramm has a vivid memory of recording the ballad “Waiting for a Girl Like You” at New York City’s Electric Lady Studio for his band Foreigner more than 40 years ago. Gramm was adding his vocals for the track in the control room on the other side of the glass when he noticed a beautiful woman walking through the door. “She sits on the sofa in front of the board,” he says. “She looked at me while I was singing. And every now and then, she had a little smile on her face. I’m not sure what that was, but it was driving me crazy. “And at the end of the song, when I’m singing the ad-libs and stuff like that, she gets up,” he continues. “She gives me a little smile and walks out of the room. And when the song ended, I would look up every now and then to see where Mick [Jones] and Mutt [Lange] were, and they were pushing buttons and turning knobs. They were not aware that she was even in the room. So when the song ended, I said, ‘Guys, who was that woman who walked in? She was beautiful.’ And they looked at each other, and they went, ‘What are you talking about? We didn’t see anything.’ But you know what? I think they put her up to it. Doesn’t that sound more like them?” “Waiting for a Girl Like You” became a massive hit in 1981 for Foreigner off their album 4, which peaked at number one on the Billboard chart for 10 weeks and…
Share
BitcoinEthereumNews2025/09/18 01:26