Bitget App
Trade smarter
Buy cryptoMarketsTradeFuturesEarnSquareMore
Ethereum draining malware disguised as trading bots exposed

Ethereum draining malware disguised as trading bots exposed

CryptopolitanCryptopolitan2025/08/07 14:15
By:By Vignesh Karunanidhi

Share link:In this post: Ethereum drainers impersonating trading bots have reportedly stolen over $900,000 from crypto users. Malicious smart contracts use obfuscation techniques to hide attacker wallet addresses. Scammers are using aged YouTube accounts and AI-generated videos for legitimacy.

SentinelLABS reported cryptocurrency scams using fake trading bots to drain Ethereum and other coins. The scammers reportedly use old YouTube accounts and strategically placed comments to create a false perception of legitimacy to target crypto traders through social media and video content distribution.

The threat actors advertise fake crypto trading bots through YouTube videos targeting users. The videos explain how to deploy smart contracts on Remix Solidity Compiler, with the scammers presenting these tools as legitimate arbitrage or MEV bots for profit.

Scammers use YouTube videos to distribute fake MEV trading bots

The videos show a deliberate effort to use older YouTube accounts to appear credible. First, the scammers post cryptocurrency news playlists and off-topic content to boost account rankings to make accounts seem like trusted, legitimate crypto sources.

Many videos appear AI-generated based on audio and visual characteristics. Narrators also have unnatural voice tones and only look directly at the camera. No side profile angles consistently appear in these fake presentations.

Typically, AI-generated content saves costs compared to hiring human actors for videos. The most successful scam video did not use AI generation. This particular video generated over $900,000 in stolen funds from victims.

The video became private after research began, but displayed AI characteristics. Another channel featured similar content in April 2024 presentations.

See also Crypto Phishing scam wipes out $3M from investor
Ethereum draining malware disguised as trading bots exposed image 0 Screenshot of one of the crypto-draining trading bot channels. Source Sentinelone

The most successful scam video titled MEV Bot tutorial gained 387,000+ views and appeared more legitimate than others. The account uploaded nearly 100 pop culture videos between 2022-2024.

The account operator likely built credibility over time through consistent uploads. Old YouTube accounts sell for $6 to thousands on Telegram channels. Comment sections remain overwhelmingly positive through moderation, filtering negative feedback automatically.

Malicious smart contracts hide attacker addresses

The fake trading bots contain malicious smart contracts written in Solidity programming language. These contracts target Ethereum and other blockchain networks for fund theft. Attackers use different obfuscation techniques to hide their wallet addresses from victims.

The attacker-controlled wallet address stays hidden within smart contract code making detection difficult. SentinelLABS found multiple obfuscation methods across different contracts including XOR operations. String concatenation and large decimal conversions also conceal attacker wallets effectively.

The contracts appear as legitimate MEV bots monitoring price differences across exchanges. Victims believe they’re deploying profitable arbitrage tools for automated trading.

Multiple unique attacker addresses exist making it unclear how many actors operate. The same wallet appeared across several weaponized smart contracts consistently.

Campaign generates over $900,000 in stolen Ethereum

The scam campaigns achieved varying degrees of financial success across different operations. A recent April 2025 scam received 7.59 Ethereum worth approximately $28,000 from victims. SolidityTutorials video scam netted 4.19 ETH, valued at around $15,000 total.

See also Trump's latest tariffs could derail his 'made in the USA' BTC plan

The video campaign stands out as the most profitable, generating massive returns. The attacker’s wallet collected 244.9 ETH, worth approximately $902,000 from contract deposits. These funds were later withdrawn to other addresses in bulk transfers.

The stolen funds moved to 24 different Ethereum addresses after collection. Attackers distributed money across multiple wallets to avoid detection and tracking. This distribution pattern suggests sophisticated money laundering operations behind the scams.

Various campaigns have operated since early 2024 with different success rates. The scams continue targeting new victims through social media platforms. Attackers manage comment sections by deleting negative feedback to maintain false legitimacy.

Users often go to platforms like Reddit when YouTube comments get censored.

0

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.

PoolX: Earn new token airdrops
Lock your assets and earn 10%+ APR
Lock now!

You may also like

$8.8 billion outflow countdown: MSTR is becoming the abandoned child of global index funds

The final result will be revealed on January 15, 2026, and the market has already started to vote with its feet.

深潮2025/11/22 11:59
$8.8 billion outflow countdown: MSTR is becoming the abandoned child of global index funds

Deconstructing DAT: Beyond mNAV, How to Identify "Real vs. Fake HODLing"?

There is only one iron rule for investing in DAT: ignore premium bubbles and only invest in those with a genuine flywheel of continuously increasing "crypto per share."

BlockBeats2025/11/22 11:24
Deconstructing DAT: Beyond mNAV, How to Identify "Real vs. Fake HODLing"?

Empowered by AI Avatars, How Does TwinX Create Immersive Interaction and a Value Closed Loop?

1. **Challenges in the Creator Economy**: Web2 content platforms suffer from issues such as opaque algorithms, non-transparent distribution, unclear commission rates, and high costs for fan migration, making it difficult for creators to control their own data and earnings. 2. **Integration of AI and Web3**: The development of AI technology, especially AI Avatar technology, combined with Web3's exploration of the creator economy, offers new solutions aimed at breaking the control of centralized platforms and reconstructing content production and value distribution. 3. **Positioning of the TwinX Platform**: TwinX is an AI-driven Web3 short video social platform that aims to reconstruct content, interaction, and value distribution through AI avatars, immersive interactions, and a decentralized value system, enabling creators to own their data and income. 4. **Core Features of TwinX**: These include AI avatar technology, which allows creators to generate a learnable, configurable, and sustainably operable "second persona", as well as a closed-loop commercialization pathway that integrates content creation, interaction, and monetization. 5. **Web3 Characteristics**: TwinX embodies the assetization and co-governance features of Web3. It utilizes blockchain to confirm and record interactive behaviors, turning user activities into traceable assets, and enables participants to engage in platform governance through tokens, thus integrating the creator economy with community governance.

BlockBeats2025/11/22 11:23
Empowered by AI Avatars, How Does TwinX Create Immersive Interaction and a Value Closed Loop?

Aster CEO explains in detail the vision of Aster privacy L1 chain, reshaping the decentralized trading experience

Aster is set to launch a privacy-focused Layer 1 (L1) public chain, along with detailed plans for token empowerment, global market expansion, and liquidity strategies.

BlockBeats2025/11/22 11:22
Aster CEO explains in detail the vision of Aster privacy L1 chain, reshaping the decentralized trading experience