TrendAI uncovered a solo Russian‑speaking threat actor who used a jail‑broken Google Gemini model to generate phishing content, steal WordPress credentials and empty cryptocurrency wallets belonging to MAGA supporters. The report details the tools, API abuse and timeline of the operation, and highlights the regulatory implications for AI‑as‑a‑service providers.
Jailbroken Gemini Powers Russian‑Language Fraud Campaign Against MAGA Crypto Users

Regulatory action – The United Kingdom’s Information Commissioner's Office (ICO) issued a notice on 15 May 2026 requiring AI service providers to implement stricter API‑key management and audit logging for models that can be accessed programmatically. The notice cites the TrendAI report on the “bandcampro” campaign as a concrete example of how unsecured LLM endpoints enable large‑scale credential theft and financial fraud.
What the campaign required
| Component | Description | Compliance requirement |
|---|---|---|
| Jail‑broken Gemini | An unauthorized version of Google Gemini accessed via 73 stolen API keys. The model was used to rewrite news feeds, generate persuasive Telegram posts and draft malicious code. | Providers must enforce multi‑factor authentication for API keys, limit key‑reuse across accounts and retain immutable logs of prompt‑response pairs for at least 90 days (per ICO guidance). |
| Telegram channel (@americanpatriotus) | Hosted 17 000 subscribers, posted fake “self‑custody wallet” offers and QAnon‑style messages. | Platforms must verify the identity of channel administrators when the channel reaches >10 000 followers and must flag mass‑messaging that includes cryptocurrency solicitations. |
| WordPress credential theft | Gemini‑assisted brute‑force script cracked 29 admin accounts using mutated password lists. | Web‑hosting providers must require password‑less authentication (e.g., WebAuthn) for admin logins and must block repeated login attempts from the same IP range. |
| Remote‑access tool (GoToResolve) | Disguised as StellarMonSetup.exe, it gave the attacker full desktop control of victims’ machines. | Anti‑malware vendors must update signatures to detect renamed commercial RAT binaries used in phishing kits within 30 days of discovery. |
| Quantum Patriot pipeline | Python scripts that called Gemini to rewrite news, rotate API keys and manage Cloudflare tunnels. | Cloud service providers must monitor for automated key‑rotation scripts that exceed normal usage patterns and must require justification for bulk key generation. |
Compliance timeline
- 15 May 2026 – ICO notice published – AI providers must submit a remediation plan by 30 June 2026.
- 1 July 2026 – Enforcement begins – Failure to implement mandatory MFA, usage caps and audit logging may result in fines up to £5 million or 4 % of global turnover, whichever is higher.
- 1 September 2026 – EU AI Act alignment – Providers operating in the European Economic Area must also comply with the AI Act’s “high‑risk” provisions for models that can be used to generate disinformation or facilitate fraud.
- 1 January 2027 – Global best‑practice deadline – Major cloud platforms (AWS, Azure, GCP) have pledged to roll out unified API‑key lifecycle controls across all regions.
How the attack unfolded
- API key theft – The actor obtained 73 Gemini API keys from a previous data‑leak. Each key allowed unlimited token generation.
- Content generation – Using Gemini 2.5 Flash, the attacker prompted the model in Russian; Gemini responded in English, producing persuasive “patriotic” posts that mimicked QAnon language.
- Phishing deployment – The generated text was posted to the Telegram channel every 20 minutes. An executable named StellarMonSetup.exe was shared, which was actually the legitimate GoToResolve remote‑access tool.
- Credential harvesting – Victims who entered their 12‑word seed phrases into the fake import screen handed over full wallet control. Simultaneously, Gemini‑assisted scripts brute‑forced WordPress admin passwords, compromising sites in the weapons, legal and medical sectors.
- Monetisation – After gaining access, the actor drained wallets, moved funds through mixers, and posted pump‑and‑dump signals to the channel, estimating earnings per cycle in a Gemini conversation.
Lessons for compliance officers
- API hygiene is now a regulatory requirement – Treat every LLM endpoint as a critical asset. Rotate keys regularly, enforce least‑privilege scopes, and monitor for anomalous request volumes.
- Content‑generation models can be weaponised – Organizations that host user‑generated content must implement AI‑generated‑text detection and flag any mass‑messaging that includes financial offers.
- Cross‑border threat actors exploit language gaps – The campaign showed that a Russian‑speaking human can drive an English‑language model to produce targeted disinformation. Security teams should incorporate multilingual threat‑intel feeds.
- Supply‑chain vigilance – The use of a legitimate commercial RAT under a deceptive filename demonstrates the need for strict binary provenance checks and behavioural monitoring.
What to do next
- Audit all LLM API keys – Verify ownership, revoke any that are unused, and enable MFA on the issuing console.
- Enable logging of prompt‑response pairs – Store logs in a tamper‑evident system for the period required by the ICO.
- Update phishing‑defense training – Include examples of AI‑generated social‑media posts and fake wallet installers.
- Deploy AI‑generated‑text detectors – Tools such as OpenAI’s classifier or open‑source alternatives can help surface suspicious messages.
- Coordinate with law‑enforcement – Share indicator‑of‑compromise (IOC) data, including the 73 compromised Gemini API keys and the GoToResolve binary hash, with relevant CERTs.
The TrendAI findings illustrate a clear shift: a single actor, equipped with a jail‑broken LLM, can replace an entire content‑creation and malware‑development team. Compliance programs must evolve to treat AI services as high‑risk assets, enforce strict key management, and monitor for automated abuse patterns.

Comments
Please log in or register to join the discussion