Cryptopolitan
2025-08-07 12:16:09

Researchers expose Ethereum drainers posing as trading bots to steal crypto

SentinelLABS reported cryptocurrency scams using fake trading bots to drain Ethereum and other coins. The scammers reportedly use old YouTube accounts and strategically placed comments to create a false perception of legitimacy to target crypto traders through social media and video content distribution. The threat actors advertise fake crypto trading bots through YouTube videos targeting users. The videos explain how to deploy smart contracts on Remix Solidity Compiler, with the scammers presenting these tools as legitimate arbitrage or MEV bots for profit. Scammers use YouTube videos to distribute fake MEV trading bots The videos show a deliberate effort to use older YouTube accounts to appear credible. First, the scammers post cryptocurrency news playlists and off-topic content to boost account rankings to make accounts seem like trusted, legitimate crypto sources. Many videos appear AI-generated based on audio and visual characteristics. Narrators also have unnatural voice tones and only look directly at the camera. No side profile angles consistently appear in these fake presentations. Typically, AI-generated content saves costs compared to hiring human actors for videos. The most successful scam video did not use AI generation. This particular video generated over $900,000 in stolen funds from victims. One YouTube channel @todd_tutorials posted step-by-step deployment instructions for malicious contracts. The video became private after research began, but displayed AI characteristics. Another channel @SolidityTutorials featured similar content in April 2024 presentations. Screenshot of one of the crypto-draining trading bot channels. Source Sentinelone @Jazz_Braze created the most successful scam video titled MEV Bot tutorial. The video gained 387,000+ views and appeared more legitimate than others. The account uploaded nearly 100 pop culture videos between 2022-2024. The account operator likely built credibility over time through consistent uploads. Old YouTube accounts sell for $6 to thousands on Telegram channels. Comment sections remain overwhelmingly positive through moderation, filtering negative feedback automatically. Malicious smart contracts hide attacker addresses The fake trading bots contain malicious smart contracts written in Solidity programming language. These contracts target Ethereum and other blockchain networks for fund theft. Attackers use different obfuscation techniques to hide their wallet addresses from victims. The attacker-controlled wallet address stays hidden within smart contract code making detection difficult. SentinelLABS found multiple obfuscation methods across different contracts including XOR operations. String concatenation and large decimal conversions also conceal attacker wallets effectively. The contracts appear as legitimate MEV bots monitoring price differences across exchanges. Victims believe they’re deploying profitable arbitrage tools for automated trading. Multiple unique attacker addresses exist making it unclear how many actors operate. The same wallet appeared across several weaponized smart contracts consistently. Campaign generates over $900,000 in stolen Ethereum The scam campaigns achieved varying degrees of financial success across different operations. A recent April 2025 scam received 7.59 Ethereum worth approximately $28,000 from victims. SolidityTutorials video scam netted 4.19 ETH, valued at around $15,000 total. Jazz_Braze’s video campaign stands out as the most profitable, generating massive returns. The attacker’s wallet collected 244.9 ETH, worth approximately $902,000 from contract deposits. These funds were later withdrawn to other addresses in bulk transfers. The stolen funds moved to 24 different Ethereum addresses after collection. Attackers distributed money across multiple wallets to avoid detection and tracking. This distribution pattern suggests sophisticated money laundering operations behind the scams. Various campaigns have operated since early 2024 with different success rates. The scams continue targeting new victims through social media platforms. Attackers manage comment sections by deleting negative feedback to maintain false legitimacy. Users often go to platforms like Reddit when YouTube comments get censored. KEY Difference Wire : the secret tool crypto projects use to get guaranteed media coverage

Crypto 뉴스 레터 받기
면책 조항 읽기 : 본 웹 사이트, 하이퍼 링크 사이트, 관련 응용 프로그램, 포럼, 블로그, 소셜 미디어 계정 및 기타 플랫폼 (이하 "사이트")에 제공된 모든 콘텐츠는 제 3 자 출처에서 구입 한 일반적인 정보 용입니다. 우리는 정확성과 업데이트 성을 포함하여 우리의 콘텐츠와 관련하여 어떠한 종류의 보증도하지 않습니다. 우리가 제공하는 컨텐츠의 어떤 부분도 금융 조언, 법률 자문 또는 기타 용도에 대한 귀하의 특정 신뢰를위한 다른 형태의 조언을 구성하지 않습니다. 당사 콘텐츠의 사용 또는 의존은 전적으로 귀하의 책임과 재량에 달려 있습니다. 당신은 그들에게 의존하기 전에 우리 자신의 연구를 수행하고, 검토하고, 분석하고, 검증해야합니다. 거래는 큰 손실로 이어질 수있는 매우 위험한 활동이므로 결정을 내리기 전에 재무 고문에게 문의하십시오. 본 사이트의 어떠한 콘텐츠도 모집 또는 제공을 목적으로하지 않습니다.