Close Menu

    Stay Ahead with Exclusive Updates!

    Enter your email below and be the first to know what’s happening in the ever-evolving world of technology!

    What's Hot

    Microsoft Just Ended OpenAI’s Cloud Exclusivity. AWS Is Already Moving In and the Consequences for the AI Market Are Enormous

    May 22, 2026

    Startup Funding Is Falling in 2026 Unless You Have AI at the Core. Here Is What That Means for Every Founder Who Does Not

    May 22, 2026

    A Cybersecurity Firm Just Had Its Own Source Code Stolen. Trellix’s Breach Is the Most Embarrassing Kind and the Most Instructive One.

    May 22, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter)
    PhronewsPhronews
    • Home
    • Big Tech & Startups

      Microsoft Just Ended OpenAI’s Cloud Exclusivity. AWS Is Already Moving In and the Consequences for the AI Market Are Enormous

      May 22, 2026

      Startup Funding Is Falling in 2026 Unless You Have AI at the Core. Here Is What That Means for Every Founder Who Does Not

      May 22, 2026

      OpenAI Just Built a $4 Billion Company Designed to Live Inside Your Business Workflows. The Race to Own Enterprise AI Just Entered a New Phase.

      May 20, 2026

      Meta Is Building Two AI Products at Once – Hatch, a General-Purpose Agent, and a Shopping Tool for Instagram.

      May 20, 2026

      Anthropic Just Committed $100 Billion to Amazon. Here Is What That Number Tells You About Who Is Winning the AI Arms Race.

      May 17, 2026
    • Crypto

      Market Collapse: What Happened to NFTs?

      April 23, 2026

      Quantum Computing Advances Force Coinbase and Institutional Custodians to Rethink Crypto Security

      March 8, 2026

      AI Assisted Hacking Groups Target Crypto Firms With Multi-Layered Social Engineering

      February 18, 2026

      Global Crypto Regulations Expand as 2026 Begins With New Data Collection Frameworks and National Laws

      January 16, 2026

      Coinbase Bets on Stablecoin and On-Chain Growth as Key Market Drivers in 2026 Strategy

      January 10, 2026
    • Gadgets & Smart Tech
      Featured

      Foldable Phones Are No Longer a Gimmick — The Motorola Razr 2026 Is the Latest Sign That Foldables Are Going Mainstream

      By fariehanMay 3, 2026
      Recent

      Foldable Phones Are No Longer a Gimmick — The Motorola Razr 2026 Is the Latest Sign That Foldables Are Going Mainstream

      May 3, 2026

      Meta Raises Quest VR Headset Prices as Component Costs Rise

      May 1, 2026

      Robotics Showcase: China Uses a Half-Marathon to Signal Progress in Humanoid Tech

      April 27, 2026
    • Cybersecurity & Online Safety

      A Cybersecurity Firm Just Had Its Own Source Code Stolen. Trellix’s Breach Is the Most Embarrassing Kind and the Most Instructive One.

      May 22, 2026

      Hackers Built a Zero-Day Exploit Using AI and Almost Got Away With It. Google Caught It in Time. Next Time May Be Different.

      May 19, 2026

      275 Million Students Had Their Data Exposed in the Largest Education Cyberattack Ever Recorded. Here Is Exactly What Happened to Canvas

      May 19, 2026

      A Security Flaw in Hugging Face’s Robotics Platform Shows What Happens When Open-Source AI Begins Controlling Physical Machines

      May 10, 2026

      AI Is Making Identity the Most Dangerous Attack Surface in Cybersecurity. CrowdStrike’s $740 Million Bet Proves It.

      May 10, 2026
    PhronewsPhronews
    Home»Cybersecurity & Online Safety»Operation Bizarre Bazaar Hijacks Unsecured AI Model Endpoints in a Large-Scale Cybercrime Campaign
    Cybersecurity & Online Safety

    Operation Bizarre Bazaar Hijacks Unsecured AI Model Endpoints in a Large-Scale Cybercrime Campaign

    preciousBy preciousFebruary 6, 2026No Comments
    Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email
    Photo Credit: xalien/Shutterstock

    Hackers have turned unsecured AI systems into their own profit machine through an Operation Bizarre Bazaar campaign. Between December 2025 and January 2026, security researchers at Pillar Security tracked more than 35,000 attacks targeting companies running AI chatbots and language models, stealing computing power, building an entire underground business, and selling cheap access to hijacked AI systems.

    The campaign, called Operation Bizarre Bazaar, saw criminals scan the internet for AI systems left open to the public, test them to make sure they work, then resell access to other hackers at a discount. Termed “LLMjacking,” it is the first documented case of hackers creating a full-service marketplace around stolen AI infrastructure.

    How the LLMjacking Campaign Works

    LLMjacking refers to hijacking Large Language Model infrastructure, essentially stealing AI systems for unauthorized use. The term closely mirrors “cryptojacking,” where criminals steal computing power to mine cryptocurrency. 

    In this case, attackers target AI systems to steal expensive computing resources, resell access to others, pull out sensitive data, or use compromised systems as doorways into company networks.

    The attacks focus on organizations running their own AI infrastructure rather than using cloud services like ChatGPT. This is because companies host their own AI for various reasons such as keeping sensitive data private, customizing models for specific needs, or avoiding per-use fees from commercial providers. 

    These self-hosted systems include tools like Ollama and vLLM, which let developers run powerful language models on their own servers. The problem arises when these systems get exposed to the internet without proper security.

