Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Iran-linked RedKitten cyber campaign targets human rights NGOs and activists

This week’s science news: ‘Cloud People’ grave discovered in Mexico, pancreatic cancer epidemic, AI swarms ready to take over social media

Mandiant discovers ShinyHunters-style Vishing attack that steals MFA and compromises SaaS platforms

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Researchers discover 175,000 publicly available Ollama AI servers in 130 countries
Identity

Researchers discover 175,000 publicly available Ollama AI servers in 130 countries

userBy userJanuary 29, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

A new joint study by SentinelOne SentinelLABS and Censys reveals that the deployment of open source artificial intelligence (AI) has created a vast “layer of unmanaged, publicly accessible AI computing infrastructure” spanning 175,000 unique Ollama hosts in 130 countries.

The company says these systems span both cloud and residential networks around the world and operate outside of the guardrails and monitoring systems that platform providers have in place by default. The majority of exposure is in China, accounting for just over 30%. Countries with the largest infrastructure footprint include the United States, Germany, France, South Korea, India, Russia, Singapore, Brazil, and the United Kingdom

Researchers Gabriel Bernadette Shapiro and Cyrus Cutler added: “Nearly half of the observed hosts were configured with tool invocation capabilities that allow them to execute code, access APIs, and interact with external systems, indicating the increasing implementation of LLM into large system processes.”

cyber security

Ollama is an open-source framework that allows users to easily download, run, and manage large-scale language models (LLMs) locally on Windows, macOS, and Linux. While the service is bound to localhost address 127.0.0,[.]The default is 1:11434, but a simple change to configuring it to bind to 0.0.0 allows it to be exposed to the public internet.[.]0 or public interface.

Like the recently popular Moltbot (formerly Clawdbot), the fact that Ollama is locally hosted and operates outside the corporate security perimeter raises new security concerns. This requires new approaches to distinguish between managed and unmanaged AI computing, the researchers say.

Over 48% of observed hosts advertise tool invocation capabilities via API endpoints, which when queried return metadata highlighting the capabilities they support. Tool calls (or function calls) are features that allow LLM to interact with external systems, APIs, and databases to enhance LLM functionality and obtain real-time data.

“The ability to invoke tools fundamentally changes the threat model. Text-generating endpoints can generate harmful content, whereas tool-enabled endpoints can perform privileged operations,” the researchers noted. “The combination of insufficient authentication and network exposure creates what we consider to be the most serious risks within the ecosystem.”

The analysis also identified hosts that support a variety of modalities beyond text, such as reasoning and vision capabilities, with 201 hosts running unmodified prompt templates that remove safety guardrails.

Due to the exposed nature of these systems, they may be susceptible to LLM jacking. LLM jacking means that a victim’s LLM infrastructure resources are exploited by a malicious attacker at the victim’s expense. These can range from spam email generation and disinformation campaigns to cryptocurrency mining and even reselling access to other criminal groups.

Risk is not theoretical. According to a report released this week by Pillar Security, threat actors are actively targeting publicly exposed LLM service endpoints in order to monetize access to AI infrastructure as part of an LLM jacking campaign called Operation Bizarre Bazaar.

The findings point to a criminal service that includes three components: systematically scanning the internet for public Ollama instances, vLLM servers, and OpenAI-compatible APIs running without authentication, assessing response quality and validating endpoints, and commercializing access at a discounted rate by promoting them as Silver.[.]inc acts as a Unified LLM API gateway.

cyber security

“This end-to-end activity, from reconnaissance to commercial resale, represents the first documented LLM jacking market with full attribution,” said researchers Eilon Cohen and Ariel Vogel. This operation has been attributed to a threat actor named Hecker (also known as Sakuya and LiveGamer101).

The decentralized nature of the exposed Ollama ecosystem, distributed across cloud and residential environments, creates governance gaps, not to mention new avenues for rapid injection and proxying of malicious traffic through the victim’s infrastructure.

“Much of the infrastructure is residential, which complicates traditional governance and requires new approaches that distinguish between managed cloud deployments and distributed edge infrastructure,” the companies said. “Importantly for defenders, LLMs are increasingly being deployed at the edge to translate instructions into actions, so they must be treated with the same authentication, monitoring, and network controls as any other externally accessible infrastructure.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleI made a marshmallow castle with Google’s new AI world generator
Next Article South Carolina measles outbreak is the largest since the U.S. eradicated measles
user
  • Website

Related Posts

Iran-linked RedKitten cyber campaign targets human rights NGOs and activists

January 31, 2026

Mandiant discovers ShinyHunters-style Vishing attack that steals MFA and compromises SaaS platforms

January 31, 2026

CERT Polska details coordinated cyberattacks on over 30 wind and solar farms

January 31, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Iran-linked RedKitten cyber campaign targets human rights NGOs and activists

This week’s science news: ‘Cloud People’ grave discovered in Mexico, pancreatic cancer epidemic, AI swarms ready to take over social media

Mandiant discovers ShinyHunters-style Vishing attack that steals MFA and compromises SaaS platforms

CERT Polska details coordinated cyberattacks on over 30 wind and solar farms

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.