🎤 Cheer for Your Idol · Gate Takes You Straight to Token of Love! 🎶
Fam, head to Gate Square now and cheer for #TokenOfLove# — 20 music festival tickets are waiting for you! 🔥
HyunA / SUECO / DJ KAKA / CLICK#15 — Who are you most excited to see? Let’s cheer together!
📌 How to Join (the more ways you join, the higher your chance of winning!)
1️⃣ Interact with This Post
Like & Retweet + vote for your favorite artist
Comment: “I’m cheering for Token of Love on Gate Square!”
2️⃣ Post on Gate Square
Use hashtags: #ArtistName# + #TokenOfLove#
Post any content you like:
🎵 The song you want to he
Weaponized Trading Bots Drain $1M From Crypto Users via AI-Generated YouTube Scam
Over $1 million has been siphoned from unsuspecting crypto users through malicious smart contracts posing as MEV trading bots, according to a new report by SentinelLABS.
The campaign leveraged AI-generated YouTube videos, aged accounts, and obfuscated Solidity code to bypass basic user scrutiny and gain access to crypto wallets.
Scammers appeared to be using AI-generated avatars and voices to reduce production costs and scale up video content.
These tutorials are published on aged YouTube accounts populated with unrelated content and manipulated comment sections to give the illusion of credibility. In some cases, the videos are unlisted and likely distributed via Telegram or DMs.
At the center of the scam was a smart contract promoted as a profitable arbitrage bot. Victims were instructed via YouTube tutorials to deploy the contract using Remix, fund it with ETH, and call a “Start()” function.
In reality, however, the contract routed funds to a concealed, attacker-controlled wallet, using techniques such as XOR obfuscation (which hides data by scrambling it with another value) and large decimal-to-hex conversions (which convert large numbers into wallet-readable address formats) to mask the destination address (which makes fund recovery trickier).
The most successful identified address — 0x8725...6831 — pulled in 244.9 ETH ( approximately $902,000) via deposits from unsuspecting deployers. That wallet was linked to a video tutorial posted by the account @Jazz_Braze, still live on YouTube with over 387,000 views.
“Each contract sets the victim’s wallet and a hidden attacker EOA as co-owners,” SentinelLABS researchers noted. “Even if the victim doesn’t activate the main function, fallback mechanisms allow the attacker to withdraw deposited funds.”
As such, the scam’s success has been broad but uneven. While most attacker wallets netted four to five figures, only one (tied to Jazz_Braze) cleared over $900K in value. Funds were later moved in bulk to secondary addresses, likely to further fragment traceability.
Meanwhile, SentinelLABS warns users to avoid deploying “free bots” advertised on social media, especially those involving manual smart contract deployment. The firm emphasized that even code deployed in testnets should be reviewed thoroughly, as similar tactics can easily migrate across chains.
Read more: Multisig Failures Dominate as $3.1B Is Lost in Web3 Hacks in the First Half
View Comments