{"id":268710,"date":"2025-10-01T08:31:12","date_gmt":"2025-10-01T08:31:12","guid":{"rendered":"https:\/\/www.europesays.com\/us\/268710\/"},"modified":"2025-10-01T08:31:12","modified_gmt":"2025-10-01T08:31:12","slug":"bug-bounties-hit-limits-as-ai-puts-crypto-hackers-on-equal-footing","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/us\/268710\/","title":{"rendered":"Bug Bounties Hit Limits as AI Puts Crypto Hackers on Equal Footing"},"content":{"rendered":"\n<p class=\"yf-1090901\">AI has handed crypto attackers the same tools defenders use, and the results are costing the industry billions, experts say.<\/p>\n<p class=\"yf-1090901\">Mitchell Amador, CEO of Immunefi, told Decrypt during the start of Token2049 week in Singapore that AI has turned vulnerability discovery into near-instant exploitation, and that the advanced auditing tools his firm built are no longer exclusive to the good guys.<\/p>\n<p class=\"yf-1090901\">&#8220;If we have that, can the North Korean Lazarus group build similar tooling? Can Russian Ukrainian hacker groups build similar such tooling?&#8221; Amador asked. &#8220;The answer is that they can.&#8221;<\/p>\n<p class=\"yf-1090901\">Immunefi&#8217;s AI auditing agent outperforms the vast majority of traditional auditing firms, but that same capability is within reach of well-funded hacking operations, he said.<\/p>\n<p class=\"yf-1090901\">\u201cAudits are great, but it&#8217;s nowhere near enough to keep up with the rate of innovation and the rate of the compounding improvement of the attackers,&#8221; he said.<\/p>\n<p class=\"yf-1090901\">With over 3% of total value locked stolen across the ecosystem in 2024, Amador said that while security is no longer an afterthought, projects &#8220;struggle to know how to invest and how to allocate resources there effectively.&#8221;\u00a0<\/p>\n<p class=\"yf-1090901\">The industry has moved from &#8220;a prioritization problem, which is a wonderful thing, into it being a knowledge and educational problem,&#8221; he added.<\/p>\n<p class=\"yf-1090901\"><a href=\"https:\/\/decrypt.co\/312561\/north-koreas-hacking-ops-lazarus-group-paradigm\/\" rel=\"nofollow noopener\" target=\"_blank\" data-ylk=\"slk:There&#039;s More to North Korea&#039;s Hacking Ops Than Just Lazarus Group: Paradigm;elm:context_link;itc:0;sec:content-canvas\" class=\"link \">There&#8217;s More to North Korea&#8217;s Hacking Ops Than Just Lazarus Group: Paradigm<\/a><\/p>\n<p class=\"yf-1090901\">AI has also made sophisticated social engineering attacks dirt cheap, according to Amador.\u00a0<\/p>\n<p class=\"yf-1090901\">&#8220;How much do you think that phone call costs?&#8221; he said, referring to AI-generated phishing calls that can impersonate colleagues with disturbing accuracy. &#8220;You can execute that for pennies with a well-thought-out system of prompts, and you can execute those in mass. That is the scary part of AI.&#8221;<\/p>\n<p class=\"yf-1090901\">The Immunefi CEO said groups such as Lazarus likely employ &#8220;at least a few hundred guys, if not probably low thousands working around the clock&#8221; on crypto exploits as a major revenue source for North Korea&#8217;s economy.\u00a0<\/p>\n<p class=\"yf-1090901\">\u201cThe competitive pressures stemming from North Korea&#8217;s annual revenue quotas,&#8221; drive operatives to protect individual assets and \u2018outperform colleagues\u2019 rather than coordinate security improvements, a recent SentinelLABS intelligence report found.<\/p>\n<p class=\"yf-1090901\">&#8220;The game with AI-driven attacks is that it speeds up the rate at which something can go from discovery to exploit,&#8221; Amador told Decrypt. &#8220;To defend against that, the only solution is even faster countermeasures.&#8221;<\/p>\n<p class=\"yf-1090901\">Immunefi&#8217;s response has been to embed AI directly into developers&#8217; GitHub repositories and CI\/CD pipelines, catching vulnerabilities before code reaches production, he noted, while predicting this approach will trigger a &#8220;precipitous drop&#8221; in <a href=\"https:\/\/decrypt.co\/resources\/defi-decentralized-finance-explained-guide-learn\" rel=\"nofollow noopener\" target=\"_blank\" data-ylk=\"slk:DeFi;elm:context_link;itc:0;sec:content-canvas\" class=\"link \">DeFi<\/a> hacks within one to two years, potentially reducing incidents by another order of magnitude.<\/p>\n<p class=\"yf-1090901\"><a href=\"https:\/\/decrypt.co\/323265\/bitmex-lazarus-group-phishing-unsophisticated\/\" rel=\"nofollow noopener\" target=\"_blank\" data-ylk=\"slk:BitMEX Blocks Lazarus Phishing Attempt, Calls Tactics \u2018Unsophisticated\u2019;elm:context_link;itc:0;sec:content-canvas\" class=\"link \">BitMEX Blocks Lazarus Phishing Attempt, Calls Tactics \u2018Unsophisticated\u2019<\/a><\/p>\n<p class=\"yf-1090901\">Dmytro Matviiv, CEO of Web3 bug bounty platform HackenProof, told Decrypt that &#8220;manual audits will always have a place, but their role will shift.