Blog

Postmortems can’t stop AI-powered crypto fraud



Opinion of: Danor Cohen, Co-Founder and Chief Technology Officer of Kerberus

In 2025, crypto risk is a river. AI is turbocharging scam. Deepfake pitches, voice clones, synthetic support agents – all these are no longer fringe tools but frontline weapons. Last year, crypto scams probably hit a record high. Crypto fraud profits reached at least $ 9.9 billionPartially driven by Generative AI powered methods.

Meanwhile, in 2025, more than $2.17 billion was stolen – and that’s in the first half of the year. Personal wallets are now compromised for nearly 23% of stolen funds cases.

However, the industry has essentially responded with the same stale toolkit: audits, blacklists, refund promises, user awareness drives and post-incident write-ups. They are reactive, slow and ill-suited for a threat that evolves at machine speed.

AI is Crypto’s alarm bell. Tells us how weak the current structure is. Unless we move from patchwork reaction to baked-in-resilience, we risk a collapse not in price, but in confidence.

The AI ​​has reshaped the battlefield

Scams involving deepfakes and synthetic identities have gone from making headlines to mainstream tactics. Generative AI is used to measure lures, clone voices and trick users into sending funds.

The most significant shift is not just a matter of scale. It’s speed and personalization that do the trick. Attackers can now replicate trusted environments or people almost instantly. The move toward real-time defense must also be accelerated—not just as a feature but as an integral part of the infrastructure.

Outside of the crypto sector, regulators and financial authorities are waking up. The monetary authority of Singapore Published A Deepfake risk advisory to financial institutions, signaling that systematic AI fraud is on its radar.

The threat has changed; The industry’s security mindset is non-existent.

Reactive security leaves users as walking targets

Crypto security has long relied on static defenses, including audits, bug bounties, code audits and blocklists. These tools are designed to identify code vulnerabilities, not behavior fraud.