Thursday, May 15, 2025
HomecryptocurrencyCryptoScam Strikes Misusing Trump & Musk Interview

CryptoScam Strikes Misusing Trump & Musk Interview

Published on

SIEM as a Service

Follow Us on Google News

Scammers have exploited the popularity of former President Donald Trump and tech mogul Elon Musk to deceive unsuspecting victims.

According to a recent tweet by Avast Threat Labs, the fraudulent scheme involved hijacking YouTube accounts to broadcast fake interviews, and within just a few hours, it amassed approximately $9,000.

Hijacked YouTube Accounts Fuel Deception

The scam operated by taking over legitimate YouTube accounts, which were then used to stream fabricated interviews with Trump and Musk. These streams were designed to appear authentic, leveraging the public’s trust in these high-profile figures.

- Advertisement - Google News

Are you from SOC and DFIR Teams? Analyse Malware Incidents & get live Access with ANY.RUN -> Get 14 Days Free Access

The scammers employed sophisticated video editing techniques to make it seem that Trump and Musk endorsed cryptocurrency investments, enticing viewers to part with their money.

The fraudulent broadcasts included website links encouraging viewers to invest in cryptocurrencies, promising high returns. However, these sites were merely fronts for the scam, siphoning funds from unsuspecting investors.

Rapid Financial Gains Highlight Scam’s Effectiveness

The scammers collected around $9,000 in hours, highlighting the scheme’s effectiveness and rapid execution.

This incident serves as a stark reminder of the vulnerabilities within digital platforms and the ease with which cybercriminals can exploit them.

Using well-known personalities like Trump and Musk added a veneer of legitimacy to the scam, making it more convincing and harder for viewers to discern its fraudulent nature.

As cryptocurrency scams evolve, individuals must remain vigilant and skeptical of online investment opportunities, especially those that seem too good to be true.

Experts advise verifying the authenticity of investment platforms and being cautious of unsolicited investment advice, particularly when it appears to be endorsed by celebrities.

This incident underscores the need for increased security measures on digital platforms to prevent account hijackings and protect users from falling victim to such scams.

Download Free Cybersecurity Planning Checklist for SME Leaders (PDF) – Free Download

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Threat Actors Leverage Weaponized HTML Files to Deliver Horabot Malware

A recent discovery by FortiGuard Labs has unveiled a cunning phishing campaign orchestrated by...

TA406 Hackers Target Government Entities to Steal Login Credentials

The North Korean state-sponsored threat actor TA406, also tracked as Opal Sleet and Konni,...

Google Threat Intelligence Releases Actionable Threat Hunting Technique for Malicious .desktop Files

Google Threat Intelligence has unveiled a series of sophisticated threat hunting techniques to detect...

New Adobe Photoshop Vulnerability Enables Arbitrary Code Execution

Adobe has released critical security updates addressing three high-severity vulnerabilities (CVE-2025-30324, CVE-2025-30325, CVE-2025-30326) in...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Leverage Weaponized HTML Files to Deliver Horabot Malware

A recent discovery by FortiGuard Labs has unveiled a cunning phishing campaign orchestrated by...

TA406 Hackers Target Government Entities to Steal Login Credentials

The North Korean state-sponsored threat actor TA406, also tracked as Opal Sleet and Konni,...

Google Threat Intelligence Releases Actionable Threat Hunting Technique for Malicious .desktop Files

Google Threat Intelligence has unveiled a series of sophisticated threat hunting techniques to detect...