{"id":7059,"date":"2025-08-07T08:22:07","date_gmt":"2025-08-07T08:22:07","guid":{"rendered":"https:\/\/bitunikey.com\/news\/malicious-crypto-trading-bots-siphon-over-900k-via-aged-youtube-accounts\/"},"modified":"2025-08-07T08:22:15","modified_gmt":"2025-08-07T08:22:15","slug":"malicious-crypto-trading-bots-siphon-over-900k-via-aged-youtube-accounts","status":"publish","type":"post","link":"https:\/\/bitunikey.com\/news\/malicious-crypto-trading-bots-siphon-over-900k-via-aged-youtube-accounts\/","title":{"rendered":"Malicious crypto trading bots siphon over $900k via aged YouTube accounts"},"content":{"rendered":"<div class=\"post-detail__content blocks\">\n<p class=\"is-style-lead\">A network of crypto scammers is leveraging aged YouTube accounts to push trading bots that lure users into deploying malicious smart contracts capable of draining their wallets.<\/p>\n<div id=\"cn-block-summary-block_bb8bff08bc67bcce8d45fad9901b516b\" class=\"cn-block-summary\">\n<div class=\"cn-block-summary__nav tabs\">\n        <span class=\"tabs__item is-selected\">Summary<\/span>\n    <\/div>\n<div class=\"cn-block-summary__content\">\n<ul class=\"wp-block-list\">\n<li>Scammers are using aged YouTube accounts to promote malicious crypto trading bots.<\/li>\n<li>Victims are tricked into deploying obfuscated Ethereum contracts that redirect funds to attacker-controlled addresses.<\/li>\n<\/ul><\/div>\n<\/div>\n<p><!-- .cn-block-summary --><\/p>\n<p>Sounding the alarm on this \u201cwidespread and ongoing\u201d threat, senior threat researcher Alex Delamottea from SentinelLABS <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.sentinelone.com\/labs\/smart-contract-scams-ethereum-drainers-pose-as-trading-bots-to-steal-crypto\/?utm_medium=paid-search&amp;utm_source=google&amp;utm_campaign=amer-us-brand&amp;utm_term=sentinelone\" target=\"_blank\">warned<\/a> that crypto users who rely on unvetted tools promoted through video content are exposing themselves to sophisticated theft scams disguised as opportunity.<\/p>\n<h2 class=\"wp-block-heading\">How does the scam work?<\/h2>\n<p>According to SentinelLABS, the scam begins with YouTube videos that appear to offer step-by-step tutorials on deploying profitable crypto trading bots. These videos, often produced using AI-generated visuals and narration, direct users to an external site containing smart contract code.\u00a0<\/p>\n<p>Viewers are told to deploy the code on platforms like Remix, a popular Ethereum development environment, under the pretense of activating a so-called arbitrage or MEV (Maximal Extractable Value) bot.<\/p>\n<p>However, the contract is deliberately designed to conceal an attacker-controlled wallet. In many cases, the code was found to be using various obfuscation techniques, such as XOR operations, string concatenation, or address derivation through hexadecimal conversion, to hide the scammer\u2019s address from plain view.<\/p>\n<p>Once the victim deploys the contract and funds it with Ether, the attacker can extract those funds using hidden failover mechanisms embedded in the contract logic.<\/p>\n<p>SentinelLABS found that victims are encouraged to deposit a minimum of 0.5 ETH to cover supposed gas fees and increase potential profits. This initial deposit is critical to triggering the contract\u2019s logic, which, once executed, allows the attacker\u2019s address to siphon off the funds.<\/p>\n<p>In some cases, even if users don\u2019t explicitly activate the contract, built-in fallback mechanisms still allow the attacker to gain control of the assets.<\/p>\n<p>    <!-- .cn-block-related-link --><\/p>\n<h2 class=\"wp-block-heading\">Scammers are making big money<\/h2>\n<p>Delamottea\u2019s investigation revealed multiple unique scammer-controlled addresses, though one wallet stood out. The address associated with the YouTube user \u201c@Jazz_Braze\u201d received 244.9 ETH\u2014worth over $900,000\u2014via these contracts.\u00a0<\/p>\n<p>SentinelLABS traced the movement of these stolen funds across more than two dozen secondary addresses, concluding that the funds were being laundered.<\/p>\n<p>Meanwhile, other scammer wallets were less successful but still notable, with inflows averaging over $10,000 in ETH.<\/p>\n<p>All these wallets were tied to different YouTube videos or channels, many of which featured AI-generated narrators and heavily moderated comment sections that filtered out negative feedback while promoting fabricated testimonials of success.