TLDR
- Charles Guillemet, Ledger’s CTO, highlights how artificial intelligence reduces both cost and complexity of crypto platform attacks
- Cryptocurrency theft exceeded $1.4 billion over the last 12 months, with AI anticipated to accelerate this alarming trend
- Major security breaches include a $285 million drain from Drift protocol and Resolv’s $25 million loss
- Guillemet advocates for formal verification methods, hardware wallet adoption, and offline key storage as superior protection strategies
- Crypto holders should operate under the assumption that most platforms will face eventual compromise
Cybercriminals targeting cryptocurrency platforms now possess a powerful new weapon: artificial intelligence. This technological shift is dramatically tilting the scales against security professionals, according to Ledger’s top technology executive.
In a candid discussion with CoinDesk, Charles Guillemet explained how AI is fundamentally changing the threat landscape. What previously required months of painstaking work by expert security researchers can now be accomplished in mere moments with machine learning tools.
“Finding vulnerabilities and exploiting them becomes really, really easy,” Guillemet said. “The cost is going down to zero.”
His stark assessment comes amid a wave of devastating security breaches. The Solana-based DeFi platform Drift suffered a catastrophic $285 million exploit just days ago. Prior to that, Resolv, a yield-generating protocol, fell victim to a separate $25 million attack.
DefiLlama’s tracking data paints an even grimmer picture: cryptocurrency losses and thefts surpassed $1.4 billion throughout the previous year. Guillemet anticipates AI will drive these figures significantly higher in coming months.
The underlying issue represents a fundamental disruption to cybersecurity economics. Traditional security frameworks operated on the principle that mounting an attack required greater resources than potential gains. Artificial intelligence is demolishing this protective barrier.
This imbalance poses existential risks for cryptocurrency protocols managing massive capital pools through code. As Guillemet emphasized: “You need to be perfect.”
Dangers Lurking in AI-Written Code
External hackers aren’t the only concern. Software developers increasingly turn to artificial intelligence for code generation, potentially introducing security flaws that escape initial detection.
“There is no ‘make it secure’ button,” Guillemet said. “We are going to produce a lot of code that will be insecure by design.”
Guillemet also detailed emerging malware variants that actively search compromised mobile devices for wallet recovery phrases. Once discovered, attackers can silently empty accounts without requiring any victim interaction.
These sophisticated threats evade conventional security measures, including standard code reviews and traditional auditing processes.
Guillemet’s Security Recommendations
Rather than relying on typical audits, Guillemet champions formal verification methodologies. This rigorous technique employs mathematical proofs to validate code behavior, substantially minimizing opportunities for overlooked vulnerabilities.
Hardware wallets represent another critical defensive tool in his view. These dedicated devices store private keys on hardware that remains permanently offline, significantly limiting exposure to internet-based attacks.
“When you have a dedicated device not exposed to the internet, it is more secure by design,” he said.
For regular cryptocurrency users, his guidance was unequivocal: never presume the platforms you’re using are secure.
“You can’t trust most of the systems that you use,” Guillemet said.
He foresees an industry bifurcation ahead. Well-funded wallet providers and established protocols will likely prioritize advanced security measures and successfully evolve. Broader technology platforms may struggle to maintain equivalent protection standards.
The latest casualty reinforces his warnings. This week’s $285 million Drift breach ranks among 2026’s most damaging cryptocurrency security incidents to date.


