Close Menu

    Stay Ahead with Exclusive Updates!

    Enter your email below and be the first to know what’s happening in the ever-evolving world of technology!

    What's Hot

    Microsoft Azure Slowdown: AI Costs Impact on Q1 2026 Earnings

    February 6, 2026

    Amazon vs Nvidia: Custom Silicon and Chip Control Battle

    February 6, 2026

    Operation Bizarre Bazaar Hijacks Unsecured AI Model Endpoints in a Large-Scale Cybercrime Campaign

    February 6, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter)
    PhronewsPhronews
    • Home
    • Big Tech & Startups

      Microsoft Azure Slowdown: AI Costs Impact on Q1 2026 Earnings

      February 6, 2026

      Amazon vs Nvidia: Custom Silicon and Chip Control Battle

      February 6, 2026

      Meta Introduces its Neural Wristband to the World

      February 4, 2026

      Swiggy Losses 2026: Instamart Costs Challenge Food Delivery Growth

      February 4, 2026

      Google Gemini in Chrome: AI Browsing Agent Integration

      February 4, 2026
    • Crypto

      Global Crypto Regulations Expand as 2026 Begins With New Data Collection Frameworks and National Laws

      January 16, 2026

      Coinbase Bets on Stablecoin and On-Chain Growth as Key Market Drivers in 2026 Strategy

      January 10, 2026

      Tether Faces Ongoing Transparency Questions and Reserve Scrutiny Amid Massive Bitcoin Accumulation

      January 5, 2026

      Kanye West YZY Coin Crash Follows $3B Hype Launch

      August 24, 2025

      Crypto Markets Rally as GENIUS Act Nears Stablecoin Regulation Breakthrough

      July 23, 2025
    • Gadgets & Smart Tech
      Featured

      Meta Introduces its Neural Wristband to the World

      By preciousFebruary 4, 2026
      Recent

      Meta Introduces its Neural Wristband to the World

      February 4, 2026

      OpenAI Races to Achieve AGI: A Big Bet on Audio AI and Screenless Technology

      January 24, 2026

      Samsung Plans to Double Production of Gemini-Powered Devices in 2026

      January 19, 2026
    • Cybersecurity & Online Safety

      Operation Bizarre Bazaar Hijacks Unsecured AI Model Endpoints in a Large-Scale Cybercrime Campaign

      February 6, 2026

      Russian Hackers Breach Polish Grid via Default Passwords

      February 4, 2026

      Energy Sector Cybersecurity Threats: Phishing Campaigns via SharePoint

      February 4, 2026

      The Luxshare Breach: What Apple’s 1TB Leak Means for Your Next Device

      January 30, 2026

      How “Shadow AI” Became the Number One Enterprise Security Risk

      January 29, 2026
    PhronewsPhronews
    Home»Cybersecurity & Online Safety»Operation Bizarre Bazaar Hijacks Unsecured AI Model Endpoints in a Large-Scale Cybercrime Campaign
    Cybersecurity & Online Safety

    Operation Bizarre Bazaar Hijacks Unsecured AI Model Endpoints in a Large-Scale Cybercrime Campaign

    preciousBy preciousFebruary 6, 2026No Comments
    Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email
    Photo Credit: xalien/Shutterstock

    Hackers have turned unsecured AI systems into their own profit machine through an Operation Bizarre Bazaar campaign. Between December 2025 and January 2026, security researchers at Pillar Security tracked more than 35,000 attacks targeting companies running AI chatbots and language models, stealing computing power, building an entire underground business, and selling cheap access to hijacked AI systems.

    The campaign, called Operation Bizarre Bazaar, saw criminals scan the internet for AI systems left open to the public, test them to make sure they work, then resell access to other hackers at a discount. Termed “LLMjacking,” it is the first documented case of hackers creating a full-service marketplace around stolen AI infrastructure.

    How the LLMjacking Campaign Works

    LLMjacking refers to hijacking Large Language Model infrastructure, essentially stealing AI systems for unauthorized use. The term closely mirrors “cryptojacking,” where criminals steal computing power to mine cryptocurrency. 

    In this case, attackers target AI systems to steal expensive computing resources, resell access to others, pull out sensitive data, or use compromised systems as doorways into company networks.

    The attacks focus on organizations running their own AI infrastructure rather than using cloud services like ChatGPT. This is because companies host their own AI for various reasons such as keeping sensitive data private, customizing models for specific needs, or avoiding per-use fees from commercial providers. 

    These self-hosted systems include tools like Ollama and vLLM, which let developers run powerful language models on their own servers. The problem arises when these systems get exposed to the internet without proper security.

    Between December 2025 and January 2026, Pillar Security’s monitoring systems captured 35,000 distinct attack sessions, which represents an average of 972 attempts every single day.

