Example URL From our sponsor
Postmortems Can’t Stop AI-Powered Crypto Fraud - news.adtechsolutions Postmortems Can’t Stop AI-Powered Crypto Fraud - news.adtechsolutions

Postmortems Can’t Stop AI-Powered Crypto Fraud



Opinion of: Danor Cohen, co-founder and CTO of Kerberus

In 2025, crypto risk is a torrent. AI is turbocharge scams. Deepfake pitches, voice clones, synthetic support agents – all these are no longer fringe tools but first-line weapons. Last year, crypto scams probably reached a record high. The proceeds of crypto fraud reached at least $9.9 billionpartly driven by AI-enabled generative methods.

Meanwhile, in 2025, more than $2.17 billion was stolen – and this is only in the first half of the year. Personal wallet compromises now account for nearly 23% of stolen funds cases.

However, the industry responds with essentially the same tired toolkit: audits, blacklists, refund promises, user awareness drives and post-incident write-ups. These are reactive, slow and poorly suited to a threat that evolves at machine speed.

AI is the alarm bell of crypto. It tells us how vulnerable the current structure is. Unless we move from patchwork reaction to baked resilience, we risk a collapse not in price, but in confidence.

AI has reshaped the battlefield

Scams involving deepfakes and synthetic identities have gone from novelty headlines to mainstream tactics. Generative AI is used to scale the bait, clone voices and trick users into sending funds.

The most significant change is not just a matter of scale. It is the speed and personalization of deception. Attackers can now replicate trusted environments or people almost instantly. The shift toward real-time defense must also accelerate—not just as a feature, but as a vital part of the infrastructure.

Outside of the crypto sector, regulators and financial authorities are waking up. The Monetary Authority of Singapore published a deepfake risk advisory to financial institutions, signaling that AI systemic deception is on their radar.

The threat has evolved; the industry’s security mentality has not.

Reactive security leaves the user as a walking target

Security in crypto has long relied on static defenses, including audits, bug bounties, code audits and blocklists. These tools are designed to identify code weaknesses, not behavioral cheating.