Uncovering Malicious Cryptocurrency Scam Domains and Hacked YouTube Channels
Infoblox researchers uncovered a campaign involving malicious domains hosting cryptocurrency scams linked to hacked YouTube channels. The adversary, CryptDesignBot, registers lookalike domains impersonating brands like Tesla and celebrities such as Elon Musk, frequently changing registrars to evade detection. Hacked YouTube channels are exploited to promote these scams via fake livestreams, often promising to double cryptocurrency holdings, a tactic reminiscent of old RuneScape scams. The threat leverages phishing, session hijacking, and domain impersonation to deceive victims. Protective measures include deploying protective DNS, securing cookies, enforcing HTTPS, generating random session IDs, and setting session timeouts. Infoblox’s BloxOne Threat Defense is highlighted as a tool to mitigate these threats. The campaign poses a medium severity risk due to its social engineering nature and potential financial impact. Organizations globally with cryptocurrency interests and users of affected platforms should remain vigilant.
AI Analysis
Technical Summary
The threat involves a coordinated campaign by the adversary CryptDesignBot, which operates a network of malicious domains designed to scam cryptocurrency users. These domains are registered under various lookalike names mimicking legitimate brands and celebrities, including Tesla and Elon Musk, to lend credibility and attract victims. The attackers frequently change domain registrars to obscure ownership and hinder takedown efforts. A notable tactic includes compromising legitimate YouTube channels to broadcast fake livestreams promoting these scam domains, thereby exploiting the trust and reach of popular content creators. The scams typically promise to double cryptocurrency investments, a lure that echoes historical scams such as those targeting RuneScape players. Technical tactics include phishing to steal credentials or funds, session hijacking facilitated by insecure cookie handling, and use of deceptive domain names to mislead users. The campaign leverages multiple MITRE ATT&CK techniques such as T1539 (stealing web session cookies), T1114 (email collection), T1608.004 (domain registration), T1585.002 (domain registration), and T1586 (compromise accounts). Protective DNS solutions, like Infoblox’s BloxOne Threat Defense, can help block access to these malicious domains. Additional security controls recommended include enforcing HTTPS to prevent interception, securing cookies with HttpOnly and Secure flags, generating random session identifiers to prevent session fixation, and implementing session timeouts to reduce hijacking windows. The campaign does not currently have known exploits in the wild but represents a persistent social engineering and infrastructure threat targeting cryptocurrency users and platforms.
Potential Impact
This threat primarily targets cryptocurrency users and investors by deceiving them into sending funds to fraudulent domains, resulting in direct financial losses. The use of hacked YouTube channels amplifies the reach and credibility of the scams, increasing victim count and potential monetary damage. Organizations that rely on YouTube for marketing or customer engagement risk reputational damage if their channels are compromised. The frequent registrar changes complicate domain takedown efforts, prolonging exposure and increasing the likelihood of victimization. Session hijacking and phishing techniques can lead to unauthorized access to user accounts, further exacerbating losses and enabling secondary attacks. The impact extends globally due to the widespread use of cryptocurrency and popular platforms like YouTube. While the threat does not directly compromise enterprise infrastructure, the financial and reputational consequences for individuals and organizations involved in cryptocurrency transactions or digital marketing can be significant. The medium severity reflects the social engineering nature, the financial stakes, and the technical sophistication in evading detection.
Mitigation Recommendations
Organizations and users should implement protective DNS solutions to block access to known malicious domains and prevent initial contact with scam infrastructure. Security teams should monitor domain registrations for lookalike domains targeting their brands and coordinate with registrars and law enforcement for rapid takedown. YouTube channel owners must enforce strong account security measures including multi-factor authentication, regular credential audits, and monitoring for unauthorized access or unusual activity. Web applications should secure cookies by setting HttpOnly and Secure flags, use HTTPS exclusively to protect data in transit, and generate random session IDs to prevent session fixation attacks. Implementing session timeouts reduces the window for session hijacking. User education campaigns should highlight the risks of cryptocurrency doubling scams and the dangers of interacting with unsolicited crypto offers, especially those promoted via social media or livestreams. Incident response plans should include procedures for responding to compromised social media accounts and fraudulent domain detection. Collaboration with threat intelligence providers like Infoblox can enhance detection and response capabilities. Finally, organizations should regularly update threat intelligence feeds to stay informed about emerging scam domains and tactics.
Affected Countries
United States, United Kingdom, Canada, Germany, Australia, Japan, South Korea, India, Brazil, Russia
Indicators of Compromise
- domain: 22spacex.space
- domain: 22tesla.io
- domain: 2x-tsla.com
- domain: adidas-drop.org
- domain: andrewtatecash.com
- domain: bonustesla.com
- domain: btcdrop.org
- domain: ceo-xrp.net
- domain: ceotesla.pro
- domain: chatgptbonus.live
- domain: doge2022-elon.com
- domain: dot-pump.com
- domain: double-ethereum.info
- domain: doubletesla.live
- domain: elon-gives.net
- domain: elon-kanye.net
- domain: promo-musk.com
- domain: promo-musk.org
- domain: promo-prize.live
- domain: promo-tesla.info
- domain: promo-tesla.org
- domain: promo-x2.live
- domain: youtubetesla.net
Uncovering Malicious Cryptocurrency Scam Domains and Hacked YouTube Channels
Description
Infoblox researchers uncovered a campaign involving malicious domains hosting cryptocurrency scams linked to hacked YouTube channels. The adversary, CryptDesignBot, registers lookalike domains impersonating brands like Tesla and celebrities such as Elon Musk, frequently changing registrars to evade detection. Hacked YouTube channels are exploited to promote these scams via fake livestreams, often promising to double cryptocurrency holdings, a tactic reminiscent of old RuneScape scams. The threat leverages phishing, session hijacking, and domain impersonation to deceive victims. Protective measures include deploying protective DNS, securing cookies, enforcing HTTPS, generating random session IDs, and setting session timeouts. Infoblox’s BloxOne Threat Defense is highlighted as a tool to mitigate these threats. The campaign poses a medium severity risk due to its social engineering nature and potential financial impact. Organizations globally with cryptocurrency interests and users of affected platforms should remain vigilant.
