SENTINELLABS has reported coded currency fraud using fake trading robots for ETHEREUM and other coins. The fraudsters are said to use old YouTube accounts and strategically developed comments to create a wrong perception of legitimacy to target encryption traders through social media and distribute video content.
Actors are threatened with fake encryption trading robots through YouTube videos targeting users. Videos explain how to publish smart contracts on the Remix code program, as fraudsters offer these tools as legitimate rulers or MEV robots for profit.
Budgets use YouTube videos to distribute fake robots MEV
Videos show a lavish effort to use old YouTube accounts to look credible. First, the fraudsters publish the encrypted news lists and the content outside the subject to increase the account classifications to make the accounts appear to be reliable and legitimate encryption sources.
Several videos created by AI appear based on the audio and visual features. The narrators also have abnormal audio tones and only look directly to the camera. The corners of a side profile do not constantly appear in these fake offers.
The content created by artificial intelligence usually provides costs compared to the employment of human actors for videos. The most successful fraud video was not used. This private video created more than $ 900,000 of stolen money from the victims.
YouTube has published @todd_tutorials channels for post -contracting. The video has become special after the search starts, but it shows the characteristics of artificial intelligence. Another SolidityTorials channel showed similar content in April 2024 presentations.
Jazz_braze created the most successful video titled Mev Bot Tutorial. The video gained more than 387,000 views and more legitimate than others. The account has downloaded nearly 100 video syllables of pop culture between 2022-2024.
The account player is likely to be credible over time through consistent downloads. Old YouTube accounts sell $ 6 to thousands on Telegram channels. The suspension sections remain highly positive through moderation, and to liquidate negative comments automatically.
The malicious smart contracts hide the addresses of the attacker
Fake commercial robots contain malicious smart contracts written in the hard programming language. These ETHEREUM contracts and other Blockchain networks target money theft. The attackers use various jamming techniques to hide their portfolios from the victims.
The title of the attacker’s wallet remains hidden within the smart contract code, which makes its discovery difficult. Sentinellabs has found multiple exploitation methods over different contracts including XOR operations. The sequence of the series and large decimal transfers also effectively hide the attacker’s wallet.
Contracts are shown as legitimate MEV robots that monitor the differences in prices via stock exchanges. Victims believe that they are spreading profitable tools for automated trading.
There are multiple unique attacking titles, which makes it unclear the number of actors that work. The same wallet appeared through many smart weapons contracts constantly.
The campaign generates more than $ 900,000 in the stolen ethereum
Fraud campaigns have made varying degrees of financial success through various operations. He received a fraud in April 2025, 7.59 ETHEREUM, at a value of approximately $ 28,000 of victims. The SALISTALITOTOTOTOLILALs 4.19 ETH, which is valued at about $ 15,000, has been calculated.
Jazz_braze video campaign stands out as the most profitable, generating huge returns. The attacker’s portfolio raised 244.9 ETH, at a value of approximately $ 902,000 of contract deposits. This money was later withdrawn to other addresses in wholesale transportation.
The stolen money moved to 24 different ETHEREUM addresses after the collection. The attackers distributed money through multiple portfolios to avoid detection and tracking. This distribution style indicates advanced money laundering processes behind fraud.
Various campaigns have worked since early 2024 at different success rates. Fraud operations continue to target new victims through social media platforms. The attackers run the comments sections by deleting negative reactions to maintain the wrong legitimacy.
Users often move to platforms like Reddit when YouTube comments are controlled.
Don’t just read encryption news. Understand it. Subscribe to our newsletter. It is free.
Source: https://www.cryptopolitan.com/etherum-drainer-trading-bots-teal-crypto/
Heya i’m for the first time here. I found this board
and I find It truly useful & it helped me out much.
I hope to give something back and aid others like you helped
me.