Summary

  • • 60% of crypto scam inflows in 2025 came from AI-powered attacks
  • • Quantum computing threatens encryption standards not yet updated to post-quantum cryptography
  • • AI lowers barriers for synthetic identities, executive impersonation, and malware evasion
  • • One AI-driven mentorship pretexting scam alone moved over $900,000 from victims
Adjust signal

Details

1.Stat

60% of crypto scam wallet inflows in 2025 were AI-powered

Cryptocurrency intelligence firm Chainalysis attributed the majority of scammer inflows to AI-powered schemes in 2025, marking a significant shift in the threat landscape and signaling that AI is now the dominant tool in the criminal crypto ecosystem.

2.Security Alert

AI mentorship pretexting scam transferred $900,000 from victims

Fraudsters used AI-generated video tutorials posing as crypto-trading education — a tactic called mentorship pretexting — to manipulate victims into transferring funds. One documented case resulted in over $900,000 stolen via smart contract exploits.

3.Security Alert

GreedyBear used AI code generators to create 150 malicious Firefox wallet extensions, stealing $1M+

AI code generators allowed the group to rapidly produce variations of malicious browser extensions, successfully evading malware detectors and antivirus software. The campaign targeted cryptocurrency wallet users and resulted in over $1 million in losses.

4.Insight

AI-generated synthetic identities and executive impersonation are fooling even tech-savvy users

Attackers are deploying AI to convincingly impersonate company executives or fabricate identities for fraud. Ledger's CTO notes simulations are sophisticated enough that users often cannot distinguish between a human and a bot, removing technical literacy as a reliable defense.

5.Tech Info

Quantum computing threatens crypto systems not upgraded to post-quantum cryptography

Quantum advances put encrypted digital assets at risk if the underlying cryptographic standards are not updated. Systems still relying on classical encryption algorithms are particularly vulnerable, and the window for proactive migration is narrowing as quantum hardware matures.

6.Context

Digitization of value is creating a new security frontier analogous to the earlier digitization of information

Ledger's chief experience officer framed the current moment as a once-in-human-history transition — following the digitization of information, society is now digitizing all value. This structural shift amplifies both the stakes of digital asset security and the consequences of failures at scale.

Stat = quantified data point, Security Alert = active threat or attack, Insight = analytical observation, Tech Info = technical mechanism or vulnerability, Context = framing and background

What This Means

The criminal use of AI in cryptocurrency fraud has crossed a threshold where scale, sophistication, and automation are all compounding simultaneously — making traditional user-side defenses increasingly inadequate. At the same time, quantum computing introduces a longer-horizon but structural threat to the cryptographic foundations of digital assets, pressuring service providers to accelerate post-quantum upgrades now rather than reactively. For enterprises and infrastructure providers in the digital asset space, this means security architectures built even a few years ago may already be misaligned with the current threat environment. The combination of near-term AI-driven social engineering and medium-term quantum risk creates a dual-front challenge with little margin for delay.

Sources

Similar Events