{"id":6225,"date":"2026-04-15T21:51:13","date_gmt":"2026-04-15T21:51:13","guid":{"rendered":"https:\/\/www.europesays.com\/ai\/6225\/"},"modified":"2026-04-15T21:51:13","modified_gmt":"2026-04-15T21:51:13","slug":"ai-based-super-attacker-threat-looms-as-top-crypto-exchanges-scramble-for-access-to-powerful-claude-model","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/ai\/6225\/","title":{"rendered":"\u2018AI-based super attacker\u2019 threat looms as top crypto exchanges scramble for access to powerful Claude model"},"content":{"rendered":"<p>Anthropic\u2019s new AI model found vulnerabilities in code that has existed for years.The company said it had to restrict public access since it was so dangerous.Coinbase and Binance are reportedly vying to add it into their systems.<\/p>\n<p class=\"cs-article-text-type-element\">Major crypto exchanges are rushing to secure access to Anthropic\u2019s Claude Mythos, a new AI model that was restricted to a select group of big tech partners due to its purported hacking ability.<\/p>\n<p class=\"cs-article-text-type-element\">Coinbase and Binance are vying to buy the new model to shore up their defenses, <a href=\"https:\/\/www.theinformation.com\/articles\/crypto-firms-seek-access-anthropics-mythos-shoring-defenses\" rel=\"nofollow noopener\" target=\"_blank\">reported<\/a> The Information on April 14.<\/p>\n<p class=\"cs-article-text-type-element\">The urgency stems from Claude Mythos\u2019 alleged ability to autonomously discover and exploit zero-day vulnerabilities \u2014 security flaws that attackers can exploit before developers even know they exist \u2014 across major operating systems and web browsers. Even worse, the model is so dangerous, according to Anthropic, that the company hasn\u2019t set a date for its public release.<\/p>\n<p class=\"cs-article-text-type-element\">But while the largest exchanges race to arm themselves with AI-powered defenses, the rest of crypto remains locked out \u2014 and vulnerable.<\/p>\n<p class=\"cs-article-text-type-element\">For Deddy Lavid, CEO of cybersecurity firm Cyvers Alert, the scenario is nightmarish.<\/p>\n<p class=\"cs-article-text-type-element\">\u201cIf AI can identify vulnerabilities at scale across core internet infrastructure, crypto will be one of the first markets to feel the impact,&#8221; Lavid told DL News.<\/p>\n<p class=\"cs-article-text-type-element\">\u201cOur ecosystem runs on browsers, wallets, APIs, open-source libraries, and developer tooling \u2014 and in many cases, these are directly connected to value transfer.\u201d And the scope of potential damage is staggering.<\/p>\n<p class=\"cs-article-text-type-element\">\u201cHundreds of millions to billions,\u201d he said.<\/p>\n<p class=\"cs-article-text-type-element\">The crypto industry already suffered $3.4 billion in losses to hackers and malicious actors in 2025, <a href=\"https:\/\/www.chainalysis.com\/blog\/crypto-hacking-stolen-funds-2026\/\" rel=\"nofollow noopener\" target=\"_blank\">according to<\/a> blockchain surveillance firm Chainalysis.<\/p>\n<p class=\"cs-article-text-type-element\">Indeed, the stakes are existential for an industry built on irreversible transactions and lean security teams. That\u2019s because AI doesn\u2019t just read code faster than humans. It explores massive amounts of code lickity-split to find emergent vulnerabilities that traditional audits miss entirely.<\/p>\n<p class=\"cs-article-text-type-element\">Combine that ability with crypto\u2019s instant finality and fragmented infrastructure and the gap between discovering a bug and catastrophic losses collapses from weeks to seconds.