The first half of 2025 opinion One of the worst waves of encryption penetration so far, with more than 3.01 billion dollars stolen. Amnesty International was a large part of it, Make the easiest fraud operations For running and leaving even low -skilled criminals at work.
In the United States alone, approximately 160,000 coding complaints I mentioned In 2024.
“The opponents themselves do not differ mainly between traditional financing and the encryption industry, but some of the tactics they use and the evolution of the attackers in the encryption space are significantly higher,” he said. Noura BirzCiso in Grayscale.
Artificial intelligence nourishes a new wave of attacks
Amnesty International Users Use Data Analysis of Social Media, online forums and Blockchain transactions. By linking data through these sources, they can discover patterns and choose potential victims Hunting Or plagiarism campaigns. Fake websites, social media accounts and videos are so realistic that it is difficult to determine their health.
Some criminals use fake commercial robots to display false profits, give misleading signals, or encourage users to deposit money or follow bad financial advice. Plastic platforms or applications can be built on fake algorithms that are highly returned, but they steal the deposited encryption. The fraudsters can bypass Kyc with a created images or accreditation data.
Robots appear in encryption communities on Discord and Telegram, or impersonating the personnel or project managers to deceive users in sharing portfolio details or clicking on harmful links. Others simulate the support agents in the live chats to steal the login approval or recovery phrases.
Long -term fraud, known as the name SlaughterInvolve confidence building for weeks or months before persuading the victims to invest large sums on fake platforms.
The researchers have Find CYBERCRIMINALALs sell DeepFake tools and services in forums, social media and messaging platforms. These tools allow users to create audio, videos and fake pictures, including facial bodies and DeepFake videos. Prices differ: Facial exchange services such as Swapface cost between free and 249 dollars per month, while DeepFake videos are usually ranged between $ 60 to $ 500, depending on the complexity and quality.
A single attacker can now use artificial intelligence to create and manage thousands of fake support messages or investment robots.
Deepfake Crypto Scams targets Tiktok users and YouTube
These fraud operations often work under a mask of legitimacy, using Deepfake videos for well -known characters like Elon Musk or MR. Beast or Doald Trump to attract users in fraudulent currency plans. Essentially appear Tikhak And YouTube, which is logical because both systems have billions of active users.
National Cyber Security Center (NCSC) I mentioned AI-Ei coding process on YouTube. The channel was characterized by a potential encoding expert created in artificial intelligence and added more than 100,000 followers in one day. Videos were directed to viewers to play the claim code to activate the developer’s position in TradingView (drawing and trading system), but it installed harmful programs stole passwords and access to email and the contents of the encryption portfolio.
New York authorities recently Froze $ 300,000 of stolen cryptocurrency and closing more than 100 frauds linked to a Vietnam -based group that targeted Russian -speaking population in Brooklyn with fake Facebook investment ads.
The consequences of these fraud are not only financial. Over time, people begin to lose confidence and skepticism about the security of encryption. Investors will consider investing if they cannot distinguish between legitimate communications from the advanced DeepFake suicide.
How can encryption companies avoid fraud
- Use multiple layers of security such as protection walls, DDOS protection, and detection systems that can discover early threats.
- Follow Kyc and AML rules to reduce fraud.
- Monitor real -time transactions to capture an unusual activity such as large withdrawals or suspicious deposits.
- Maintain your systems to fix weaknesses, and check everything Third -party sellers And smart contracts.
- Teach users how to stay safe so that they are less likely to fall due to fraud. Your data reserves regularly and make sure it is encrypted. Do the recovery plans often to make sure that you can recover data if something happens.
- Frankly with users about security concerns. The enlightened society can help protect itself.
- Test your systems regularly by doing this Hurricane tests And ethical piracy to find weak spots.
- Training all employees on the latest risk of security and safe practices.
- Working with other exchanges to exchange information about threats and bad actors, so that everyone can improve their defenses together.




