The post Postmortems Can’t Stop AI-Powered Crypto Fraud appeared on BitcoinEthereumNews.com. Opinion by: Danor Cohen, co-founder and chief technology officer of Kerberus In 2025, crypto risk is a torrent. AI is turbocharging scams. Deepfake pitches, voice clones, synthetic support agents — all of these are no longer fringe tools but frontline weapons. Last year, crypto scams likely hit a record high. Crypto fraud revenues reached at least $9.9 billion, partly driven by generative AI-enabled methods. Meanwhile, in 2025, more than $2.17 billion has been stolen — and that’s just in the first half of the year. Personal-wallet compromises now account for nearly 23% of stolen-fund cases. Still, the industry essentially responds with the same stale toolkit: audits, blacklists, reimbursement promises, user awareness drives and post-incident write-ups. These are reactive, slow and ill-suited for a threat that evolves at machine speed. AI is crypto’s alarm bell. It’s telling us just how vulnerable the current structure is. Unless we shift from patchwork reaction to baked-in resilience, we risk a collapse not in price, but in trust. AI has reshaped the battlefield Scams involving deepfakes and synthetic identities have stepped from novelty headlines to mainstream tactics. Generative AI is being used to scale lures, clone voices and trick users into sending funds. The most significant shift isn’t simply a matter of scale. It’s the speed and personalization of deception. Attackers can now replicate trusted environments or people almost instantly. The shift toward real-time defense must also quicken — not just as a feature but as a vital part of infrastructure. Outside of the crypto sector, regulators and financial authorities are waking up. The Monetary Authority of Singapore published a deepfake risk advisory to financial institutions, signaling that systemic AI deception is on its radar. The threat has evolved; the industry’s security mindset has not. Reactive security leaves users as walking targets Security in crypto… The post Postmortems Can’t Stop AI-Powered Crypto Fraud appeared on BitcoinEthereumNews.com. Opinion by: Danor Cohen, co-founder and chief technology officer of Kerberus In 2025, crypto risk is a torrent. AI is turbocharging scams. Deepfake pitches, voice clones, synthetic support agents — all of these are no longer fringe tools but frontline weapons. Last year, crypto scams likely hit a record high. Crypto fraud revenues reached at least $9.9 billion, partly driven by generative AI-enabled methods. Meanwhile, in 2025, more than $2.17 billion has been stolen — and that’s just in the first half of the year. Personal-wallet compromises now account for nearly 23% of stolen-fund cases. Still, the industry essentially responds with the same stale toolkit: audits, blacklists, reimbursement promises, user awareness drives and post-incident write-ups. These are reactive, slow and ill-suited for a threat that evolves at machine speed. AI is crypto’s alarm bell. It’s telling us just how vulnerable the current structure is. Unless we shift from patchwork reaction to baked-in resilience, we risk a collapse not in price, but in trust. AI has reshaped the battlefield Scams involving deepfakes and synthetic identities have stepped from novelty headlines to mainstream tactics. Generative AI is being used to scale lures, clone voices and trick users into sending funds. The most significant shift isn’t simply a matter of scale. It’s the speed and personalization of deception. Attackers can now replicate trusted environments or people almost instantly. The shift toward real-time defense must also quicken — not just as a feature but as a vital part of infrastructure. Outside of the crypto sector, regulators and financial authorities are waking up. The Monetary Authority of Singapore published a deepfake risk advisory to financial institutions, signaling that systemic AI deception is on its radar. The threat has evolved; the industry’s security mindset has not. Reactive security leaves users as walking targets Security in crypto…

Postmortems Can’t Stop AI-Powered Crypto Fraud

Opinion by: Danor Cohen, co-founder and chief technology officer of Kerberus

In 2025, crypto risk is a torrent. AI is turbocharging scams. Deepfake pitches, voice clones, synthetic support agents — all of these are no longer fringe tools but frontline weapons. Last year, crypto scams likely hit a record high. Crypto fraud revenues reached at least $9.9 billion, partly driven by generative AI-enabled methods.

Meanwhile, in 2025, more than $2.17 billion has been stolen — and that’s just in the first half of the year. Personal-wallet compromises now account for nearly 23% of stolen-fund cases.

Still, the industry essentially responds with the same stale toolkit: audits, blacklists, reimbursement promises, user awareness drives and post-incident write-ups. These are reactive, slow and ill-suited for a threat that evolves at machine speed.

AI is crypto’s alarm bell. It’s telling us just how vulnerable the current structure is. Unless we shift from patchwork reaction to baked-in resilience, we risk a collapse not in price, but in trust.

AI has reshaped the battlefield

Scams involving deepfakes and synthetic identities have stepped from novelty headlines to mainstream tactics. Generative AI is being used to scale lures, clone voices and trick users into sending funds.

