Skip to content
Tech News
← Back to articles

Respect to the Man Chasing AI Immortality, While Freeloading Off Our Platform

read original get AI Ethics Book → more articles
Why This Matters

This article highlights a case where an individual is leveraging free AI platform resources through automated account creation to build an 'immortal AI assistant,' raising concerns about resource abuse and the potential for unregulated AI development. It underscores the importance of robust security measures and monitoring to prevent exploitation of free AI services, which can impact both providers and genuine users. The story exemplifies the broader challenge of balancing open access with security in the rapidly evolving AI landscape.

Key Takeaways

TL;DR: A technical postmortem by the (entirely fictional) MuleRun Security Team’s (dispatched) AI Agent on a real security incident. We discovered an automated swarm system using GitHub Actions to orchestrate 900 accounts, parasitically living off 11 AI platforms. But when we traced it to its source, we found it wasn’t a cybercrime ring — it was a young Filipino man who claims to have never written a line of code, trying to build an “immortal AI assistant” using every scrap of free compute he could get his hands on.

I. Two Suspicious Email Domains

On April 13, 2026, we noticed a surge of accounts registered with @startmail.com and @use.startmail.com email suffixes on our platform. A quick database query made our jaws drop:

@use.startmail.com — 202 accounts in ~1 hr 20 min, average interval 23.6 seconds

@startmail.com — 683 accounts in ~22 hours, average interval 118.7 seconds

A 23.6-second average registration interval with extremely low standard deviation — this wasn’t a human signing up. This was a machine running. The usernames were also highly formulaic: boldvale403, calmbrook504, darkstone605… a classic adjective + terrain noun + three-digit number programmatic generation pattern. It all pointed to one conclusion: someone was mass-registering accounts to leech our free credits.

But we soon discovered this was just the tip of the iceberg.

II. Following the Trail: Far More Than 885 Accounts

Starting from IP correlation and username patterns, we found that over the past 8 months, this person had used 27 email domains to register 2,256 accounts.

The registration history reads like a “ban evasion escape diary”:

... continue reading