<\/p>\n<figure class=\"wp-block-image is-resized\"><figcaption class=\"wp-element-caption\">Jazz_Braze\u2019s MEV Bot tutorial video | Source: SentinelLabs<\/figcaption><\/figure>\n<p>SentinelLABS also noted that the YouTube accounts used in the scam were aged and previously hosted playlists or videos related to cryptocurrency or pop culture.\u00a0<\/p>\n<p>According to the report, some of these accounts were possibly bought from online marketplaces, where aged YouTube channels are commonly sold through Telegram groups or search-indexed marketplaces.<\/p>\n<figure class=\"wp-block-image is-resized\"><img decoding=\"async\" src=\"https:\/\/bitunikey.com\/news\/wp-content\/uploads\/2025\/08\/1754554927_787_Malicious-crypto-trading-bots-siphon-over-900k-via-aged-YouTube.png\" alt=\"Malicious crypto trading bots siphon over $900k via aged YouTube accounts - 2\" style=\"width:793px;height:auto\"><figcaption class=\"wp-element-caption\">Search engine results for aged YouTube accounts for sale | Source: SentinelLabs<\/figcaption><\/figure>\n<p>This aging tactic helps boost visibility and trust, making it harder for viewers to identify the malicious intent in most cases.<\/p>\n<h2 class=\"wp-block-heading\">What are crypto trading bots actually?<\/h2>\n<p>In legitimate settings, trading bots are algorithmic tools that execute buy or sell orders based on preset strategies. They are often capable of operating across multiple exchanges to take advantage of price inefficiencies or market trends, often aiming to execute trades faster than a human could.<\/p>\n<p>With the advent of artificial intelligence, these applications have become more adaptive, efficient, and capable of executing complex strategies at scale, and when properly built and vetted, serve as automation tools for sophisticated traders and institutions, especially in high-frequency environments like crypto.<\/p>\n<p>One well-known category of these tools includes MEV bots, which attempt to extract value from transaction ordering within blocks. MEV stands for Maximal Extractable Value, and these bots monitor blockchain mempools to strategically front-run, back-run, or sandwich legitimate user transactions.\u00a0<\/p>\n<p>While MEV bots are technically legal, bad actors have also weaponized them. For instance, the MEV sandwich bot \u201carsc\u201d leveraged automated strategies to extract nearly $30 million from unsuspecting Solana users by front-running transactions in real time.<\/p>\n<h2 class=\"wp-block-heading\">A cautionary note for crypto traders<\/h2>\n<p>SentinelLABS stressed that while trading bots have legitimate uses, investors must exercise extreme caution, especially when the source code is coming from a social media video promising unrealistic gains.<\/p>\n<p>\u201cTo defend against these types of scams, crypto traders are advised to avoid deploying code shilled through influencer videos or social media posts,\u201d Delamottea warned, adding that \u201cif an offering seems too good to be true, it usually is\u2014especially in the cryptocurrency world.\u201d<\/p>\n<p>    <!-- .cn-block-related-link --><\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>A network of crypto scammers is leveraging aged YouTube accounts to push trading bots that lure users into deploying malicious smart contracts capable of draining their wallets. Summary Scammers are&hellip;<\/p>\n","protected":false},"author":1,"featured_media":1981,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-7059","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cryptocurrency"],"_links":{"self":[{"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/posts\/7059","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/comments?post=7059"}],"version-history":[{"count":1,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/posts\/7059\/revisions"}],"predecessor-version":[{"id":7060,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/posts\/7059\/revisions\/7060"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/media\/1981"}],"wp:attachment":[{"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/media?parent=7059"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/categories?post=7059"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/tags?post=7059"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}