The most significant shift isn’t simply a matter of scale. It’s the speed and personalization of deception. Attackers can now replicate trusted environments or people almost instantly. The shift toward real-time defense must also quicken — not just as a feature but as a vital part of infrastructure.

Outside of the crypto sector, regulators and financial authorities are waking up. The Monetary Authority of Singapore published a deepfake risk advisory to financial institutions, signaling that systemic AI deception is on its radar.

The threat has evolved; the industry’s security mindset has not.

Reactive security leaves users as walking targets

Security in crypto has long relied on static defenses, including audits, bug bounties, code audits and blocklists. These tools are designed to identify code weaknesses, not behavioral deception.

While many AI scams focus on social engineering, it’s also true that AI tools are increasingly used to find and exploit code vulnerabilities, scanning thousands of contracts automatically.

The risk is twofold: technical and human.

When we rely on blocklists, attackers simply spin up new wallets or phantom domains. When we depend on audits and reviews, the exploit is already live. And when we treat every incident as a “user error,” we absolve ourselves of responsibility for systemic design flaws.

Related: Crisis management for CEX during a cybersecurity threat

In traditional finance, banks can block, reverse or freeze suspicious transactions. In crypto, a signed transaction is final. And that finality is one of crypto’s crowning features and becomes its Achilles’ heel when fraud is instantaneous.

Moreover, we often advise users: “Don’t click unknown links” or “Verify addresses carefully.” These are acceptable best practices, but today’s attacks usually arrive from trusted sources.

No amount of caution can keep pace with an adversary that continuously adapts and personalizes attacks in real time.

Embed protection into the fabric of transaction logic

It’s time to evolve from defense to design. We need transaction systems that react before damage is done.

Consider wallets that detect anomalies in real time and not just flag suspicious behavior but also intervene before harm occurs. That means requiring extra confirmations, holding transactions temporarily or analyzing intent: Is this to a known counterparty? Is the amount out of pattern? Does the address indicate a history of previous scam activity?

Infrastructure should support shared intelligence networks. Wallet services, nodes and security providers should exchange behavioral signals, threat address reputations and anomaly scores with each other. Attackers shouldn’t be able to hop across silos unimpeded.

Likewise, contract-level fraud detection frameworks scrutinize contract bytecode to flag phishing, Ponzi or honeypot behaviors in smart contracts. Again, these are retrospective or layered tools. What’s critical now is moving these capabilities into user workflows — into wallets, signing processes and transaction verification layers.

This approach doesn’t demand heavy AI everywhere; it requires automation, distributed detection loops and coordinated consensus about risk, all embedded in the transaction lanes.

If crypto doesn’t act, it loses the narrative

Let regulators define fraud protection architecture, and we’ll end up constrained. But they’re not waiting. Regulators are effectively preparing to regulate financial deception as part of algorithmic oversight.

If crypto doesn’t voluntarily adopt systemic protections, regulation will impose them — likely through rigid frameworks that curtail innovation or enforce centralized controls. The industry can either lead its own evolution or have it legislated for it.

From defense to assurance

Our job is to restore confidence. The goal is not to make hacks impossible but to make irreversible loss intolerable and exceedingly rare.

We need “insurance-level” behavior: transactions that are effectively monitored, with fallback checks, pattern fuzzing, anomaly pause logic and shared threat intelligence built in. Wallets should no longer be dumb signing tools but active participants in risk detection.

We must challenge dogmas. Self-custody is necessary but not sufficient. We should stop treating security tools as optional — they must be the default. Education is valuable, but design is decisive.

The next frontier isn’t speed or yield; it’s fraud resilience. Innovation should flow not from how fast blockchains settle, but from how reliably they prevent malicious flows.

Yes, AI has exposed weak spots in crypto’s security model. But the threat isn’t smarter scams; it’s our refusal to evolve.

The answer isn’t to embed AI in every wallet; it’s to build systems that make AI-powered deception unprofitable and unviable.

If defenders stay reactive, issuing postmortems and blaming users, deception will continue to outpace defense.

Crypto doesn’t need to outsmart AI in every battle; it must outgrow it by embedding trust.

Opinion by: Danor Cohen, co-founder and chief technology officer of Kerberus.

This article is for general information purposes and is not intended to be and should not be taken as legal or investment advice. The views, thoughts, and opinions expressed here are the author’s alone and do not necessarily reflect or represent the views and opinions of Cointelegraph.

