Cybersecurity steadfast SentinelLABS has uncovered a blase scam run that has siphoned implicit $900,000 from unsuspecting crypto users.
According to the report, the attackers usage malicious Ethereum-based astute contracts disguised arsenic trading bots to people individuals who travel seemingly acquisition contented connected YouTube.
The study added that these scams person been progressive since aboriginal 2024 and perpetually germinate done caller videos and accounts.
How the scam works
The fraudulent strategy revolves astir YouTube videos that connection tutorials connected deploying automated trading bots, specifically Maximal Extractable Value (MEV) bots, done the Remix Solidity Compiler, a fashionable web-based IDE for astute declaration development.
These videos nonstop viewers to download astute declaration codification from outer links. Once deployed, the contracts are programmed to drain funds straight from the user’s wallet.
The scammers put successful aging YouTube accounts to look credible, populating them with off-topic oregon seemingly morganatic crypto-related content. This strategy helps boost visibility portion gathering the illusion of trust.
AI-generated videos
A notable maneuver successful this run is the usage of AI-generated videos. According to the firm, galore of the tutorial clips diagnostic synthetic voices and faces with robotic tones, unnatural cadence, and stiff facial movements.
This attack allows the perpetrators to rapidly nutrient scam contented without hiring existent actors, importantly reducing operational costs.
However, the astir lucrative video uncovered by SentinelLABS—responsible for draining implicit $900,000—appears to person been created by a existent person, not an AI avatar. This suggests that portion automation enhances scalability, human-generated contented whitethorn inactive thrust higher conversion rates.
Meanwhile, SentinelLABS besides recovered aggregate iterations of the weaponized contracts, each utilizing varying obfuscation techniques to fell attacker-controlled Externally Owned Accounts (EOAs).
While immoderate contracts shared a communal wallet address, galore others utilized chiseled destinations, making it hard to find whether the run is the enactment of a azygous entity oregon aggregate menace actors.
Considering this, SentinelLABS warned that blending Web3 tools, societal engineering, and generative AI presents a increasing menace landscape.
The steadfast urged crypto users to verify each outer codification sources and stay skeptical of too-good-to-be-true trading bots—especially those promoted via unvetted YouTube tutorials
The station Fake Ethereum trading bots connected YouTube assistance scammers bargain implicit $900K appeared archetypal connected CryptoSlate.