HighThreat Report

Hackers scan misconfigured proxies to steal access to paid LLM services, GreyNoise warns

GreyNoise telemetry shows threat actors actively mapping the AI attack surface, including systematic probing of misconfigured proxy layers that could expose paid LLM access. Over 80,000 enumeration sessions in 11 days targeted more than 73 model endpoints across major providers, using low-noise prompts to avoid triggering defenses. While exploitation was not confirmed, the activity signals preparation for cost fraud, data exposure, and follow-on intrusions against AI gateways.

Evan Mael
Evan Mael
Enterprise28views

Incident Summary

Type
Threat Report
Severity
High
Industry
Enterprise
Threat Actor
Unconfirmed (two distinct campaigns; one assessed as likely grey-hat, one assessed as professional reconnaissance)
Target
enterprises running LLM gateways, proxies, or self-hosted AI endpoints
Published
Jan 9, 2026

Comments

Want to join the discussion?

Create an account to unlock exclusive member content, save your favorite articles, and join our community of IT professionals.

Sign in