Connect with us
DAPA Banner

Crypto World

Iran Warns of Regional Energy Strikes After Trump Threats Over Hormuz Strait

Published

on

Brian Armstrong's Bold Prediction: AI Agents Will Soon Dominate Global Financial

TLDR:

  • Trump issues 48-hour ultimatum demanding Iran reopen the Strait or face power plant strikes.
  • Iran warns of full closure of the Strait and retaliation against regional energy infrastructure.
  • Tanker traffic dropped 90%, increasing concerns over global oil supply and market stability.
  • Iranian officials list potential targets, including Israel and US-linked energy assets.

Iran war live Trump Strait of Hormuz tensions intensified after a 48-hour ultimatum triggered threats of energy infrastructure attacks, raising risks of wider regional escalation and disruption to global oil transit routes.

Trump Issues 48-Hour Ultimatum

The United States has issued a direct warning to Tehran. In his statement, President Donald Trump demanded that Iran fully reopen the Strait within 48 hours. 

He threatened attacks on major Iranian power plants if the demand is ignored. The ultimatum highlighted the strategic significance of the Strait of Hormuz, through which a significant portion of global oil shipments pass. 

Tanker traffic has already fallen by nearly 90% in recent weeks, raising concerns about energy supply disruptions worldwide.

Trump’s statement did not clarify whether nuclear-linked power plants, such as Bushehr, would be included in the strike. This uncertainty added to regional tension, as the potential for collateral damage remains high.

Advertisement

 “If Iran doesn’t FULLY OPEN the Strait, the US will hit major power plants first,” Trump’s statement read, reflecting the firm deadline.

Iran Warns of Retaliation and Regional Impact

Iranian officials outlined a detailed response as spokesperson Ebrahim Zolfaghari confirmed that the Strait remains partially open under controlled access. He however, warned that any strike on power plants would trigger immediate retaliation.

Iran indicated that a full closure of the Strait would follow any attack, with reopening dependent on reconstruction of damaged infrastructure. 

Officials also listed potential regional targets, including power plants in Israel, companies with American shareholders, and energy infrastructure in countries hosting US bases.

Advertisement

Iran’s parliament speaker, Mohammad Bagher Ghalibaf, further emphasized the scale of potential consequences. He warned that attacks on Iranian infrastructure could lead to the irreversible destruction of energy networks across the Gulf, maintaining elevated oil prices for an extended period.

Previous demonstrations of Iran’s reach, such as the strike on Qatar’s Ras Laffan LNG terminal, showed the country’s capability to disrupt regional energy systems. 

Regional and international actors are monitoring the situation closely, highlighting the strategic and economic stakes.

Iran war live Trump Strait of Hormuz tensions remain critical as the 48-hour deadline approaches, with both sides maintaining firm positions and regional stability at stake.

Advertisement

Source link

Continue Reading
Click to comment

You must be logged in to post a comment Login

Leave a Reply

Crypto World

AI Routers Can Steal Credentials and Crypto

Published

on

AI Routers Can Steal Credentials and Crypto

University of California researchers have discovered that some third-party AI large language model (LLM) routers can pose security vulnerabilities that can lead to crypto theft. 

A paper measuring malicious intermediary attacks on the LLM supply chain, published on Thursday by the researchers, revealed four attack vectors, including malicious code injection and extraction of credentials

“26 LLM routers are secretly injecting malicious tool calls and stealing creds,” said the paper’s co-author, Chaofan Shou, on X.

LLM agents increasingly route requests through third-party API intermediaries or routers that aggregate access to providers like OpenAI, Anthropic and Google. However, these routers terminate Internet TLS (Transport Layer Security) connections and have full plaintext access to every message. 

Advertisement

This means that developers using AI coding agents such as Claude Code to work on smart contracts or wallets could be passing private keys, seed phrases and sensitive data through router infrastructure that has not been screened or secured.

Multi-hop LLM router supply chain. Source: arXiv.org

ETH stolen from a decoy crypto wallet 

The researchers tested 28 paid routers and 400 free routers collected from public communities. 

Their findings were startling, with nine routers actively injecting malicious code, two deploying adaptive evasion triggers, 17 accessing researcher-owned Amazon Web Services credentials, and one draining Ether (ETH) from a researcher-owned private key.

Related: Anthropic limits access to AI model over cyberattack concerns

The researchers prefunded Ethereum wallet “decoy keys” with nominal balances and reported that the value lost in the experiment was below $50, but no further details such as the transaction hash were provided. 

Advertisement

The authors also ran two “poisoning studies” showing that even benign routers become dangerous once they reuse leaked credentials through weak relays.

Hard to tell whether routers are malicious

The researchers said it was not easy to detect when a router was malicious.  

“The boundary between ‘credential handling’ and ‘credential theft’ is invisible to the client because routers already read secrets in plaintext as part of normal forwarding.” 

Another unsettling find was what the researchers called “YOLO mode.” This is a setting in many AI agent frameworks where the agent executes commands automatically without asking the user to confirm each one.

Previously legitimate routers can be silently weaponized without the operator even knowing, while free routers may be stealing credentials while offering cheap API access as the lure, the researchers found.

Advertisement

“LLM API routers sit on a critical trust boundary that the ecosystem currently treats as transparent transport.” 

The researchers recommended that developers using AI agents to code should bolster client-side defenses, suggesting never letting private keys or seed phrases transit an AI agent session.

The long-term fix is for AI companies to cryptographically sign their responses so the instructions an agent executes can be mathematically verified as coming from the actual model. 

Magazine: Nobody knows if quantum secure cryptography will even work