{"id":82349,"date":"2023-07-28T18:45:44","date_gmt":"2023-07-28T15:45:44","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=82349"},"modified":"2025-09-12T04:26:37","modified_gmt":"2025-09-12T01:26:37","slug":"experts-warn-of-risk-of-crypto-loss-when-trading-via-telegram-bots","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/experts-warn-of-risk-of-crypto-loss-when-trading-via-telegram-bots\/","title":{"rendered":"Experts warn of risk of crypto loss when trading via Telegram bots"},"content":{"rendered":"<p>Telegram-based crypto trading bots, while popular for their user-friendly interfaces and ease of use, could potentially lead to asset losses and are not safeguarded against hacker attacks, according to experts interviewed by ForkLog.<\/p>\n<p>The large audience of the Telegram messenger and demand for digital-currency exchange operations have driven an increase in trading bots, such as Unibot, Swipe, WagieBot and Bolt.<\/p>\n<p>According to <a href=\"https:\/\/dune.com\/whale_hunter\/dex-trading-bot-wars\">Dune Analytics<\/a>, to date more than 66,000 cryptocurrency holders have traded through such services for a total of over $149.4 million. Analysts warn that there are significant inaccuracies in their calculations.<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"444\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/Opera-Snimok_2023-07-28_183935_dune.com_-1024x444.png\" alt=\"Opera-Snimok_2023-07-28_183935_dune.com_\" class=\"wp-image-212481\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/Opera-Snimok_2023-07-28_183935_dune.com_-1024x444.png 1024w, https:\/\/forklog.com\/wp-content\/uploads\/Opera-Snimok_2023-07-28_183935_dune.com_-300x130.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/Opera-Snimok_2023-07-28_183935_dune.com_-768x333.png 768w, https:\/\/forklog.com\/wp-content\/uploads\/Opera-Snimok_2023-07-28_183935_dune.com_-1536x667.png 1536w, https:\/\/forklog.com\/wp-content\/uploads\/Opera-Snimok_2023-07-28_183935_dune.com_-2048x889.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Data: Dune Analytics.<\/figcaption><\/figure>\n<p>At the same time, the mechanisms for creating wallets and handling user assets raise concerns among experts.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Advantages of Bots<\/strong><\/h2>\n<p>Telegram crypto bots are designed to streamline the complex processes involved in wallet creation and authorising the necessary permissions for smart contracts on decentralized exchanges that handle asset transactions.<\/p>\n<p>A broad set of features and strategies for working with cryptocurrencies makes them convenient to use. They also deliver high operational speed.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u00abFor example, the popular Unibot specialises in rapid swaps on Uniswap, executing trades six times faster than on the DEX site\u00bb,  \u2014 explained ForkLog CEO Hacken Dmitry Budorin.<\/p>\n<\/blockquote>\n<p>Bots operate by integrating with various crypto exchanges and blockchain networks using software algorithms that perform predefined functions. Typically, using bots is free, with only a nominal transaction fee charged.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u00abTo start using a bot, you need to connect your existing wallet to the platform and share your private key. Or there is another way, when the Telegram bot creates a new wallet for you, <span class=\"old_tooltip\" data-descr=\"practice of inflating the value of a token created in a liquidity pool followed by a sharp withdrawal of funds\">generating cryptographic keys<\/span> itself\u00bb, \u2014 Budorin explains.<\/p>\n<\/blockquote>\n<p>Seed phrases are stored encrypted on the bots\u2019 servers and may be shown to the user on first install, says Mark Letsyuk, head of analytics and research at HAPI Labs.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Key Problems<\/strong><\/h2>\n<p>From the above, the user effectively delegates responsibility for safeguarding their assets to a third party. This is compounded by the fact that most bots have closed-source code and do not undergo security audits.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u00abDevelopers have full control over the code and can embed hidden features. Some bots provide only executable files, which limits the ability to verify security\u00bb, \u2014 notes Letsyuk.<\/p>\n<\/blockquote>\n<p>According to him, storing assets on third-party servers risks unauthorized data access due to security breaches, human factors, and vulnerabilities in the bot\u2019s code. Planned cyberattacks on crypto-bot servers, the creation of bots for fraud, or rug-pull schemes are not ruled out.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u00abAlthough popular crypto bots are typically designed with high security standards, no bot is completely immune to hacking or other attacks. Any vulnerability could lead to loss of funds or at least leakage of information\u00bb, \u2014 emphasises the expert.<\/p>\n<\/blockquote>\n<p>According to Dmitry Budorin, an additional risk stems from the Telegram messenger\u2019s technical characteristics, the code of which is not open and has not undergone independent auditing:<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u00abEnd-to-end encryption is available only for secret chats, with which bots cannot interact\u00bb.<\/p>\n<\/blockquote>\n<p>To avoid asset loss, experts recommend using only reliable and proven service providers \u2014 ideally with open-source code, a solid reputation and reviews, and audits by specialists in the field.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u00abIt is important to periodically update apps and passwords, regularly review bot permissions and revoke them if necessary, check active sessions and, where possible, enable two-factor authentication. Storing large sums of cryptocurrency with such tools is unacceptable; cold wallets exist for this purpose\u00bb, \u2014 concludes Mark Letsyuk.<\/p>\n<\/blockquote>\n<p>Earlier, ForkLog reported that operators of ransomware, malware developers and other attackers move their active activity <a href=\"https:\/\/forklog.com\/en\/news\/experts-report-cybercriminals-shifting-from-the-dark-web-to-telegram\">from the darknet to Telegram channels<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Telegram crypto bots are easy to use, but they are not protected from hacker attacks and could lead to the loss of assets.<\/p>\n","protected":false},"author":1,"featured_media":82350,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1442,1267,1111,723],"class_list":["post-82349","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-bot","tag-cryptocurrency-trading","tag-cybersecurity","tag-telegram"],"aioseo_notices":[],"amp_enabled":true,"views":"70","promo_type":"1","layout_type":"1","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/82349","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=82349"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/82349\/revisions"}],"predecessor-version":[{"id":82351,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/82349\/revisions\/82351"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/82350"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=82349"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=82349"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=82349"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}