Scammers Swipe $900K+ Using Fake Ethereum Trading Bots on YouTube—Here’s How
Another day, another crypto scam—except this one’s hiding in plain sight. Fraudsters are leveraging YouTube’s algorithm to push fake Ethereum trading bots, duping investors out of nearly a million dollars. No fancy tech, just old-school deception with a Web3 twist.
How It Works: Promise the Moon, Deliver an Empty Wallet
These bots claim to generate ‘guaranteed returns’—because nothing screams legitimacy like a robot guaranteeing profits in crypto’s Wild West. Victims are lured into connecting wallets to malicious smart contracts, draining funds faster than a memecoin rug pull.
Platforms Play Whack-a-Mole (Badly)
YouTube’s takedowns lag behind new uploads, while Ethereum’s pseudonymity makes tracing thieves a nightmare. Meanwhile, the usual suspects—greed and FOMO—keep the scam economy thriving. Remember: If it sounds too good to be true, it’s probably a scam. Unless it’s Bitcoin. (Kidding. Mostly.)
How the scam works
The fraudulent scheme revolves around YouTube videos that offer tutorials on deploying automated trading bots, specifically Maximal Extractable Value (MEV) bots, through the Remix Solidity Compiler, a popular web-based IDE for smart contract development.
These videos direct viewers to download smart contract code from external links. Once deployed, the contracts are programmed to drain funds directly from the user’s wallet.
The scammers invest in aging YouTube accounts to appear credible, populating them with off-topic or seemingly legitimate crypto-related content. This strategy helps boost visibility while building the illusion of trust.
AI-generated videos
A notable tactic in this campaign is the use of AI-generated videos. According to the firm, many of the tutorial clips feature synthetic voices and faces with robotic tones, unnatural cadence, and stiff facial movements.
This approach allows the perpetrators to rapidly produce scam content without hiring real actors, significantly reducing operational costs.
However, the most lucrative video uncovered by SentinelLABS—responsible for draining over $900,000—appears to have been created by a real person, not an AI avatar. This suggests that while automation enhances scalability, human-generated content may still drive higher conversion rates.
Meanwhile, SentinelLABS also found multiple iterations of the weaponized contracts, each using varying obfuscation techniques to hide attacker-controlled Externally Owned Accounts (EOAs).
While some contracts shared a common wallet address, many others used distinct destinations, making it difficult to determine whether the campaign is the work of a single entity or multiple threat actors.
Considering this, SentinelLABS warned that blending Web3 tools, social engineering, and generative AI presents a growing threat landscape.
The firm urged crypto users to verify all external code sources and remain skeptical of too-good-to-be-true trading bots—especially those promoted via unvetted YouTube tutorials