Connect with us
DAPA Banner

Crypto World

Iran’s Foreign Minister Says Insurance Markets, Not Missiles, Closed the Strait of Hormuz

Published

on

Brian Armstrong's Bold Prediction: AI Agents Will Soon Dominate Global Financial

TLDR:

  • Iran’s FM Araghchi says insurance cancellations, not military action, are stalling Persian Gulf tankers.
  • Marine war risk insurers scrapped Gulf coverage, trapping an estimated 15 million barrels daily.
  • Bearish investor sentiment hit 52%, the highest since spring 2025, as the conflict feeds risk models.
  • Energy stocks gained 29% year-to-date in 2026 while Bitcoin dropped below $68,000 amid uncertainty.

The Strait of Hormuz remains physically open, yet global oil shipments have effectively stalled. Iran’s Foreign Minister Abbas Araghchi attributed the disruption not to military force but to marine war risk insurers.

Major providers have cancelled coverage for vessels operating in the Persian Gulf. Without active insurance policies, tankers cannot sail legally.

Roughly 15 million barrels of crude sit trapped daily. The standoff has rattled financial markets, pushing investor sentiment to its most bearish reading since spring 2025.

Insurance Cancellations, Not Mines, Grounded Persian Gulf Tankers

Araghchi took to X to address the shipping slowdown directly. He wrote: “Strait of Hormuz is not closed. Ships hesitate because insurers fear the war of choice you initiated—not Iran.”

He added that no insurer or Iranian would respond to further threats. His post pointed to an overlooked mechanism behind the disruption.

Advertisement

Marine war risk insurers pulled coverage after regional hostilities intensified. Without a valid policy, no commercial tanker can legally complete its voyage.

Advertisement

Mines and drone threats acted as triggers, but the underwriter’s spreadsheet became the real barrier. That dynamic has made military escorts largely ineffective.

Twenty-two countries coordinating with NATO face the same obstacle. Clearing mines or neutralising coastal batteries does not reopen shipping lanes when underwriters refuse to issue policies.

Providers like Lloyd’s of London base their decisions on actuarial models. Those models account for ongoing conflict, missile activity, and sustained military uncertainty.

Iran’s position, therefore, rests on the risk premium rather than a direct military blockade. As long as hostilities continue, insurers maintain their cancellations.

Advertisement

The 48-hour ultimatum issued by US leadership added further pressure to those calculations. Each new escalation feeds the risk model rather than easing it.

Bearish Investor Sentiment Rises as Energy and Housing Data Diverge

The American Association of Individual Investors survey from March 19 recorded 52 percent of investors as bearish. That reading is the highest since spring 2025.

Bullish sentiment fell to 30.4 percent, leaving a negative bull-bear spread of 21.6 percentage points. These numbers reflect the same insurance-driven mechanism Araghchi described.

Energy stocks recorded 20 all-time highs in 2026, the most since 2013. The sector gained 29 percent year-to-date and 367 percent since the 2020 pandemic low.

Advertisement

Traders are pricing a prolonged period of trapped supply. Meanwhile, Bitcoin fell below $68,000 amid broader market uncertainty.

New US home sales dropped 17.6 percent month-on-month to 587,000 units, the lowest since 2022. The median home price declined 6.8 percent year-over-year. Those figures point to stress in rate-sensitive sectors while the conflict continues.

The market has effectively split into two camps. One segment prices sustained high oil revenue. The other prices broad economic weakness.

Iran has warned that any strike on its power grid would permanently close the Strait of Hormuz. Insurers continue processing that statement the same way they process every other risk factor, by keeping policies cancelled.

Advertisement

Source link

Advertisement
Continue Reading
Click to comment

You must be logged in to post a comment Login

Leave a Reply

Crypto World

AI Routers Can Steal Credentials and Crypto

Published

on

AI Routers Can Steal Credentials and Crypto

University of California researchers have discovered that some third-party AI large language model (LLM) routers can pose security vulnerabilities that can lead to crypto theft. 

A paper measuring malicious intermediary attacks on the LLM supply chain, published on Thursday by the researchers, revealed four attack vectors, including malicious code injection and extraction of credentials

“26 LLM routers are secretly injecting malicious tool calls and stealing creds,” said the paper’s co-author, Chaofan Shou, on X.

LLM agents increasingly route requests through third-party API intermediaries or routers that aggregate access to providers like OpenAI, Anthropic and Google. However, these routers terminate Internet TLS (Transport Layer Security) connections and have full plaintext access to every message. 

Advertisement

This means that developers using AI coding agents such as Claude Code to work on smart contracts or wallets could be passing private keys, seed phrases and sensitive data through router infrastructure that has not been screened or secured.

Multi-hop LLM router supply chain. Source: arXiv.org

ETH stolen from a decoy crypto wallet 

The researchers tested 28 paid routers and 400 free routers collected from public communities. 

Their findings were startling, with nine routers actively injecting malicious code, two deploying adaptive evasion triggers, 17 accessing researcher-owned Amazon Web Services credentials, and one draining Ether (ETH) from a researcher-owned private key.

Related: Anthropic limits access to AI model over cyberattack concerns

The researchers prefunded Ethereum wallet “decoy keys” with nominal balances and reported that the value lost in the experiment was below $50, but no further details such as the transaction hash were provided. 

Advertisement

The authors also ran two “poisoning studies” showing that even benign routers become dangerous once they reuse leaked credentials through weak relays.

Hard to tell whether routers are malicious

The researchers said it was not easy to detect when a router was malicious.  

“The boundary between ‘credential handling’ and ‘credential theft’ is invisible to the client because routers already read secrets in plaintext as part of normal forwarding.” 

Another unsettling find was what the researchers called “YOLO mode.” This is a setting in many AI agent frameworks where the agent executes commands automatically without asking the user to confirm each one.

Previously legitimate routers can be silently weaponized without the operator even knowing, while free routers may be stealing credentials while offering cheap API access as the lure, the researchers found.

Advertisement

“LLM API routers sit on a critical trust boundary that the ecosystem currently treats as transparent transport.” 

The researchers recommended that developers using AI agents to code should bolster client-side defenses, suggesting never letting private keys or seed phrases transit an AI agent session.

The long-term fix is for AI companies to cryptographically sign their responses so the instructions an agent executes can be mathematically verified as coming from the actual model. 

Magazine: Nobody knows if quantum secure cryptography will even work