Cyberattacks and system vulnerabilities in the cryptocurrency world have long been on the agenda as serious threats. However, artificial intelligence technologies are further amplifying these risks. Charles Guillemet, the technology director at Ledger, stated that recent AI tools are disrupting the balance in cybersecurity.



The role of AI in attacks is increasing
According to Guillemet, attackers can now find system vulnerabilities more quickly and at lower costs. Code flaws that previously required months of work by experienced experts can now be detected in seconds with the help of AI. Guillemet emphasized, “Finding and exploiting system vulnerabilities has become quite easy,” highlighting the magnitude of the current risk.

Recent consecutive attacks support this view. This week, a major vulnerability was exploited in Drift, a decentralized finance protocol within the Solana ecosystem, resulting in approximately $285 million in digital assets being withdrawn. Last week, the yield protocol Resolv suffered a loss of $25 million. According to DefiLlama data, a total of $1.4 billion worth of digital assets were lost over the past year due to cyberattacks or system vulnerabilities.

Security vulnerabilities are spreading rapidly
Guillemet pointed out a very important balance in security. A system being attacked should be more difficult and costly compared to the reward obtainable. However, AI is disrupting this balance. Especially as developers increasingly turn to AI-assisted coding tools, the speed at which security vulnerabilities spread is accelerating.

He highlighted the current danger with the words, “There is no single button that makes something secure. By design, many insecure codes will be produced.” He believes that the crypto ecosystem should rethink security protocols from start to finish and act with awareness of the limitations of traditional auditing methods. Guillemet also emphasized that formal verification of code, i.e., proving code correctness through mathematical methods, can be more effective than conventional audits. He underlined that hardware-based security provides an important layer of protection, with hardware wallets minimizing attack risks by isolating private keys from internet connections.

Recent malicious software developments also increase the threat level. Malicious programs that search for wallet keys on compromised phones can lead to asset withdrawals without any user action.

Guillemet stated that the average crypto user should not assume that systems are entirely secure.

“It’s useful to think that most of the systems in use cannot be trusted.”

In conclusion, increasing demand for methods such as cold storage, stronger transaction security, and keeping sensitive data offline may become more popular among crypto users in the future. However, relying solely on software is not enough; preparedness against physical attacks is also necessary. Guillemet mentioned that security adaptation for critical systems like wallets and protocols will improve, but the overall software ecosystem may face challenges during this process.

THIS IS NOT INVESTMENT ADVICE

#GateSquareAprilPostingChallenge $BTC $SOL
BTC2,29%
SOL1,2%
ETH2,19%
View Original
post-image
post-image
post-image
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
Add a comment
Add a comment
No comments
  • Pin