Unlock the Secrets of Ethical Hacking!
Ready to dive into the world of offensive security? This course gives you the Black Hat hacker’s perspective, teaching you attack techniques to defend against malicious activity. Learn to hack Android and Windows systems, create undetectable malware and ransomware, and even master spoofing techniques. Start your first hack in just one hour!
Enroll now and gain industry-standard knowledge: Enroll Now!
Hackers are hijacking older YouTube accounts to promote a crypto scam disguised as a trading bot, according to a new report from cybersecurity firm SentinelLABS.
Key Takeaways:
- Hackers are using old YouTube accounts to promote crypto-draining bots disguised as trading tools.
- The smart contracts link to scammer wallets, enabling fund theft once victims deposit ETH.
- AI-generated videos and managed comment sections create a false sense of legitimacy.
The operation active since at least 2024 involves misleading videos that direct viewers to deploy a smart contract supposedly designed for automated crypto trading.
In reality, the contract contains hidden code that links it to a scammer’s wallet. Once a user funds the contract, often urged to deposit a minimum of 0.5 ETH, the attacker gains the ability to drain the assets.
SentinelLABS: Crypto Scam Shows Mixed Results but Alarming Success
SentinelLABS senior researcher Alex Delamottea said the scheme has seen mixed results but is clearly effective.
One attacker wallet netted 244.9 ETH, while others collected 7.59 and 4.19 ETH, together totaling over $939,000 at current prices.
“These scams will inevitably work on victims who fail to scrutinize how these tools operate,” Delamottea warned.
What makes the scam particularly deceptive is its delivery. The bad actors are using older YouTube accounts with histories of uploading crypto news, investment advice, or general pop culture content to lend credibility.
It’s unclear whether the scammers created these accounts or purchased them, either is possible, as aged accounts are easily found for sale on Telegram and through search engine ads.
Many of the scam videos appear AI-generated, complete with manipulated visuals and voiceovers.
This allows the perpetrators to produce numerous videos without revealing their identities.

Negative comments are actively removed, while fake testimonials in the comments section claim the bot delivered profits.
“These actors are clearly managing comment sections to maintain an illusion of trust,” Delamottea said, noting that more skeptical users are starting to turn to Reddit to fact-check the bot.
She stressed that crypto traders should avoid deploying code promoted through influencer videos or social media, especially if it promises fast, effortless gains.
“Understand the tool before using it. If it sounds too good to be true, it probably is.”
Investor Loses $3M in Crypto Phishing Scam
As reported, a cryptocurrency investor has fallen victim to a phishing scam, losing $3.05 million in Tether (USDT) after unknowingly signing a malicious blockchain transaction.
The loss, flagged by blockchain analytics platform Lookonchain on Wednesday, underscores the rising threat of phishing attacks targeting digital asset holders.
The attacker exploited a common habit among crypto users: validating only the first and last few characters of a wallet address while ignoring the middle.
Crypto investors lost over $2.2 billion to hacks, scams, and breaches in the first half of 2025, driven largely by wallet compromises and phishing attacks, according to CertiK’s latest security report.
Wallet breaches alone caused $1.7 billion in losses across just 34 incidents, while phishing scams accounted for over $410 million across 132 attacks.
The post Hackers Exploit Old YouTube Accounts to Promote Crypto Drain Scams: Report appeared first on Cryptonews.
Unlock the Secrets of Ethical Hacking!
Ready to dive into the world of offensive security? This course gives you the Black Hat hacker’s perspective, teaching you attack techniques to defend against malicious activity. Learn to hack Android and Windows systems, create undetectable malware and ransomware, and even master spoofing techniques. Start your first hack in just one hour!
Enroll now and gain industry-standard knowledge: Enroll Now!
0 Comments