AI-Powered Analysis
Technical Analysis
The threat involves a coordinated campaign by the adversary CryptDesignBot, which operates a network of malicious domains designed to scam cryptocurrency users. These domains are registered under various lookalike names mimicking legitimate brands and celebrities, including Tesla and Elon Musk, to lend credibility and attract victims. The attackers frequently change domain registrars to obscure ownership and hinder takedown efforts. A notable tactic includes compromising legitimate YouTube channels to broadcast fake livestreams promoting these scam domains, thereby exploiting the trust and reach of popular content creators. The scams typically promise to double cryptocurrency investments, a lure that echoes historical scams such as those targeting RuneScape players. Technical tactics include phishing to steal credentials or funds, session hijacking facilitated by insecure cookie handling, and use of deceptive domain names to mislead users. The campaign leverages multiple MITRE ATT&CK techniques such as T1539 (stealing web session cookies), T1114 (email collection), T1608.004 (domain registration), T1585.002 (domain registration), and T1586 (compromise accounts). Protective DNS solutions, like Infoblox’s BloxOne Threat Defense, can help block access to these malicious domains. Additional security controls recommended include enforcing HTTPS to prevent interception, securing cookies with HttpOnly and Secure flags, generating random session identifiers to prevent session fixation, and implementing session timeouts to reduce hijacking windows. The campaign does not currently have known exploits in the wild but represents a persistent social engineering and infrastructure threat targeting cryptocurrency users and platforms.
Potential Impact
This threat primarily targets cryptocurrency users and investors by deceiving them into sending funds to fraudulent domains, resulting in direct financial losses. The use of hacked YouTube channels amplifies the reach and credibility of the scams, increasing victim count and potential monetary damage. Organizations that rely on YouTube for marketing or customer engagement risk reputational damage if their channels are compromised. The frequent registrar changes complicate domain takedown efforts, prolonging exposure and increasing the likelihood of victimization. Session hijacking and phishing techniques can lead to unauthorized access to user accounts, further exacerbating losses and enabling secondary attacks. The impact extends globally due to the widespread use of cryptocurrency and popular platforms like YouTube. While the threat does not directly compromise enterprise infrastructure, the financial and reputational consequences for individuals and organizations involved in cryptocurrency transactions or digital marketing can be significant. The medium severity reflects the social engineering nature, the financial stakes, and the technical sophistication in evading detection.
Mitigation Recommendations
Organizations and users should implement protective DNS solutions to block access to known malicious domains and prevent initial contact with scam infrastructure. Security teams should monitor domain registrations for lookalike domains targeting their brands and coordinate with registrars and law enforcement for rapid takedown. YouTube channel owners must enforce strong account security measures including multi-factor authentication, regular credential audits, and monitoring for unauthorized access or unusual activity. Web applications should secure cookies by setting HttpOnly and Secure flags, use HTTPS exclusively to protect data in transit, and generate random session IDs to prevent session fixation attacks. Implementing session timeouts reduces the window for session hijacking. User education campaigns should highlight the risks of cryptocurrency doubling scams and the dangers of interacting with unsolicited crypto offers, especially those promoted via social media or livestreams. Incident response plans should include procedures for responding to compromised social media accounts and fraudulent domain detection. Collaboration with threat intelligence providers like Infoblox can enhance detection and response capabilities. Finally, organizations should regularly update threat intelligence feeds to stay informed about emerging scam domains and tactics.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.infoblox.com/blog/threat-intelligence/infoblox-researchers-uncover-malicious-domains-hosting-cryptocurrency-scams"]
- Adversary
- CryptDesignBot
- Pulse Id
- 69972ba497c219e7b03d9bec
- Threat Score
- null
Indicators of Compromise
Domain
| Value | Description | Copy |
|---|---|---|
domain22spacex.space | — | |
domain22tesla.io | — | |
domain2x-tsla.com | — | |
domainadidas-drop.org | — | |
domainandrewtatecash.com | — | |
domainbonustesla.com | — | |
domainbtcdrop.org | — | |
domainceo-xrp.net | — | |
domainceotesla.pro | — | |
domainchatgptbonus.live | — | |
domaindoge2022-elon.com | — | |
domaindot-pump.com | — | |
domaindouble-ethereum.info | — | |
domaindoubletesla.live | — | |
domainelon-gives.net | — | |
domainelon-kanye.net | — | |
domainpromo-musk.com | — | |
domainpromo-musk.org | — | |
domainpromo-prize.live | — | |
domainpromo-tesla.info | — | |
domainpromo-tesla.org | — | |
domainpromo-x2.live | — | |
domainyoutubetesla.net | — |
Threat ID: 69974fe8d7880ec89b065c04
Added to database: 2/19/2026, 6:01:12 PM
Last enriched: 2/19/2026, 6:16:41 PM
Last updated: 2/19/2026, 8:52:08 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
DNS Used to Hide Fake Investment Platform Schemes
MediumClickFix in action: how fake captcha can encrypt an entire company
MediumFake Homebrew Pages Deliver Cuckoo Stealer via ClickFix | macOS Threat Hunting Analysis
MediumThe Curious Case of the Triton Malware Fork
MediumBanners, Bots and Butchers: The AI-Driven Long Con in Asia
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.