- MevBot scams target developers seeking risk-free passive income, exploiting their trust and deceiving them.
- Scammers use counterfeit articles, videos, and guides to lure and exploit developers’ desire for financial gain.
- ScamSniffer has identified over 100 domains associated with the MevBot scam, with the IP address 185.149.120.113 hosting many of these malicious websites.
In recent times, an alarming wave of scams has emerged, targeting unsuspecting developers seeking risk-free passive income. These scams, operating under the guise of MevBot, entice developers with false promises, only to exploit their trust and ultimately deceive them. This article aims to shed light on the inner workings of these scams, expose their malicious intentions, and provide crucial insights to help developers safeguard their investments.
Understanding the Modus Operandi
The perpetrators of MevBot scams employ various tactics to lure and defraud developers. They capitalize on the developers’ desire for financial gain and exploit their lack of awareness regarding the risks involved. By leveraging counterfeit Substack and Mirror articles, along with informative videos and step-by-step guides, scammers attempt to convince developers to deploy and execute malicious contracts using Remix.
Identifying the Scam Sites
In the relentless pursuit of ill-gotten gains, the MevBot scammers have deployed a multitude of websites targeting unsuspecting victims. ScamSniffer, an organization dedicated to monitoring such fraudulent activities, has identified over 100 domains associated with the MevBot scam.

Notably, the IP address 185.149.120.113 has been found responsible for hosting a significant number of these malicious websites.

Analyzing the Malicious Contracts
To comprehend the true nature of the MevBot scams, it is crucial to delve into the underlying code of the malicious contracts. Analysis of these contracts reveals a startling truth: regardless of whether developers invoke the Start, Stop, or Withdrawal functions, the code simply transfers the invested funds within the contract to the scammer’s wallet. This deceitful mechanism ensures that any funds invested by unsuspecting developers are swiftly and irrevocably diverted to the scammers.
Unveiling an OnChain Case
Examining a specific example, let us consider the malicious contract with the address 0x7149b95d704469798b924841ddB7c46944f20707. In this case, a victim attempted to transfer 10 ETH by calling the Start function twice using different wallets.

Regrettably, both attempts resulted in theft. Each time the Start function was invoked, the 10 ETH immediately found its way into the scammer’s wallet, identified by the address 0x3cd32e6bfe4a8883ec22f08818f0d0e1c2fbcd8c.
Alarming Scam Statistics

An analysis of on-chain data exposes the magnitude of the MevBot scam’s impact. Since January, approximately $1.69 million has been stolen from around 877 addresses. These distressing figures suggest that an average of $20,000 is pilfered on a daily basis, with a staggering sum exceeding $100,000 siphoned off on March 11th alone.

Conclusion
The MevBot scams represent a clear and present danger to developers seeking to explore the world of passive income. Vigilance and caution are paramount in safeguarding one’s investments from unscrupulous actors. By remaining informed about the deceptive tactics employed by scammers, developers can arm themselves with knowledge and take proactive measures to protect their funds. It is imperative to exercise due diligence, verify the authenticity of investment opportunities, and seek guidance from trusted sources within the blockchain community.
Disclaimer
The information provided in this article is for informational purposes only and should not be considered financial advice. The article does not offer sufficient information to make investment decisions, nor does it constitute an offer, recommendation, or solicitation to buy or sell any financial instrument. The content is opinion of the author and does not reflect any view or suggestion or any kind of advise from CryptoNewsBytes.com. The author declares he does not hold any of the above mentioned tokens or received any incentive from any company.
images sources