Marktkapitalisierung
24h Vol
10071
Kryptowährungen
58.26%
Bitcoin Aktie

AI Could Let Hackers Replicate Security Tools, Immunefi Warns — Ethereum DeFi Risks May Rise

AI Could Let Hackers Replicate Security Tools, Immunefi Warns — Ethereum DeFi Risks May Rise


CoinOtag
2025-10-01 08:02:35

AI crypto attacks occur when attackers use artificial intelligence to automate vulnerability discovery, phishing, and exploitation; Immunefi warns these tools now let threat groups find and weaponize bugs in minutes, raising thefts and forcing defenders to embed AI into CI/CD and multi-layer defenses. AI accelerates vulnerability discovery and exploitation Automated phishing and voice-synthesized social engineering reduce attack costs to pennies. Over 3% of total value locked was stolen in 2024; Immunefi has paid $100M+ in bounties. AI crypto attacks: learn defensive steps now with Immunefi insights — read best-practice countermeasures and adopt a unified security platform. What are AI crypto attacks and why do they matter? AI crypto attacks are instances where attackers use artificial intelligence to automate discovery, exploitation, and social engineering against blockchain projects. These attacks matter because they compress the time from finding a vulnerability to exploiting it, increasing theft risk and forcing projects to change how they secure code and infrastructure. How has AI changed vulnerability discovery and exploitation? AI tooling that once helped defenders is now widely available, enabling attackers to find and weaponize vulnerabilities rapidly. Immunefi CEO Mitchell Amador told COINOTAG that advanced auditing agents and automated scanners are no longer exclusive to security firms and can be replicated by state-linked groups and organized cybercrime. Automated scans and prompt-driven exploit generation reduce cost per attack to pennies, while AI-generated phishing calls and messages drastically improve social engineering success rates. Industry data shows over 3% of total value locked was stolen across the ecosystem in 2024, highlighting the real-world impact. { "@context": "https://schema.org", "@type": "NewsArticle", "headline": "AI crypto attacks are accelerating — Immunefi CEO on defenses", "description": "Immunefi warns AI has given attackers defender-grade tools, speeding discovery and exploitation. Industry must adopt unified AI-driven defenses and CI/CD integration.", "datePublished": "2025-10-01T08:00:00Z", "dateModified": "2025-10-01T08:00:00Z", "author": { "@type": "Organization", "name": "COINOTAG" }, "publisher": { "@type": "Organization", "name": "COINOTAG", "logo": { "@type": "ImageObject", "url": "https://en.coinotag.com/logo.png" } }, "mainEntityOfPage": { "@type": "WebPage", "@id": "https://en.coinotag.com/ai-crypto-attacks-immunefi-report-2025" }} Why are bug bounties and audits no longer enough? Bug bounties and manual audits remain valuable but face limits. Immunefi has facilitated over $100 million in payouts to white-hat hackers and distributes $1M–$5M monthly, yet CEO Mitchell Amador says the approach has “hit the limits” due to scaling and incentive issues. Automated AI scanning catches common, low-hanging issues earlier, reducing the burden on manual reviews. However, subtle and context-dependent vulnerabilities still require deep human expertise, so hybrid models—AI-assisted audits plus targeted human review—are becoming the practical standard. How are attackers bypassing code security? Major incidents now often exploit non-code vectors: compromised front-ends, multi-sig misconfigurations, key-management failures, and sophisticated phishing. The $1.4 billion Bybit incident this year illustrated attackers replacing front-end multisig transactions rather than exploiting smart contract code. Immunefi emphasizes that a single large outlier hack each year follows a predictable distribution pattern; defending only code is insufficient without stronger infrastructure, governance, and human verification layers. { "@context": "https://schema.org", "@type": "HowTo", "name": "How to defend against AI-driven crypto attacks", "description": "Practical steps projects can adopt to reduce exposure to AI-accelerated exploits.", "image": [], "estimatedCost": { "@type": "MonetaryAmount", "currency": "USD", "value": "Varies" }, "step": [ { "@type": "HowToStep", "name": "Embed AI into CI/CD and repositories", "text": "Integrate automated AI auditing agents into GitHub repositories and CI/CD pipelines to catch vulnerabilities before code reaches production." }, { "@type": "HowToStep", "name": "Adopt whitelist-only access controls", "text": "Implement whitelist-only policies for internal resources to reduce successful spear-phishing and lateral movement." }, { "@type": "HowToStep", "name": "Deploy multi-sig manual review for significant transactions", "text": "Assign trusted, security-focused reviewers to manually confirm high-value transactions before execution." }, { "@type": "HowToStep", "name": "Combine AI scanning with targeted human audits", "text": "Use hybrid models where AI handles scale and humans focus on context-dependent, complex vulnerabilities." } ]} { "@context": "https://schema.org", "@type": "FAQPage", "mainEntity": [ { "@type": "Question", "name": "Can AI tools be used by criminal groups to hack crypto projects?", "acceptedAnswer": { "@type": "Answer", "text": "Yes. According to Immunefi CEO Mitchell Amador, AI has lowered the barrier so that well-funded criminal groups and nation-state actors can replicate defender tooling to find and exploit vulnerabilities rapidly." } }, { "@type": "Question", "name": "What immediate steps can projects take to reduce AI-driven attacks?", "acceptedAnswer": { "@type": "Answer", "text": "Embed AI auditing in CI/CD, enforce whitelist-only access controls, adopt multi-sig manual reviews for major transactions, and pair automated scanning with expert human audits." } }, { "@type": "Question", "name": "Are bug bounties still effective against AI-accelerated threats?", "acceptedAnswer": { "@type": "Answer", "text": "Bug bounties remain essential for discovering edge cases, but they have scaling limits. Hybrid approaches that amplify researchers with AI are advised to increase coverage." } } ]} Frequently Asked Questions How cheap are AI-enabled phishing and social engineering attacks? AI can generate convincing voice and message impersonations at scale for negligible cost. Immunefi’s CEO noted that AI-driven calls and prompts can be executed for pennies, enabling mass spear-phishing campaigns that dramatically raise successful compromise rates. Should every project adopt AI auditing tools? Yes—integrating AI into development pipelines is recommended. Immunefi predicts widespread CI/CD integration will drive a precipitous drop in exploit volume within one to two years, while hybrid human checks remain essential for complex decisions. Key Takeaways AI levels the playing field : Defender-grade tools are now accessible to attackers, increasing speed of exploitation. Hybrid defenses work best : Combine AI scanning with targeted human expertise and manual review processes. Broader attack surface : Focus beyond smart contracts—multi-sig, front-ends, phishing, and governance are high-risk areas. Conclusion AI has fundamentally changed both offensive and defensive security in crypto. Immunefi and other security leaders recommend embedding AI into CI/CD, enforcing strict access controls, and building unified security platforms to defend against fast-moving threats. Projects that adopt hybrid AI-human security models and prioritize infrastructure hardening will be best positioned to reduce incidents going forward. Published by COINOTAG — updated 2025-10-01. Sources referenced as plain text: Immunefi CEO Mitchell Amador remarks (reported to COINOTAG), SentinelLABS intelligence findings, HackenProof commentary, and industry incident tallies including the Bybit front-end compromise.