\u201d<br \/>\u201cAI tools are increasingly effective at catching &#8216;low-hanging fruit&#8217; vulnerabilities, which reduces the need for large-scale manual reviews of common mistakes,\u201d he said. \u201cWhat remains are the subtle, context-dependent issues that require deep human expertise.\u201d<\/p>\n<p class=\"yf-1090901\">To defend against AI-powered attacks, Immunefi has implemented a whitelist-only policy for all company resources and infrastructure, which Amador said has &#8220;arrested thousands of these attempted spear phishing techniques very effectively.&#8221;\u00a0<\/p>\n<p class=\"yf-1090901\">But this level of vigilance isn&#8217;t practical for most organizations, he said, noting &#8220;we can do that at Immuneify because we are a company that lives and breathes security and vigilance. Normal people can&#8217;t do that. They have lives to live.&#8221;<\/p>\n<p class=\"yf-1090901\">Immunefi has facilitated over $100 million in payouts to white-hat hackers, with steady monthly distributions ranging from $1 million to $5 million. However, Amador told Decrypt that the platform has &#8220;hit the limits&#8221; as there aren&#8217;t &#8220;enough eyeballs&#8221; to provide the necessary coverage across the industry.<\/p>\n<p class=\"yf-1090901\">The constraint isn&#8217;t just about researcher availability, as bug bounties face an intrinsic zero-sum game problem that creates perverse incentives for both sides, according to Amador.\u00a0<\/p>\n<p class=\"yf-1090901\">Researchers must reveal vulnerabilities to prove they exist, but they lose all leverage once disclosed. Immunefi mitigates this by negotiating comprehensive contracts that specify everything before disclosure occurs, Amador said.<\/p>\n<p class=\"yf-1090901\">Meanwhile, Matviiv told Decrypt that he doesn&#8217;t think &#8220;we&#8217;re anywhere close to exhausting the global pool of security talent,&#8221; noting that new researchers join platforms annually and progress quickly from \u201csimple findings to highly complex vulnerabilities.\u201d<\/p>\n<p class=\"yf-1090901\">&#8220;The challenge is making the space attractive enough in terms of incentives and community for those new faces to stick around.&#8221;<\/p>\n<p class=\"yf-1090901\"><a href=\"https:\/\/decrypt.co\/315329\/manta-co-founder-targeted-by-lazarus-group-in-zoom-phishing-attempt\/\" rel=\"nofollow noopener\" target=\"_blank\" data-ylk=\"slk:Manta Co-Founder \u2018Targeted\u2019 by Lazarus Group in Zoom Phishing Attempt;elm:context_link;itc:0;sec:content-canvas\" class=\"link \">Manta Co-Founder \u2018Targeted\u2019 by Lazarus Group in Zoom Phishing Attempt<\/a><\/p>\n<p class=\"yf-1090901\">Bug bounties have likely reached their &#8220;zenith in efficiency&#8221; outside of net-new innovations that don&#8217;t even exist in traditional bug bounty programs, Amador added.\u00a0<\/p>\n<p class=\"yf-1090901\">The company is exploring hybrid AI solutions to give individual researchers greater leverage to audit more protocols at scale, but these remain in R&amp;D.<\/p>\n<p class=\"yf-1090901\">Bug bounties remain essential as &#8220;a diverse, external community will always be best positioned to discover edge cases that automated systems or in-house teams miss,&#8221; Matviiv noted, but they&#8217;ll increasingly work alongside AI-powered scanning, monitoring, and audits in &#8220;hybrid models.&#8221;<\/p>\n<p class=\"yf-1090901\">While <a href=\"https:\/\/decrypt.co\/resources\/smart-contracts\" rel=\"nofollow noopener\" target=\"_blank\" data-ylk=\"slk:smart contract;elm:context_link;itc:0;sec:content-canvas\" class=\"link \">smart contract<\/a> audits and bug bounties have matured considerably, the most devastating exploits are increasingly bypassing code entirely.\u00a0<\/p>\n<p class=\"yf-1090901\">The <a href=\"https:\/\/decrypt.co\/307215\/ethereum-bitcoin-fall-bybit-confirms-hack\" rel=\"nofollow noopener\" target=\"_blank\" data-ylk=\"slk:$1.4 billion Bybit hack;elm:context_link;itc:0;sec:content-canvas\" class=\"link \">$1.4 billion Bybit hack<\/a> earlier this year highlighted this shift, Amador said, with attackers compromising Safe&#8217;s front-end infrastructure to replace legitimate multi-sig transactions rather than exploiting any smart contract vulnerability.<\/p>\n<p class=\"yf-1090901\">&#8220;That wasn&#8217;t something that would have been caught with an audit or bug bounty,\u201d he said. \u201cThat was a compromised internal infrastructure system.&#8221;<\/p>\n<p class=\"yf-1090901\">Despite security improvements in traditional areas like audits, CI\/CD pipelines, and bug bounties, Amador noted that the industry is &#8220;not doing so hot&#8221; on multi-sig security, spear phishing, anti-scam measures, and community protection.