Towards Understanding and Characterizing the Arbitrage Bot Scam In the Wild
- URL: http://arxiv.org/abs/2310.12306v1
- Date: Wed, 18 Oct 2023 20:13:17 GMT
- Title: Towards Understanding and Characterizing the Arbitrage Bot Scam In the Wild
- Authors: Kai Li, Shixuan Guan, Darren Lee,
- Abstract summary: This paper presents the first comprehensive analysis of an emerging cryptocurrency scam named "arbitrage bot" disseminated on online social networks.
The scam revolves around Decentralized Exchanges (DEX) arbitrage and aims to lure victims into executing a so-called "bot contract" to steal funds from them.
To collect the scam at a large scale, we developed a fully automated scam detection system named CryptoScamHunter.
- Score: 4.129433926074777
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: This paper presents the first comprehensive analysis of an emerging cryptocurrency scam named "arbitrage bot" disseminated on online social networks. The scam revolves around Decentralized Exchanges (DEX) arbitrage and aims to lure victims into executing a so-called "bot contract" to steal funds from them. To collect the scam at a large scale, we developed a fully automated scam detection system named CryptoScamHunter, which continuously collects YouTube videos and automatically detects scams. Meanwhile, CryptoScamHunter can download the source code of the bot contract from the provided links and extract the associated scam cryptocurrency address. Through deploying CryptoScamHunter from Jun. 2022 to Jun. 2023, we have detected 10,442 arbitrage bot scam videos published from thousands of YouTube accounts. Our analysis reveals that different strategies have been utilized in spreading the scam, including crafting popular accounts, registering spam accounts, and using obfuscation tricks to hide the real scam address in the bot contracts. Moreover, from the scam videos we have collected over 800 malicious bot contracts with source code and extracted 354 scam addresses. By further expanding the scam addresses with a similar contract matching technique, we have obtained a total of 1,697 scam addresses. Through tracing the transactions of all scam addresses on the Ethereum mainnet and Binance Smart Chain, we reveal that over 25,000 victims have fallen prey to this scam, resulting in a financial loss of up to 15 million USD. Overall, our work sheds light on the dissemination tactics and censorship evasion strategies adopted in the arbitrage bot scam, as well as on the scale and impact of such a scam on online social networks and blockchain platforms, emphasizing the urgent need for effective detection and prevention mechanisms against such fraudulent activity.
Related papers
- Serial Scammers and Attack of the Clones: How Scammers Coordinate Multiple Rug Pulls on Decentralized Exchanges [12.003838498545276]
We first constructed two datasets of around 384,000 scammer addresses behind all one-day Simple Rug Pulls on Uniswap and Pancakeswap.
These patterns reveal typical ways scammers run multiple Rug Pulls and organize the money flow among different addresses.
We then studied the more general concept of scam cluster, which comprises scammer addresses linked together via direct ETH/BNB transfers or behind the same scam pools.
arXiv Detail & Related papers (2024-12-14T23:28:13Z) - (Blind) Users Really Do Heed Aural Telephone Scam Warnings [42.93674984678535]
We explore how two groups of individuals, legally blind (n=36) and sighted ones (n=36) react to aural telephone scam warnings in naturalistic settings.
We developed an aural variant of telephone scam warnings and tested them in three conditions: baseline (no warning), short warning, and contextual warning that preceded the scam's content.
Both the legally blind and the sighted participants found the contextual warnings as powerful usable security cues.
arXiv Detail & Related papers (2024-12-05T09:47:38Z) - Detecting Malicious Accounts in Web3 through Transaction Graph [5.860182743283932]
ScamSweeper is a novel framework to identify web3 scams on a large-scale transaction dataset.
Our experiments indicate that ScamSweeper exceeds the state-of-the-art in detecting web3 scams.
arXiv Detail & Related papers (2024-10-28T03:56:22Z) - Give and Take: An End-To-End Investigation of Giveaway Scam Conversion Rates [8.24724427283375]
We study how cryptocurrency giveaway scams operate at scale.
We find that 1 in 1000 scam tweets, and 4 in 100,000 livestream views, net a victim.
Scammers managed to extract nearly $4.62 million from just hundreds of victims.
arXiv Detail & Related papers (2024-05-16T01:50:50Z) - Conning the Crypto Conman: End-to-End Analysis of Cryptocurrency-based Technical Support Scams [19.802676243375615]
There is an increase in an emerging fraud trend called cryptocurrency-based technical support scam.
We present an analysis apparatus called HoneyTweet to analyze this kind of scam.
arXiv Detail & Related papers (2024-01-18T09:31:45Z) - Who is Gambling? Finding Cryptocurrency Gamblers Using Multi-modal
Retrieval Methods [46.17004007514548]
We propose a tool termed ETHGamDet to discover gambling behaviors and identify the contracts and addresses involved in gambling.
The tool is able to automatically detect the smart contracts and addresses involved in gambling by scrutinizing the smart contract code and address transaction records.
We present a novel LightGBM model with memory components, which possesses the ability to learn from its own misclassifications.
arXiv Detail & Related papers (2022-11-27T10:07:13Z) - Active Countermeasures for Email Fraud [2.6856688022781556]
Scam-baiters play the roles of victims, reply to scammers, and try to waste their time and attention with long and unproductive conversations.
We developed and deployed an expandable scam-baiting mailserver that can conduct scam-baiting activities automatically.
arXiv Detail & Related papers (2022-10-26T21:20:13Z) - Token Spammers, Rug Pulls, and SniperBots: An Analysis of the Ecosystem of Tokens in Ethereum and in the Binance Smart Chain (BNB) [50.888293380932616]
We study the ecosystem of the tokens and liquidity pools.
We find that about 60% of tokens are active for less than one day.
We estimate that 1-day rug pulls generated $240 million in profits.
arXiv Detail & Related papers (2022-06-16T14:20:19Z) - Uncovering the Dark Side of Telegram: Fakes, Clones, Scams, and
Conspiracy Movements [67.39353554498636]
We perform a large-scale analysis of Telegram by collecting 35,382 different channels and over 130,000,000 messages.
We find some of the infamous activities also present on privacy-preserving services of the Dark Web, such as carding.
We propose a machine learning model that is able to identify fake channels with an accuracy of 86%.
arXiv Detail & Related papers (2021-11-26T14:53:31Z) - The Doge of Wall Street: Analysis and Detection of Pump and Dump Cryptocurrency Manipulations [50.521292491613224]
This paper performs an in-depth analysis of two market manipulations organized by communities over the Internet: The pump and dump and the crowd pump.
The pump and dump scheme is a fraud as old as the stock market. Now, it got new vitality in the loosely regulated market of cryptocurrencies.
We report on three case studies related to pump and dump groups.
arXiv Detail & Related papers (2021-05-03T10:20:47Z) - Pump and Dumps in the Bitcoin Era: Real Time Detection of Cryptocurrency Market Manipulations [50.521292491613224]
We perform an in-depth analysis of pump and dump schemes organized by communities over the Internet.
We observe how these communities are organized and how they carry out the fraud.
We introduce an approach to detect the fraud in real time that outperforms the current state of the art.
arXiv Detail & Related papers (2020-05-04T21:36:18Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.