However, theres a new twist.
The group now claims it also had access to Rabbits internal messaging service.
This one was for Sendgrid, the email service used for the r1.rabbit.tech subdomain.
The Rabbit R1’s shell was designed by Teenage Engineering with a truly minimalist design. According to a group of hackers, the device’s security was similarly minimal.Photo: Dua Rashid / Gizmodo
The hacker group says the domain houses spreadsheets containing sensitive user data.
The group sent more emails from the[email protected]address to Jason Koebler at404 Media.
That email was previously used to share press announcement details with journalists.
Screenshot: Rabbitude / Gizmodo
Well be looking out to see if the developers have anything more to share about the growing breach.
Instead, it proved it was amalformed and half-baked machinethat couldnt match up to any of its lofty promises.
Now, according to a group of white hat hackers, its even worse than that.
Rabbitude claimed it gained access to the Rabbit codebase back on May 16.
The team also says it has access to theElevenLabs key, which is the system Rabbit uses for text-to-speech.
They said, Rabbit knew about it and did nothing to fix it.
Last month, a ChatGPT outage temporarilymade the rig utterly useless.
Gizmodo could not independently confirm whether the Rabbit went offline due to any meddling with the ElevenLabs API.
We contacted the hacker team for proof and comment, and well update this story if we hear more.
Tech blogger Ed Zitron has alreadydetailedthe companys transformation from working on a crypto metaverse project to its AI unit.
He mentioned things malicious actors could use to get access to all the replies the R1 has ever given.
The team further said, This is real.
Rabbit can dance around it all they like, but it is real, and this did happen.
They had a month to change the keys, and they didnt.
News from the future, delivered to your present.