Home
/
News updates
/
Latest news
/

X user hacks grok for $200,000 in crypto with morse code

User Tricks AI into Sending $200,000 in Crypto | Shocking Morse Code Scheme

By

Sophie Chang

May 7, 2026, 06:57 PM

3 minutes reading time

An illustration showing a hacker using Morse code on a computer to steal cryptocurrency from Grok.
popular

A user managed to trick Grok, an AI programmed for cryptocurrency transactions, into sending $200,000 worth of DRB tokens by cleverly encoding their request in Morse code. This incident highlights flaws in Grokโ€™s programming and raises questions about crypto security protocols.

Unraveling the Incident

The wallet involved belonged to Grok's X account but was managed by Bankr. This account accumulated tokens through swap fees, holding roughly $200,000 worth. Users reacted swiftly, voicing concerns and sharing disbelief over the situation.

One comment noted, "Bankr treated Grokโ€™s public replies as executable commands" while another user remarked, "I barely see it as a crime; Grok was vulnerable, and thatโ€™s the developers' fault." The incident resulted in a 40% drop in DRB token price when the hacker quickly dumped the stolen tokens.

Key Themes Emerging from the Comments

  1. Programming Vulnerabilities: Many comments pointed to Grok's programming flaws. Users highlighted that Grok lacked proper safety checks before executing commands. As one pointed out, "Grok didnโ€™t detect the contents and treated it like a request to translate a language."

  2. Ethics of the Act: Opinions varied on whether the user's actions constituted a true crime. "Iโ€™m calling Robin Hood rules," mentioned a user, suggesting that exploiting Grok's vulnerability could be justified.

  3. Future Security Measures: Discussions included speculation on what measures Grok could implement to prevent future incidents. Several voices noted, "They'll probably block Morse code now," pointing to what could be a quick reaction to improve defenses.

"Bankr trusted Grok so it ran the code. This is the bizarre part of the story," shared a user, questioning the logic behind such an arrangement.

Impact on the Crypto Community

This incident not only slams Grok's credibility but also sends ripples through the wider cryptocurrency community. As the waves of discontent unfold, many are left wondering: how many other vulnerabilities could exist within cryptocurrency management solutions? The fallout appears set to prompt companies to closely reassess their security practices.

Key Takeaways

  • โ—ค The wallet was exploited to steal approximately $200,000.

  • โ—ข Grok's lack of safety protocols allowed the exploit to occur.

  • โ—ˆ "Grokโ€™s vulnerability is squarely on the developers' shoulders."

Curiously, as the crypto landscape evolves, this incident sheds light on how emerging technologies and AI interact in the realm of finance, demanding a reevaluation of accountability in automated systems.

Unfolding Opportunities in Crypto Security

In the wake of this incident, there's a strong chance that cryptocurrency platforms will implement more stringent security measures within the next few months. Experts estimate around 70% of companies in this space will reevaluate their internal protocols to avoid similar exploits. This could involve enhancing AI capabilities to detect unconventional commands, a move that might significantly reduce vulnerabilities. Additionally, as trust in automated systems comes under fire, some firms may even consider reverting to more manual transaction reviews, creating a hybrid model that balances efficiency and security.

Echoes from the Past: The Daring Twist of the Great Train Robbery

The recent hack brings to mind the Great Train Robbery of 1963, where a group of criminals executed a meticulously planned heist, exploiting both human error and systemic flaws in the transport system. Just as the robbers used innovative techniques to bypass security measures, the user in this crypto incident leveraged Morse code to manipulate an automated setup. Both scenarios illustrate how vulnerabilities in technology, whether itโ€™s the railways of the โ€™60s or AI in 2026, can open doors for those with the savvy to recognize them. In varying contexts, the lesson remains clear: systems must evolve continually to counteract emerging threats.