Crypto Security: Endless Battle with Hackers, Says Wallet Exec

The cryptocurrency industry faces a relentless challenge as security measures and hacking tactics evolve in tandem, according to a top executive from Ledger, a leading hardware wallet provider. In an interview, Ian Rogers, Ledger’s chief experience officer, described the ongoing struggle as a perpetual “cat and mouse” game. This statement underscores a harsh reality for the crypto sector: as wallet providers bolster defenses, cybercriminals adapt with equal determination, ensuring the fight for secure digital assets never ends.

Rogers’ remarks come at a time when cryptocurrency adoption is surging, with blockchain gaming alone reaching 7.4 million daily unique active wallets in 2024, a 421% increase from the previous year, per a DappRadar report from January 21, 2025. Yet, this growth amplifies the stakes. The more users and value flow into crypto, the more attractive it becomes to scammers and hackers. “It’s a constant race, we’re adding new security features, and they’re finding more advanced ways to break in.”

The executive pointed to a persistent vulnerability: human error. Despite technological advancements, simple scams remain devastatingly effective. “People give their 24-word phrases to strangers every day,” Rogers said, referring to the recovery seeds used to access crypto wallets. “As long as that happens, bad actors will keep targeting the easiest payday.” He stressed a blunt warning: “Anyone who asks for your 24 words is a criminal.” This echoes a long-standing issue in the crypto space, where phishing schemes and social engineering often outpace even the most sophisticated technical exploits.

Data backs up this grim assessment. In 2021, Chainalysis reported that crypto-based crime hit an all-time high, with illicit addresses receiving $14 billion—a figure that has only grown as the market expands. While 2024 data is still pending, the trend suggests no slowdown. A separate Forbes article from September 6, 2024, likened cybersecurity to a “relentless evolution,” noting that defenders struggle to keep pace with increasingly creative threats. In crypto, this dynamic is intensified by the irreversible nature of blockchain transactions—once funds are gone, they’re rarely recovered.

Rogers’ comments also highlight a tactical shift among attackers. While early crypto hacks often targeted software vulnerabilities, today’s threats lean heavily on human psychology. A common scam, he noted, involves fraudsters replying to crypto-related posts on platforms like X with messages like “DM me, and I’ll help you.” Unsuspecting users who comply often lose everything. This low-tech approach doesn’t require cracking encryption or bypassing multi-factor authentication—it simply exploits trust.

Yet, the industry isn’t standing still. Hardware wallets like Ledger’s have long been touted as a gold standard for security, keeping private keys offline and away from internet-based threats. Recent innovations, such as Multi-Party Computation (MPC)—adopted by over 1,800 crypto entities, according to a January 8, 2024, Ctech article—split private keys into fragments, eliminating single points of failure. Meanwhile, AI-driven tools are emerging to audit smart contracts and simulate attacks, as outlined in a March 3, 2025, Outlook India report. These advancements aim to tilt the scales back toward defenders.

Still, Rogers remains realistic. “The most straightforward scams work best because they rely on people making mistakes,” he said. This sentiment aligns with a broader industry narrative. Michael Shaulov, CEO of Fireblocks, wrote in the same Ctech piece that “cybersecurity is always a game of cat and mouse—one side outpaces the other for a time before the roles reverse.” For every new safeguard, a countermeasure emerges. The 2023 KyberSwap exploit, which saw $48.8 million drained due to a smart contract flaw, and an AI-generated deepfake of Cardano founder Charles Hoskinson underscore how hackers are leveling up their game.

The stakes are particularly high as crypto integrates into mainstream finance. On March 7, 2025, Reuters reported that U.S. President Donald Trump hosted a White House Crypto Summit, pushing for a government-owned Bitcoin reserve—an initiative formalized by an executive order the previous day. This move signals crypto’s growing legitimacy, but it also paints a bigger target on the industry. “Crypto has made big strides, but it’s still nascent,” said JP Richardson, CEO of Exodus, at the summit. He cautioned against overcomplicating reserves with smaller, riskier coins beyond Bitcoin.

For everyday users, the implications are clear: security starts with vigilance. Wallets like Ledger and competitors such as Trezor have improved self-custody options, but they can’t prevent users from handing over sensitive data.

The cat-and-mouse metaphor isn’t new to crypto. A May 23, 2018, New Money Review article described the tug-of-war between software designers and hardware manufacturers in mining, while a June 16, 2022, explored ransomware actors evading law enforcement. What sets Rogers’ take apart is its focus on the human element—an area where technology alone falls short. “We can build the best walls,” he implied, “but if someone opens the gate, it’s over.”

As the industry matures, the pressure mounts to balance innovation with protection. Binance’s March 21, 2025, listing of new tokens like AIFlow Token and Plume, coupled with perpetual contracts offering 25x leverage, reflects bullish momentum. But each new platform or asset introduces fresh risks. The question lingers: can crypto outrun its pursuers, or will human fallibility keep the mice one step ahead?

Disclaimer: TrueToCrypto.com (the “Website”) is for general informational purposes only and is obtained from independent sources that are believed to be reliable. However, TrueToCrypto.com, its owners, affiliates, officers, employees, and agents (collectively, “We,” “Us,” or “Our”) make no representations or warranties, express or implied, as to the accuracy, completeness, timeliness, reliability, or suitability of the information contained on or accessed through this Website. Further read Disclaimer.

Sophia Caldwell
Sophia Caldwell