Threat Actors Exploit Smart Contracts to Drain Over $900K from Crypto Wallets

Threat Actors Exploit Smart Contracts to Drain Over $900K from Crypto Wallets

SentinelLABS has exposed a sophisticated series of cryptocurrency scams where threat actors distribute malicious smart contracts masquerading as automated trading bots, resulting in the drainage of user wallets exceeding $900,000 USD.

These scams leverage obfuscated Solidity code deployed on platforms like the Remix Solidity Compiler, targeting Ethereum-based ecosystems.

The campaigns, active since early 2024, employ aged YouTube accounts to disseminate instructional videos that guide victims through deploying the weaponized contracts.

These videos, often AI-generated with unnatural audio cadences and static visual elements, create a veneer of legitimacy by curating comment sections to suppress negative feedback and promote positive endorsements.

Cryptocurrency Scam Campaign

Actors manage these channels by posting unrelated content, such as cryptocurrency news playlists or pop culture compilations, to enhance account credibility and algorithmic ranking.

The DexInterface contract declaration 

In one prominent case, a video by @Jazz_Braze amassed over 387,000 views, yielding the highest profits without evident AI artifacts, suggesting a blend of human and automated production methods to evade detection.

The distribution strategy involves linking to external sites hosting the malicious code, instructing users to fund the deployed contract with at least 0.5 ETH to cover gas fees and purported arbitrage operations.

Victims are lured with promises of passive income through Maximal Extractable Value (MEV) bots, which supposedly exploit price discrepancies across decentralized exchanges.

However, upon deployment and funding, the contract initializes functions like Start() or StartNative(), which unobfuscate the attacker’s Externally Owned Account (EOA) and route funds accordingly.

Even without explicit invocation, built-in failover mechanisms enable attackers to withdraw assets, ensuring high success rates.

Channels like @todd_tutorials and @SolidityTutorials exhibit AI hallmarks, including robotic narration and misaligned lip-sync, while curating overwhelmingly positive comments via YouTube’s moderation tools.

Crypto Wallets
Playlists posted by todd_tutorials YouTube account

This manipulation, combined with unlisted videos shared via platforms like Telegram, amplifies reach and urgency, often framing the bots as limited-time free offerings.

Technical Analysis of Exploitation

At the core of these scams are Solidity smart contracts employing advanced obfuscation to conceal attacker-controlled EOAs, complicating static analysis and victim scrutiny.

Variations include XOR operations on 32-byte constants (e.g., DexRouter and factory) to derive addresses via expressions like address(uint160(uint256(a) ^ uint256(b))), string concatenation of address fragments, and conversion of large 256-bit decimals to uint160 types, effectively masking Ethereum addresses.

According to the report, A recurring EOA, 0x872528989c4D20349D0dB3Ca06751d83DC86D831, appears across multiple contracts using XOR, interfacing with declarations like DexInterface to compute router addresses and facilitate fund transfers.

Deployment sets dual owners: the victim’s wallet and the hidden attacker EOA enabling seamless drainage post-funding.

Transaction analysis reveals varying efficacy: one EOA from @SolidityTutorials netted 4.19 ETH (~$15,000 USD), while @todd_tutorials yielded 7.59 ETH (~$28,000 USD).

The outlier, linked to @Jazz_Braze, amassed 244.9 ETH (~$902,000 USD), funneled to secondary addresses for laundering.

These operations underscore the risks in the Web3 space, where unverified code from social media can exploit blockchain immutability.

Crypto users must rigorously audit smart contracts, avoiding hasty deployments promoted via influencer content, as the proliferation of AI tools and purchasable aged accounts lowers barriers for adversaries.

These scams highlight the intersection of social engineering and technical deception in cryptocurrency, urging validation of inputs, outputs, and on-chain behaviors before engagement.

Indicators of Compromise

Type Value Note
Solidity SHA-1 2923cdf2caba3a92e0ea215d14343ce73e8f08a5 JazzBraze contract
Solidity SHA-1 f0a34770f03428c8abc9e73df93263f10f8320b1 SolidityTutorials contract
URL hxxps://codeshare[.]io/0bV94e Jazz_Braze code host
URL hxxps://pastebin[.]com/raw/8Yar7QyU ToddTutorials code host
EOA 0x872528989c4D20349D0dB3Ca06751d83DC86D831 JazzBraze attacker address
EOA 0x7359EA6AA3343b3238171e76F97e6aA3cDB8d696 SolidityTutorials attacker address

The Ultimate SOC-as-a-Service Pricing Guide for 2025– Download for Free


Source link