<\/p>\n<p><a class=\"col-span-1 relative aspect-[1] lg:aspect-[346\/166]\" href=\"https:\/\/www.dlnews.com\/articles\/defi\/drift-protocol-insider-criticises-defis-lack-of-security\/\" rel=\"nofollow noopener\" target=\"_blank\"><img alt=\"Hacks and Exploits\" loading=\"lazy\" decoding=\"async\" data-nimg=\"fill\" class=\"md:w-[400px] md:h-[191px] object-cover object-center\" style=\"position:absolute;height:100%;width:100%;left:0;top:0;right:0;bottom:0;color:transparent;background-size:cover;background-position:50% 50%;background-repeat:no-repeat;background-image:url(&quot;data:image\/svg+xml;charset=utf-8,%3Csvg xmlns='http:\/\/www.w3.org\/2000\/svg' %3E%3Cfilter id='b' color-interpolation-filters='sRGB'%3E%3CfeGaussianBlur stdDeviation='20'\/%3E%3CfeColorMatrix values='1 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 100 -1' result='s'\/%3E%3CfeFlood x='0' y='0' width='100%25' height='100%25'\/%3E%3CfeComposite operator='out' in='s'\/%3E%3CfeComposite in2='SourceGraphic'\/%3E%3CfeGaussianBlur stdDeviation='20'\/%3E%3C\/filter%3E%3Cimage width='100%25' height='100%25' x='0' y='0' preserveAspectRatio='none' style='filter: url(%23b);' href='https:\/\/dl-fixed-assets.s3.eu-central-1.amazonaws.com\/LOGO_LLAMA.jpg'\/%3E%3C\/svg%3E&quot;)\"   src=\"https:\/\/www.europesays.com\/ai\/wp-content\/uploads\/2026\/04\/1776289873_436_.jpeg\"\/><\/a>No layer is immune<\/p>\n<p class=\"cs-article-text-type-element\">Data from Cyvers shows that large-scale historical losses have hit every layer of the crypto transaction stack.<\/p>\n<p class=\"cs-article-text-type-element\">Centralised exchanges have lost nearly $2 billion, decentralised networks were attacked, losing more than $500 million, cross-chain bridges were crushed for nearly $1 billion, and user wallets have been targeted, said Levid.<\/p>\n<p class=\"cs-article-text-type-element\">There\u2019s three main ways that an AI threat can wallop crypto: small teams, codebases that haven\u2019t been updated in a while, or projects left by the wayside.<\/p>\n<p class=\"cs-article-text-type-element\">\u201cWe routinely see protocols securing millions in value maintained by lean teams, aging codebases, or partially abandoned projects,\u201d Levid said. \u201cIn an AI-driven threat landscape, that gap becomes a major risk multiplier.\u201d<\/p>\n<p>Bitcoin\u00a0<\/p>\n<p class=\"cs-article-text-type-element\">What about Bitcoin, crypto\u2019s dominant protocol?<\/p>\n<p class=\"cs-article-text-type-element\">\u201cBitcoin\u2019s core protocol is relatively simple, battle-tested, and far less exposed to complex logic bugs than other ecosystems,&#8221; Levid told DL News. \u201cIt\u2019s unlikely that AI suddenly \u2018breaks\u2019 Bitcoin itself.\u201d<\/p>\n<p class=\"cs-article-text-type-element\">But the infrastructure around the top cryptocurrency \u2014 wallets, exchanges, Layer 2s \u2014 remains vulnerable.<\/p>\n<p class=\"cs-article-text-type-element\">\u201cAI can uncover vulnerabilities in those layers, and since that\u2019s where most users interact with Bitcoin, the actual losses will occur \u2014 not in the protocol, but at the edges,\u201d Levid said.<\/p>\n<p class=\"cs-article-text-type-element\"><a href=\"https:\/\/www.dlnews.com\/authors\/Pedro-Solimano\/\" rel=\"nofollow noopener\" target=\"_blank\">Pedro Solimano<\/a>\u00a0is a markets correspondent based in Buenos Aires. Got a tip? Email him at\u00a0<a href=\"https:\/\/www.dlnews.com\/articles\/markets\/crypto-exchanges-seek-claude-mythos-access-amid-ai-threat\/mailto:psolimano@dlnews.com\" target=\"_blank\" rel=\" nofollow nofollow nofollow nofollow noopener\">psolimano@dlnews.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"Anthropic\u2019s new AI model found vulnerabilities in code that has existed for years.The company said it had to&hellip;\n","protected":false},"author":2,"featured_media":6226,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[24,25,316],"class_list":{"0":"post-6225","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ai","8":"tag-ai","9":"tag-artificial-intelligence","10":"tag-hacks"},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts\/6225","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/comments?post=6225"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts\/6225\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/media\/6226"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/media?parent=6225"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/categories?post=6225"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/tags?post=6225"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}