{"id":14167,"date":"2024-06-07T17:25:47","date_gmt":"2024-06-07T14:25:47","guid":{"rendered":"https:\/\/forklog.com\/en\/elliptic-highlights-rising-use-of-ai-in-crypto-crimes\/"},"modified":"2024-06-07T17:25:47","modified_gmt":"2024-06-07T14:25:47","slug":"elliptic-highlights-rising-use-of-ai-in-crypto-crimes","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/elliptic-highlights-rising-use-of-ai-in-crypto-crimes\/","title":{"rendered":"Elliptic Highlights Rising Use of AI in Crypto Crimes"},"content":{"rendered":"<p>As with any new technology, the advancement of AI innovations in the crypto industry has spurred their use for criminal purposes, according to a report by <a href=\"https:\/\/www.elliptic.co\/hubfs\/Elliptic-AI-enabled_crime_in_the_cryptoasset_ecosystem.pdf\">Elliptic<\/a>.<\/p>\n<p>Experts from the company identified five main typologies for such criminal activities:<\/p>\n<ul class=\"wp-block-list\">\n<li>the use of generative AI to create deepfakes and promotional materials for scams;<\/li>\n<li>execution of fraud and market manipulation, including the launch of AI tokens, investment platforms, Ponzi schemes, and increasingly prevalent romantic scams (\u201cpig butchering\u201d);<\/li>\n<li>utilization of large language models to discover code vulnerabilities and develop exploits;<\/li>\n<li>scaling crypto scams and disinformation campaigns with AI tools;<\/li>\n<li>creating new types of economic activity on darknet markets, such as producing fake videos and counterfeit documents to pass <span data-descr=\"Know Your Customer\" class=\"old_tooltip\">KYC<\/span> procedures on crypto platforms.<\/li>\n<\/ul>\n<p>Experts acknowledged that while these activities are not unique to the industry, they have specific characteristics within it.<\/p>\n<h2 class=\"wp-block-heading\">The Range of Criminal AI Use in the Industry Expands<\/h2>\n<p>They examined 18 real cases of criminal AI use. For instance, perpetrators used deepfakes of Tesla and SpaceX founder Elon Musk and Ripple CEO Brad Garlinghouse to promote cryptocurrency airdrops. Allegedly, by sending a certain amount of coins to the fraudsters&#8217; address, users would receive double the amount in return.<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"381\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/Elliptic-AI-enabled_crime_in_the_cryptoasset_ecosystem.pdf-Google-Chrome-pdf-1024x381.jpg\" alt=\"Elliptic-AI-enabled_crime_in_the_cryptoasset_ecosystem.pdf-Google-Chrome\" class=\"wp-image-234369\"\/><figcaption class=\"wp-element-caption\">Screenshot of a fake video with Garlinghouse and a scheme for laundering the money obtained by hackers. Data: Elliptic.<\/figcaption><\/figure>\n<p>In romantic scams aimed at luring victims into crypto investment fraud through online communication, perpetrators use AI to refine scripts and enhance the appeal of characters, noted Elliptic experts.<\/p>\n<p>They found that fraudsters widely use technology to create fake websites and marketing materials, including fake publications in well-known outlets, to scale scams.<\/p>\n<p>Experts discovered several darknet offers for generating fake identity document scans, enabling account creation on crypto platforms.<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"255\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/14241532-1024x255.jpg\" alt=\"14241532\" class=\"wp-image-234370\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/14241532-1024x255.jpg 1024w, https:\/\/forklog.com\/wp-content\/uploads\/14241532-300x75.jpg 300w, https:\/\/forklog.com\/wp-content\/uploads\/14241532-768x191.jpg 768w, https:\/\/forklog.com\/wp-content\/uploads\/14241532.jpg 1028w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Document rendering services on a criminal forum. Data: Elliptic.<\/figcaption><\/figure>\n<p>According to Elliptic specialists, these services are gradually replacing traditional image forgery methods using Photoshop. Thanks to technology, they can offer &#8220;package deals.&#8221;<\/p>\n<p>For example, one service called OnlyFake Document Generator 3.0 offers a document for $15, ten different IDs for $99, and fifty for $249. Fraudsters advertise their services using an image of the famous movie character John Wick, played by Keanu Reeves.<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"420\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/Elliptic-AI-enabled_crime_in_the_cryptoasset_ecosystem.pdf-Google-Ch-pdf-1024x420.jpg\" alt=\"Elliptic-AI-enabled_crime_in_the_cryptoasset_ecosystem.pdf-Google-Ch\" class=\"wp-image-234373\"\/><figcaption class=\"wp-element-caption\">The service allows selecting several types of IDs for different jurisdictions. Data: Elliptic.<\/figcaption><\/figure>\n<h2 class=\"wp-block-heading\">A Collective Effort Needed to Counteract<\/h2>\n<p>Experts noted that the criminal use of AI in the crypto industry is still in its early stages. Implementing effective countermeasures and prevention at this stage could significantly mitigate growing threats, they believe.<\/p>\n<p>Elliptic&#8217;s main recommendations include:<\/p>\n<ul class=\"wp-block-list\">\n<li><strong>for technology developers<\/strong> \u2014 consider the potential criminal use of created solutions, ensuring responsible and safe operation;<\/li>\n<li><strong>for policymakers and regulators<\/strong> \u2014 establish regulatory barriers to criminal use of beneficial technologies and provide legal clarity regarding liability for consequences;<\/li>\n<li><strong>for law enforcement<\/strong> \u2014 consider changing cybercriminal strategies, using AI and blockchain to detect and identify fraud, malware, and fake identifiers;<\/li>\n<li><strong>for compliance specialists<\/strong> \u2014 strengthen monitoring measures for suspicious transactions related to criminal AI activity;<\/li>\n<li><strong>for users<\/strong> \u2014 pay more attention to &#8220;red flags&#8221; indicating risks.<\/li>\n<\/ul>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cFinally, it is worth reiterating that, as with most new technologies, the benefits of AI and crypto assets far outweigh their potential illegal use,\u201d concluded the experts.<\/p>\n<\/blockquote>\n<p>Earlier, billionaire investor Warren Buffett <a href=\"https:\/\/forklog.com\/en\/news\/warren-buffett-equates-deepfake-threat-to-nuclear-weapons\">compared<\/a> the threat of deepfakes to nuclear weapons.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As with any new technology, the advancement of AI innovations in the crypto industry has spurred their use for criminal purposes, according to a report by Elliptic. Experts from the company identified five main typologies for such criminal activities: the use of generative AI to create deepfakes and promotional materials for scams; execution of fraud [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":14166,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"","news_style_id":"","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[438,44,1535,1150,1252],"class_list":["post-14167","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-artificial-intelligence","tag-cybercrime","tag-elliptic","tag-news-plus","tag-reports"],"aioseo_notices":[],"amp_enabled":true,"views":"26","promo_type":"","layout_type":"","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/14167","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=14167"}],"version-history":[{"count":0,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/14167\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/14166"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=14167"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=14167"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=14167"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}