    Operation Bizarre Bazaar: Three Players, One Criminal Pipeline

    Operation Bizarre Bazaar runs on a simple but effective model, LLMjacking, with three key players. First, automated scanners sweep the internet looking for AI systems that anyone can access without a password. These scanners then hunt for popular AI tools like Ollama, which developers use to run language models on their own servers, and vLLM, another common AI hosting service.

    Once the scanners find vulnerable systems, a service called silver.inc steps in to verify they actually work. The attackers send test requests to each AI system, trying fake passwords to see which systems don’t bother checking credentials. They also test what kinds of AI models each system runs, whether it’s GPT-style chatbots, code generators, or other AI tools.

    The final player is the marketplace itself. Silver.inc operates openly, calling itself “The Unified LLM API Gateway” and advertising on Discord and Telegram. The service claims to offer access to more than 30 different AI providers at prices 40-60% cheaper than legitimate services, and accepting both cryptocurrency and PayPal. 

    What This Means

    AI‑driven workloads have become central to how organizations build products, automate operations, and interact with customers, but security practices around those workloads have lagged behind. Traditional perimeter thinking often treats AI endpoints as “just another API,” even though their compute cost, connectivity, and access to sensitive context make them high‑value, high‑impact targets. 

    The Operation Bizarre Bazaar campaign highlights how quickly opportunistic actors will exploit that gap, turning innocent configuration mistakes into ongoing revenue streams.

    The operation also illustrates how AI is now both a target and an enabler of cybercrime. On one side, exposed model endpoints are abused for unauthorized inference and data access. On the other, AI tools are increasingly used by attackers to speed up reconnaissance, exploit development, and social engineering. 

    For security and engineering leaders, this means AI infrastructure can no longer sit on the borders of threat modeling or cloud security reviews, as it now has to be treated as part of the critical attack surface.

    AI infrastructure security API security for LLMs Artificial Intelligence Compute resource theft Cryptojacking vs LLMjacking Cybercrime Cybercrime trends 2026 Discord cybercrime channels LLMjacking Ollama security vulnerabilities Operation Bizarre Bazaar Pillar Security Shadow AI infrastructure Silver.inc marketplace Telegram cybercrime channels Unauthorized inference attacks Underground marketplace for stolen sensitive data Unsecured AI endpoints vLLM endpoint protection
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    precious
    • LinkedIn

    I’m Precious Amusat, Phronews’ Content Writer. I conduct in-depth research and write on the latest developments in the tech industry, including trends in big tech, startups, cybersecurity, artificial intelligence and their global impacts. When I’m off the clock, you’ll find me cheering on women’s footy, curled up with a romance novel, or binge-watching crime thrillers.

    Related Posts

    Russian Hackers Breach Polish Grid via Default Passwords

    February 4, 2026

    Energy Sector Cybersecurity Threats: Phishing Campaigns via SharePoint

    February 4, 2026

    Google Gemini in Chrome: AI Browsing Agent Integration

    February 4, 2026

    Comments are closed.

    Top Posts

    MIT Study Reveals ChatGPT Impairs Brain Activity & Thinking

    June 29, 2025

    From Ally to Adversary: What Elon Musk’s Feud with Trump Means for the EV Industry

    June 6, 2025

    Coinbase responds to hack: customer impact and official statement

    May 22, 2025

    Coinbase Hack 2025: Everything we know so far.

    May 21, 2025
    Don't Miss
    Big Tech & Startups

    Microsoft Azure Slowdown: AI Costs Impact on Q1 2026 Earnings

    By fariehanFebruary 6, 2026

    Microsoft showed a slowdown in the growth rate of its Azure cloud segment, largely driven…

    Amazon vs Nvidia: Custom Silicon and Chip Control Battle

    February 6, 2026

    Operation Bizarre Bazaar Hijacks Unsecured AI Model Endpoints in a Large-Scale Cybercrime Campaign

    February 6, 2026

    Russian Hackers Breach Polish Grid via Default Passwords

    February 4, 2026
    Stay In Touch
    • Facebook
    • Twitter
    About Us
    About Us

    Evolving from Phronesis News, Phronews brings deep insight and smart analysis to the world of technology. Stay informed, stay ahead, and navigate tech with wisdom.
    We're accepting new partnerships right now.

    Email Us: info@phronews.com

    Facebook X (Twitter) Pinterest YouTube
    Our Picks
    Most Popular

    MIT Study Reveals ChatGPT Impairs Brain Activity & Thinking

    June 29, 2025

    From Ally to Adversary: What Elon Musk’s Feud with Trump Means for the EV Industry

    June 6, 2025

    Coinbase responds to hack: customer impact and official statement

    May 22, 2025
    © 2025. Phronews.
    • Home
    • About Us
    • Get In Touch
    • Privacy Policy
    • Terms and Conditions

    Type above and press Enter to search. Press Esc to cancel.