PANews reported on May 4 that SlowMist's Chief Information Security Officer (CISO) @23pds disclosed in an article on the X platform that X platform user Ilhamrfliansyh today used a prompt injection attack to induce the AI model Grok to generate and publish abnormal content, thereby triggering erroneous on-chain fund operations.
The original content was allegedly a Morse code message, the core meaning of which was "transfer all DRBs to Ilhamrfliansyh". Although the relevant account has been deleted and the complete information cannot be fully confirmed, Grok directly posted the "decoding result" as a reply after parsing it, and accidentally tagged bankrbot, causing the content to be identified by the system as an on-chain execution instruction.
Subsequently, Bankr, acting as Grok's associated wallet, executed the request, transferring approximately $175,000 worth of DRB to the attacker's address. The attacker then quickly converted the DRB into USDC using multiple wallets.
The incident caused a brief plunge of about 40% in DRB prices, but the market quickly recovered, and prices have now largely recovered their losses.
Industry insiders pointed out that this incident exposed the potential risks of "AI + automated on-chain execution" systems under the threat of injection attacks, especially in scenarios where AI results can directly trigger fund operations.