Source: https://cointelegraph.com/news/ai-systems-crypto-fraud-while-the-industry-relies-on-outdated-postmortems-real-time-transaction-defense-must-become-infrastructure?utm_source=rss_feed&utm_medium=feed&utm_campaign=rss_partner_inbound

Market Opportunity
Threshold Logo
Threshold Price(T)
$0.006859
$0.006859$0.006859
-2.44%
USD
Threshold (T) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Wormhole Unveils W Token 2.0 with Enhanced Tokenomics

Wormhole Unveils W Token 2.0 with Enhanced Tokenomics

The post Wormhole Unveils W Token 2.0 with Enhanced Tokenomics appeared on BitcoinEthereumNews.com. Joerg Hiller Sep 17, 2025 13:57 Wormhole introduces W Token 2.0, featuring upgraded tokenomics, a strategic Wormhole Reserve, and a 4% base yield, aiming to optimize ecosystem growth and align incentives. Wormhole has announced a significant upgrade to its native token, unveiling the W Token 2.0. This upgrade introduces new tokenomics including the establishment of a Wormhole Reserve, a 4% base yield, and an optimized unlock schedule, marking a pivotal development in the ecosystem, according to Wormhole. The W Token Evolution Launched in October 2020, Wormhole’s W token has been central to the platform’s mission of creating a connected internet economy. The latest upgrade aims to enhance the token’s utility across more than 40 blockchains. With a capped supply of 10 billion, the W token supports governance, staking, and ecosystem growth, aligning incentives for network security and development. Introducing the Wormhole Reserve The Wormhole Reserve will accumulate value from both onchain and offchain activities, supporting the ecosystem’s expansion. As Wormhole adoption grows, the token will capture value through network expansions and ecosystem applications, ensuring that growth is directly reflected in the token’s value. 4% Base Yield and Governance Rewards Wormhole 2.0 introduces a 4% base yield for W holders who actively participate in governance. The yield, derived from existing token supplies and protocol revenues, is designed to incentivize active participation without inflating the token supply. Optimized Unlock Schedule Updating its token release schedule, Wormhole replaces annual cliffs with bi-weekly unlocks, starting October 3, 2025. This change aims to reduce market pressure and provide a more stable environment for investors and contributors. The bi-weekly schedule will span over 4.5 years, affecting categories such as Guardian Nodes and Community & Launch. Wormhole’s Future Vision With these upgrades, Wormhole aims to expand its role as…
Share
BitcoinEthereumNews2025/09/18 15:48
Hacker behind the UXLINK attack loses $48 million to a phishing scam

Hacker behind the UXLINK attack loses $48 million to a phishing scam

The post Hacker behind the UXLINK attack loses $48 million to a phishing scam appeared on BitcoinEthereumNews.com. The UXLINK exploiter has been phished merely hours after the AI-powered Web 3 social platform’s multi-sig wallet had been breached. Lookonchain had reported on Monday that UXLINK’s multi-signature wallet was compromised, with funds drained across centralized and decentralized exchanges.  According to the blockchain analytics platform, the attacker was phished and lost 542 million UXLINK tokens, valued at approximately $48 million.  Interestingly, the hacker who attacked $UXLINK was targeted by a phishing attack and lost 542M $UXLINK($48M).https://t.co/Cp9QNHPE8Xhttps://t.co/M8tbPYAdiq pic.twitter.com/PxadIIfkDi — Lookonchain (@lookonchain) September 23, 2025 UXLINK had earlier admitted that its multi-sig wallet had been breached, and said that “a significant amount of crypto” was illicitly transferred, but most of them were frozen. “Our team is working through legal and compliant measures to ensure that the UXLINK token supply fully aligns with the rules stated in the whitepaper. The white paper remains the sole community consensus and standard for UXLINK’s token economy,” the project team wrote on X. UXLINK breach involved six wallets Security monitoring firm Cyvers Alerts flagged unusual activity early Monday on an Ethereum address linked to UXLINK. The account executed a delegateCall, removed the existing administrator role, and added a new multisig owner. After making the change, the hacker moved at least $4 million in USDT, $500,000 in USDC, 3.7 wrapped Bitcoin (WBTC), and 25 ETH. Onchain evidence also showed that the attacker sold UXLINK tokens on decentralized exchanges using six separate wallets. These trades netted at least 6,732 ETH, valued at roughly $28.1 million. Hours after pulling off the UXLINK exploit, the attacker themselves fell victim to a phishing scheme. Arbiscan onchain records show the loss occurred on Tuesday at around 02:15 UTC under the transaction hash 0xa70674ccc9caa17d6efaf3f6fcbd5dec40011744c18a1057f391a822f11986ee. Phishing attack on the UXLINK scammer. Source: Arbiscan. Two large transfers of UXLINK tokens were directed from the…
Share
BitcoinEthereumNews2025/09/23 18:34
Tron Makes Bold Moves in TRX Tokens Acquisition

Tron Makes Bold Moves in TRX Tokens Acquisition

Tron's Justin Sun supports TRX's strategic treasury initiative. TRX prices rise, signaling short-term recovery, yet long-term climate is uncertain. Continue Reading
Share
Coinstats2026/02/09 15:28