Lesen Sie den Haftungsausschluss : Alle hierin bereitgestellten Inhalte unserer Website, Hyperlinks, zugehörige Anwendungen, Foren, Blogs, Social-Media-Konten und andere Plattformen („Website“) dienen ausschließlich Ihrer allgemeinen Information und werden aus Quellen Dritter bezogen. Wir geben keinerlei Garantien in Bezug auf unseren Inhalt, einschließlich, aber nicht beschränkt auf Genauigkeit und Aktualität. Kein Teil der Inhalte, die wir zur Verfügung stellen, stellt Finanzberatung, Rechtsberatung oder eine andere Form der Beratung dar, die für Ihr spezifisches Vertrauen zu irgendeinem Zweck bestimmt ist. Die Verwendung oder das Vertrauen in unsere Inhalte erfolgt ausschließlich auf eigenes Risiko und Ermessen. Sie sollten Ihre eigenen Untersuchungen durchführen, unsere Inhalte prüfen, analysieren und überprüfen, bevor Sie sich darauf verlassen. Der Handel ist eine sehr riskante Aktivität, die zu erheblichen Verlusten führen kann. Konsultieren Sie daher Ihren Finanzberater, bevor Sie eine Entscheidung treffen. Kein Inhalt unserer Website ist als Aufforderung oder Angebot zu verstehen