{"id":40923,"date":"2025-08-07T09:46:46","date_gmt":"2025-08-07T09:46:46","guid":{"rendered":"https:\/\/dogewisperer.com\/?p=40923"},"modified":"2025-08-07T09:46:46","modified_gmt":"2025-08-07T09:46:46","slug":"weaponized-trading-bots-drain-1m-from-crypto-users-via-ai-generated-youtube-scam","status":"publish","type":"post","link":"https:\/\/dogewisperer.com\/?p=40923","title":{"rendered":"Weaponized Trading Bots Drain $1M From Crypto Users via AI-Generated YouTube Scam"},"content":{"rendered":"<div>\n<p>Over $1 million has been siphoned from unsuspecting crypto users through malicious smart contracts posing as MEV trading bots, according to a new report by SentinelLABS.<\/p>\n<p>The campaign leveraged AI-generated YouTube videos, aged accounts, and obfuscated Solidity code to bypass basic user scrutiny and gain access to crypto wallets.<\/p>\n<p>Scammers appeared to be using AI-generated avatars and voices to reduce production costs and scale up video content.<\/p>\n<p>These tutorials are published on aged YouTube accounts populated with unrelated content and manipulated comment sections to give the illusion of credibility. In some cases, the videos are unlisted and likely distributed via Telegram or DMs.<\/p>\n<p>At the center of the scam was a smart contract promoted as a profitable arbitrage bot. Victims were instructed via YouTube tutorials to deploy the contract using Remix, fund it with ETH, and call a \u201cStart()\u201d function. <\/p>\n<p>In reality, however, the contract routed funds to a concealed, attacker-controlled wallet, using techniques such as XOR obfuscation (which hides data by scrambling it with another value) and large decimal-to-hex conversions (which convert large numbers into wallet-readable address formats) to mask the destination address (which makes fund recovery trickier).<\/p>\n<p>The most successful identified address \u2014 0x8725&#8230;6831 \u2014 pulled in 244.9 ETH ( approximately $902,000) via deposits from unsuspecting deployers. That wallet was linked to a video tutorial posted by the account <em>@Jazz_Braze<\/em>, still live on YouTube with over 387,000 views.<\/p>\n<p>\u201cEach contract sets the victim\u2019s wallet and a hidden attacker EOA as co-owners,\u201d SentinelLABS researchers noted. \u201cEven if the victim doesn\u2019t activate the main function, fallback mechanisms allow the attacker to withdraw deposited funds.\u201d<\/p>\n<p>As such, the scam\u2019s success has been broad but uneven. While most attacker wallets netted four to five figures, only one (tied to <em>Jazz_Braze<\/em>) cleared over $900K in value. Funds were later moved in bulk to secondary addresses, likely to further fragment traceability.<\/p>\n<p>Meanwhile, SentinelLABS warns users to avoid deploying \u201cfree bots\u201d advertised on social media, especially those involving manual smart contract deployment. The firm emphasized that even code deployed in testnets should be reviewed thoroughly, as similar tactics can easily migrate across chains.<\/p>\n<p><strong><em>Read more: <a href=\"https:\/\/www.coindesk.com\/business\/2025\/07\/24\/multisig-failures-dominate-as-usd2b-is-lost-in-web3-hacks-in-the-first-half\">Multisig Failures Dominate as $3.1B Is Lost in Web3 Hacks in the First Half<\/a><\/em><\/strong><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Over $1 million has been siphoned from unsuspecting crypto users through malicious smart contracts posing as MEV trading bots, according to a new report by SentinelLABS. The campaign leveraged AI-generated YouTube videos, aged accounts, and obfuscated Solidity code to bypass basic user scrutiny and gain access to crypto wallets. Scammers appeared to be using AI-generated [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"iawp_total_views":0,"footnotes":""},"categories":[2],"tags":[3,4,5],"class_list":["post-40923","post","type-post","status-publish","format-standard","hentry","category-news","tag-crypto","tag-doge","tag-news"],"_links":{"self":[{"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/posts\/40923","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=40923"}],"version-history":[{"count":0,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/posts\/40923\/revisions"}],"wp:attachment":[{"href":"https:\/\/dogewisperer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=40923"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=40923"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=40923"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}