Submitted by Global Scam Watch on

YouTube reviewer scamScammers target individuals through unsolicited phone calls and electronic messages. These actors pose as hiring agents for YouTube or associated marketing firms to promote fraudulent remote positions.

Deceptive Claims and Contact Tactics

Scammers initiate communication through specific channels to establish a false sense of legitimacy.

  •  Unsolicited Phone Calls: Scammers use live agents or automated recordings to announce fake job openings. They claim the recipient's profile was selected based on online activity or an existing resume.
  •  Messaging Outreach: Brief text messages or WhatsApp notifications follow the initial call. These messages detail high daily earnings for minimal effort. They typically direct the recipient to contact a hiring manager on Telegram.
  •   Fabricated Job Role: Scammers claim the position involves simple tasks such as watching, liking, or reviewing video content to improve engagement metrics for specific creators. This description is a total fabrication used to lure victims into the scheme.
  •  Trial Tasks: To make the job appear real, scammers provide links to legitimate YouTube videos. They instruct the victim to like the videos and submit screenshots as evidence.

Bait Payments as Phishing Tools

​The small "trial payment" serves as a sophisticated phishing technique rather than a genuine reward.

  • Account Verification: By requesting bank details, e-transfer emails, or crypto wallet addresses to send the bait payment, scammers confirm the validity of the victim's financial accounts.
  • ​Harvesting Personal Data: The process of "onboarding" for the initial payout often requires the victim to provide full names, phone numbers, and occasionally government identification.
  • ​Building Psychological Trust: Receiving a successful deposit conditions the victim to believe the operation is legitimate, making them more likely to provide sensitive information or larger sums of money later.
  • ​Money Laundering Involvement: These bait payments often originate from other victims' stolen accounts. Accepting these funds can link the recipient to criminal activity, potentially leading to bank account closures or legal investigations.

The Financial Extraction Phase

After the initial payout, the scam transitions into a task scam or advance fee model where the actual financial theft occurs.

  •  Prepaid Tasks: The manager introduces VIP or Merchant tasks yielding higher commissions. To access these, the victim must first deposit or prepay an amount of money into a provided account, promising a 30% return.
  •  Fake Dashboards: Victims receive access to a website or app showing a growing balance. This visual representation encourages further investment to reach higher tiers of earnings.
  •  Withdrawal Blocks: When the victim attempts to withdraw accumulated funds, scammers claim a system error or tax requirement. They demand additional payments to unfreeze the account or verify the identity.
  •  Cessation of Contact: Once the victim stops paying or questions the process, scammers block the user on all platforms and delete the messaging groups.

Identifying Scam Red Flags

Recognizing specific inconsistencies in these interactions prevents financial loss.

  •  Non-Standard Platforms: Legitimate global corporations like Google or YouTube do not conduct recruitment or payroll through WhatsApp, Telegram, or unsolicited SMS.
  •  Paying To Work: No genuine employer requires a worker to pay a security deposit, VIP fee, or prepayment to receive a salary.
  •  High Pay For Trivial Work: Paying hundreds of dollars daily for clicking a like button is not a viable business model and serves only as bait.

 Unsolicited Offers: Receiving a job offer for a position never applied for is a primary indicator of a scam.

Limitations of Call Blocking

Standard phone features often prove ineffective against persistent outreach.

  • Number Spoofing: Scammers frequently use software to mask their true identity, displaying local or familiar area codes on caller ID. This tactic bypasses block lists and encourages the recipient to answer.
  • Frequent Number Cycling: Automated systems generate new outbound numbers constantly. Blocking a single instance does not prevent subsequent calls from the same operation using different digits.
  • Systemic Evasion: Because scammers do not use legitimate telecommunications infrastructure, they remain unaffected by individual device filters or national "do not call" registries.

Protective Protocols

Direct action should be taken to mitigate the risk from these targeted communications.

  •  Terminate Calls: Do not engage with callers offering YouTube Reviewer roles. Hanging up immediately prevents scammers from confirming the phone line is active.
  •  Secure Financial Data: If banking information was shared or a trial payment was received, contact the financial institution. These payments often originate from stolen accounts, leading to the recipient's account being flagged for suspicious activity.
  •  Verify Independently: If a call claims to represent a specific agency, contact that firm directly through their official, verified website rather than using contact details provided in the message.

A Growing Trend in Employment Fraud


The YouTube Video Reviewer scam is not isolated but part of a broader trend of online employment fraud. It closely mimics other prevalent schemes, such as the Amazon Product Reviewer or Amazon Preview scams. In those variations, scammers lure individuals with promises of high pay for writing product reviews or providing feedback on unreleased movies and TV shows. Like the YouTube version, they leverage recognizable brand names to create a false sense of security.


Furthermore, these scams often serve a dual purpose: financial theft and the recruitment of money mules. The early "bait payments" and "training bonuses" are frequently made using funds stolen from other victims. By receiving and potentially transferring these funds, the unknowing "employee" is used as a money mule, laundering the proceeds of the crime and placing themselves at significant legal and financial risk.


Regardless of the platform, the operational model remains identical: initiate contact through private, unsolicited channels, demand upfront payments, and block the victim once financial resources are exhausted. This similarity highlights the critical need for constant vigilance. If a remote job offer for a major company is unsolicited, requires minimal effort for high compensation, or demands any form of prepayment, it should be treated as fraudulent.