    Between December 2025 and January 2026, Pillar Security’s monitoring systems captured 35,000 distinct attack sessions, which represents an average of 972 attempts every single day.

    Operation Bizarre Bazaar: Three Players, One Criminal Pipeline

    Operation Bizarre Bazaar runs on a simple but effective model, LLMjacking, with three key players. First, automated scanners sweep the internet looking for AI systems that anyone can access without a password. These scanners then hunt for popular AI tools like Ollama, which developers use to run language models on their own servers, and vLLM, another common AI hosting service.

    Once the scanners find vulnerable systems, a service called silver.inc steps in to verify they actually work. The attackers send test requests to each AI system, trying fake passwords to see which systems don’t bother checking credentials. They also test what kinds of AI models each system runs, whether it’s GPT-style chatbots, code generators, or other AI tools.

    The final player is the marketplace itself. Silver.inc operates openly, calling itself “The Unified LLM API Gateway” and advertising on Discord and Telegram. The service claims to offer access to more than 30 different AI providers at prices 40-60% cheaper than legitimate services, and accepting both cryptocurrency and PayPal. 

    What This Means

    AI‑driven workloads have become central to how organizations build products, automate operations, and interact with customers, but security practices around those workloads have lagged behind. Traditional perimeter thinking often treats AI endpoints as “just another API,” even though their compute cost, connectivity, and access to sensitive context make them high‑value, high‑impact targets. 

    The Operation Bizarre Bazaar campaign highlights how quickly opportunistic actors will exploit that gap, turning innocent configuration mistakes into ongoing revenue streams.

    The operation also illustrates how AI is now both a target and an enabler of cybercrime. On one side, exposed model endpoints are abused for unauthorized inference and data access. On the other, AI tools are increasingly used by attackers to speed up reconnaissance, exploit development, and social engineering. 

    For security and engineering leaders, this means AI infrastructure can no longer sit on the borders of threat modeling or cloud security reviews, as it now has to be treated as part of the critical attack surface.

    AI infrastructure security API security for LLMs Artificial Intelligence Compute resource theft Cryptojacking vs LLMjacking Cybercrime Cybercrime trends 2026 Discord cybercrime channels LLMjacking Ollama security vulnerabilities Operation Bizarre Bazaar Pillar Security Shadow AI infrastructure Silver.inc marketplace Telegram cybercrime channels Unauthorized inference attacks Underground marketplace for stolen sensitive data Unsecured AI endpoints vLLM endpoint protection
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    precious
    • LinkedIn

    I’m Precious Amusat, Phronews’ Content Writer. I conduct in-depth research and write on the latest developments in the tech industry, including trends in big tech, startups, cybersecurity, artificial intelligence and their global impacts. When I’m off the clock, you’ll find me cheering on women’s footy, curled up with a romance novel, or binge-watching crime thrillers.

    Related Posts

    Startup Funding Is Falling in 2026 Unless You Have AI at the Core. Here Is What That Means for Every Founder Who Does Not

    May 22, 2026

    A Cybersecurity Firm Just Had Its Own Source Code Stolen. Trellix’s Breach Is the Most Embarrassing Kind and the Most Instructive One.

    May 22, 2026

    OpenAI Just Built a $4 Billion Company Designed to Live Inside Your Business Workflows. The Race to Own Enterprise AI Just Entered a New Phase.

    May 20, 2026

    Comments are closed.

    Top Posts

    Coinbase responds to hack: customer impact and official statement

    May 22, 2025

    Anthropic Will Use Claude User Chats For Data Training

    October 16, 2025

    Cursor AI Hits 1 Million Daily Users. Why Developers Are Switching to This Coding Tool

    March 23, 2026

    MIT Study Reveals ChatGPT Impairs Brain Activity & Thinking

    June 29, 2025
    Don't Miss
    Big Tech & Startups

    Microsoft Just Ended OpenAI’s Cloud Exclusivity. AWS Is Already Moving In and the Consequences for the AI Market Are Enormous

    By fariehanMay 22, 2026

    OpenAI cloud exclusivity just ended and the AI market already looks different. For years, Microsoft…

    Startup Funding Is Falling in 2026 Unless You Have AI at the Core. Here Is What That Means for Every Founder Who Does Not

    May 22, 2026

    A Cybersecurity Firm Just Had Its Own Source Code Stolen. Trellix’s Breach Is the Most Embarrassing Kind and the Most Instructive One.

    May 22, 2026

    OpenAI Just Built a $4 Billion Company Designed to Live Inside Your Business Workflows. The Race to Own Enterprise AI Just Entered a New Phase.

    May 20, 2026
    Stay In Touch
    • Facebook
    • Twitter
    About Us
    About Us

    Evolving from Phronesis News, Phronews brings deep insight and smart analysis to the world of technology. Stay informed, stay ahead, and navigate tech with wisdom.
    We're accepting new partnerships right now.

    Email Us: info@phronews.com

    Facebook X (Twitter) Pinterest YouTube
    Our Picks
    Most Popular

    Coinbase responds to hack: customer impact and official statement

    May 22, 2025

    Anthropic Will Use Claude User Chats For Data Training

    October 16, 2025

    Cursor AI Hits 1 Million Daily Users. Why Developers Are Switching to This Coding Tool

    March 23, 2026
    © 2025. Phronews.
    • Home
    • About Us
    • Get In Touch
    • Privacy Policy
    • Terms and Conditions

    Type above and press Enter to search. Press Esc to cancel.