Tech »  Topic »  LLMs in Attacker Crosshairs, Warns Threat Intel Firm

LLMs in Attacker Crosshairs, Warns Threat Intel Firm


Threat actors have been probing misconfigured proxy servers that could provide them with access to LLM APIs, threat intelligence firm GreyNoise reports.

Between October 2025 and January 2026, the company’s honeypots captured over 91,000 attack sessions, including assaults associated with two campaigns.

The first started in October and relied on ProjectDiscovery’s OAST (Out-of-band Application Security Testing) infrastructure to exploit server-side request forgery (SSRF) vulnerabilities.

The campaign spiked over Christmas and most of the attacks had the same signature, suggesting automated tooling.

Based on the observed VPS-based attack infrastructure, GreyNoise believes that the campaign was conducted by security researchers or bug hunters, but does not exclude the possibility of a grey-hat operation.

The second campaign started on December 28 and involved 80,469 attack sessions over an 11-day period. The attackers were probing more than 70 LLM model endpoints, looking for misconfigurations that could leak access to commercial ...


Copyright of this story solely belongs to securityweek . To see the full text click HERE