<\/p>\n<p class=\"yf-1090901\">Immunefi has launched a multi-sig security product that assigns elite white-hat hackers to manually review every significant transaction before execution, which it said would have caught the Bybit attack. But he acknowledged it&#8217;s a reactive measure rather than a preventative one.<\/p>\n<p class=\"yf-1090901\"><a href=\"https:\/\/decrypt.co\/341638\/tennessee-couple-6-8-million-penalty-blessings-god-thru-crypto-fraud\/\" rel=\"nofollow noopener\" target=\"_blank\" data-ylk=\"slk:Tennessee Couple Hit With $6.8 Million Penalty for &#039;Blessings of God Thru Crypto&#039; Fraud;elm:context_link;itc:0;sec:content-canvas\" class=\"link \">Tennessee Couple Hit With $6.8 Million Penalty for &#8216;Blessings of God Thru Crypto&#8217; Fraud<\/a><\/p>\n<p class=\"yf-1090901\">This uneven progress explains why 2024 became the <a href=\"https:\/\/decrypt.co\/297206\/largest-crypto-exploits-hacks-2024\" rel=\"nofollow noopener\" target=\"_blank\" data-ylk=\"slk:worst year for hacks;elm:context_link;itc:0;sec:content-canvas\" class=\"link \">worst year for hacks<\/a> despite improvements in code security, as hack patterns follow a predictable mathematical distribution, making single large incidents inevitable rather than anomalous, Amador said.\u00a0<\/p>\n<p class=\"yf-1090901\">&#8220;There&#8217;s always going to be one big outlier,&#8221; he said. &#8220;And it&#8217;s not an outlier, it&#8217;s the pattern. There&#8217;s always one big hack per year.&#8221;<\/p>\n<p class=\"yf-1090901\">Smart contract security has matured considerably, Matviiv said, but &#8220;the next frontier is definitely around the broader attack surface: multi-sig wallet configurations, key management, phishing, governance attacks, and ecosystem-level exploits.&#8221;<\/p>\n<p class=\"yf-1090901\">Effective security requires catching vulnerabilities as early as possible in the development process, Amador told Decrypt.\u00a0<\/p>\n<p class=\"yf-1090901\">&#8220;Bug bounty is the second most expensive, the most expensive being the hack,&#8221; he said, describing a hierarchy of costs that increases dramatically at each stage.<\/p>\n<p class=\"yf-1090901\"><a href=\"https:\/\/decrypt.co\/340115\/ceo-textbook-ponzi-pleads-guilty-200m-bitcoin-fraud\/\" rel=\"nofollow noopener\" target=\"_blank\" data-ylk=\"slk:CEO of \u2018Textbook Ponzi\u2019 Pleads Guilty in $200M Bitcoin Fraud Case;elm:context_link;itc:0;sec:content-canvas\" class=\"link \">CEO of \u2018Textbook Ponzi\u2019 Pleads Guilty in $200M Bitcoin Fraud Case<\/a><\/p>\n<p class=\"yf-1090901\">\u201cWe&#8217;re catching bugs before they hit production, before they even hit an audit,\u201d Amador added. \u201cIt would never even be included in an audit. They wouldn&#8217;t waste their time with it.&#8221;<\/p>\n<p class=\"yf-1090901\">While hack severity remains high, Amador said that &#8220;the incidence rate is going down, and the level of severity of most of the bugs is going down, and we&#8217;re catching more and more of these things in the earlier stages of the cycle.&#8221;<\/p>\n<p class=\"yf-1090901\">When asked what single security measure every project at Token2049 should adopt, Amador called for a \u201cUnified Security Platform,\u201d addressing multiple attack vectors.<\/p>\n<p class=\"yf-1090901\">That\u2019s essential, as fragmented security essentially forces projects to &#8220;do the research yourself&#8221; on products, limitations, and workflows, he said.\u00a0<\/p>\n<p class=\"yf-1090901\">&#8220;We are not yet to the point where we can handle trillions and trillions of assets. We&#8217;re just not quite there at prime time.&#8221;<\/p>\n","protected":false},"excerpt":{"rendered":"AI has handed crypto attackers the same tools defenders use, and the results are costing the industry billions,&hellip;\n","protected":false},"author":3,"featured_media":268711,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[691,738,139898,139899,158,67,132,68],"class_list":{"0":"post-268710","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-artificial-intelligence","8":"tag-ai","9":"tag-artificial-intelligence","10":"tag-mitchell-amador","11":"tag-security-improvements","12":"tag-technology","13":"tag-united-states","14":"tag-unitedstates","15":"tag-us"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@us\/115297981783873087","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts\/268710","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/comments?post=268710"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts\/268710\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/media\/268711"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/media?parent=268710"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/categories?post=268710"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/tags?post=268710"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}