AI-Powered Crypto Scams Caused $4.6 Billion in Losses in 2024, Report Reveals

·

The cryptocurrency landscape faced a surge in sophisticated fraud in 2024, with AI-driven scams leading to staggering losses of $4.6 billion, according to the 2025 Anti-Fraud Report jointly released by global crypto exchange Bitget, blockchain security firm SlowMist, and crypto intelligence leader Elliptic. The findings highlight a dramatic evolution in cybercrime tactics, where artificial intelligence and social engineering have become central tools for deceiving users across Web3 ecosystems.

This comprehensive report marks the launch of Bitget’s “Anti-Fraud Month”, a month-long initiative focused on enhancing user awareness, strengthening platform defenses, and promoting industry-wide collaboration to combat digital deception.

The Rise of AI-Driven Crypto Fraud

Gone are the days when phishing emails were the primary threat. In 2024, cybercriminals leveraged advanced AI technologies to execute highly convincing attacks, including:

These tactics exploit trust and urgency, making them particularly effective against even tech-savvy users.

👉 Discover how AI is reshaping online security—and how you can stay protected.

Top 3 Fraud Types Behind the $4.6 Billion Loss

The report identifies three dominant fraud categories responsible for the majority of financial damage:

  1. Deepfake Impersonation Scams
    Criminals use AI-generated audio and video to mimic real individuals—often company executives or influencers—to manipulate victims into transferring funds or revealing private keys.
  2. Social Engineering Attacks
    These rely on psychological manipulation through fake customer support channels, urgent messages, or impersonated community managers on platforms like Telegram and X (formerly Twitter).
  3. Ponzi Schemes Disguised as DeFi or NFT Projects
    Fraudulent protocols promise high returns from staking or yield farming but are designed solely to collect investor funds before disappearing.

These schemes are increasingly coordinated by cross-border criminal groups that operate with near-professional efficiency.

How Stolen Funds Are Laundered: Cross-Chain Bridges & Mixers

Once assets are stolen, bad actors employ complex laundering techniques to obscure their trail. According to Elliptic’s analysis, stolen cryptocurrencies are frequently routed through:

These tools significantly hinder law enforcement and recovery operations, emphasizing the need for proactive prevention rather than post-theft response.

Regional Spotlight: Hong Kong’s High-Profile Cases

The report includes a detailed case study on Hong Kong, where regulatory scrutiny has increased following several high-profile scams involving celebrity endorsements and fake fintech platforms. Despite stronger oversight, attackers continue to exploit jurisdictional gaps and decentralized infrastructure to evade accountability.

Platforms like Telegram and X have emerged as key entry points for phishing links and fraudulent communities, especially within comment sections and direct messages. Users are urged to verify official sources before engaging with any crypto-related content.

Industry Response: Technology + Collaboration

Bitget has deployed a multi-layered defense strategy to protect its users:

SlowMist contributed forensic insights into attack vectors such as address poisoning and malicious dApp integrations, while Elliptic mapped out the financial flows of stolen assets across mixers and exchanges.

“The biggest threat to crypto isn’t market volatility—it’s deception,” said Gracy Chen, CEO of Bitget. “AI has made fraud faster, cheaper, and harder to detect. Our mission is not just to enable smarter trading, but safer participation in Web3.”

Arda Akartuna, APAC Chief Crypto Threat Researcher at Elliptic, emphasized the importance of collaboration:

“Criminals are innovating at scale. We must match their pace with better tracking, intelligence sharing, and user empowerment.”

Lisa, Security Operations Lead at SlowMist, added:

“The psychology behind scams remains unchanged—urgency, greed, fear. Awareness is the strongest shield we have.”

👉 Stay one step ahead—learn how to spot red flags in DeFi and NFT projects.

Practical Protection Tips for Users & Institutions

The report concludes with actionable recommendations:

For Individual Users:

For Organizations:

Frequently Asked Questions (FAQ)

Q: What is a deepfake scam in crypto?
A: A deepfake scam uses AI-generated audio or video to impersonate trusted individuals—like CEOs or influencers—to trick users into sending cryptocurrency or revealing sensitive information.

Q: How can I tell if a DeFi project is a Ponzi scheme?
A: Watch for promises of unusually high returns with little risk, anonymous teams, lack of audited code, and pressure to recruit others. Always research the project’s whitepaper, team background, and community feedback.

Q: Are cross-chain bridges safe?
A: While bridges are essential for interoperability, they are frequent targets for hackers due to their complexity. Only use well-audited, reputable bridges with transparent security practices.

Q: Can stolen crypto be recovered?
A: Recovery is extremely difficult once funds pass through mixers or multiple chains. Prevention—through education and secure practices—is far more effective than attempting recovery after theft.

Q: Why is Telegram a hotspot for crypto scams?
A: Its encrypted messaging and large public groups make it easy for scammers to create fake communities and distribute phishing links. Always double-check group links and avoid DMs from unknown users.

Q: What role does AI play in fighting fraud?
A: AI helps detect patterns in transaction behavior, identify phishing domains, and flag suspicious account activity in real time—enabling faster response than manual monitoring alone.

👉 Secure your digital assets today with tools built for the future of finance.

Final Thoughts

As AI continues to reshape both innovation and crime in the digital world, vigilance becomes non-negotiable. The $4.6 billion lost in 2024 serves as a sobering reminder that security must be embedded into every layer of the Web3 experience—from individual habits to institutional protocols.

By combining technological defenses with user education and global cooperation, the crypto ecosystem can build stronger resilience against emerging threats. The goal isn’t just to trade smarter—it’s to participate more safely.

Note: This article contains no external links except those directing to OKX for user engagement purposes. All promotional content, social media links, author references, and disclaimers have been removed in compliance with content guidelines.