The Devil Behind the Mirror: Tracking the Campaigns of Cryptocurrency Abuses on the Dark Web
- URL: http://arxiv.org/abs/2401.04662v2
- Date: Sun, 7 Apr 2024 15:10:34 GMT
- Title: The Devil Behind the Mirror: Tracking the Campaigns of Cryptocurrency Abuses on the Dark Web
- Authors: Pengcheng Xia, Zhou Yu, Kailong Wang, Kai Ma, Shuo Chen, Xiapu Luo, Yajin Zhou, Lei Wu, Guangdong Bai,
- Abstract summary: We identify 2,564 illicit sites with 1,189 illicit blockchain addresses, which account for 90.8 BTC in revenue.
Our exploration suggests that illicit activities on the dark web have strong correlations, which can guide us to identify new illicit blockchain addresses and onions.
- Score: 39.96427593096699
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The dark web has emerged as the state-of-the-art solution for enhanced anonymity. Just like a double-edged sword, it also inadvertently becomes the safety net and breeding ground for illicit activities. Among them, cryptocurrencies have been prevalently abused to receive illicit income while evading regulations. Despite the continuing efforts to combat illicit activities, there is still a lack of an in-depth understanding regarding the characteristics and dynamics of cryptocurrency abuses on the dark web. In this work, we conduct a multi-dimensional and systematic study to track cryptocurrency-related illicit activities and campaigns on the dark web. We first harvest a dataset of 4,923 cryptocurrency-related onion sites with over 130K pages. Then, we detect and extract the illicit blockchain transactions to characterize the cryptocurrency abuses, targeting features from single/clustered addresses and illicit campaigns. Throughout our study, we have identified 2,564 illicit sites with 1,189 illicit blockchain addresses, which account for 90.8 BTC in revenue. Based on their inner connections, we further identify 66 campaigns behind them. Our exploration suggests that illicit activities on the dark web have strong correlations, which can guide us to identify new illicit blockchain addresses and onions, and raise alarms at the early stage of their deployment.
Related papers
- Identifying key players in dark web marketplaces [58.720142291102135]
This paper aims to identify the key players in Bitcoin transaction networks linked to dark markets.
We show that a large fraction of the traded volume is concentrated in a small group of elite market participants.
Our findings suggest that understanding the behavior of key players in dark web marketplaces is critical to effectively disrupting illegal activities.
arXiv Detail & Related papers (2023-06-15T20:30:43Z) - Who is Gambling? Finding Cryptocurrency Gamblers Using Multi-modal
Retrieval Methods [46.17004007514548]
We propose a tool termed ETHGamDet to discover gambling behaviors and identify the contracts and addresses involved in gambling.
The tool is able to automatically detect the smart contracts and addresses involved in gambling by scrutinizing the smart contract code and address transaction records.
We present a novel LightGBM model with memory components, which possesses the ability to learn from its own misclassifications.
arXiv Detail & Related papers (2022-11-27T10:07:13Z) - Towards Measuring the Traceability of Cryptocurrencies [0.5371337604556311]
We put forward a formal framework to measure the (un)traceability and anonymity of cryptocurrencies.
Our work provides the first practical, efficient, and probabilistic measure to assess the traceability of cryptocurrencies.
We implement and extensively evaluate our proposed traceability measure on several cryptocurrency transaction graphs.
arXiv Detail & Related papers (2022-11-08T14:08:39Z) - Token Spammers, Rug Pulls, and SniperBots: An Analysis of the Ecosystem of Tokens in Ethereum and in the Binance Smart Chain (BNB) [50.888293380932616]
We study the ecosystem of the tokens and liquidity pools.
We find that about 60% of tokens are active for less than one day.
We estimate that 1-day rug pulls generated $240 million in profits.
arXiv Detail & Related papers (2022-06-16T14:20:19Z) - Inspection-L: Practical GNN-Based Money Laundering Detection System for
Bitcoin [0.0]
This paper proposes Inspection-L, a graph neural network (GNN) framework based on self-supervised Deep Graph Infomax (DGI), with Random Forest (RF) to detect illicit transactions for Anti-Money laundering (AML)
To the best of our knowledge, our proposal is the first of applying self-supervised GNNs to the problem of AML in Bitcoin.
The proposed method has been evaluated on the Elliptic dataset and shows that our approach outperforms the state-of-the-art in terms of key classification metrics.
arXiv Detail & Related papers (2022-03-20T06:19:18Z) - Crypto Currency Regulation and Law Enforcement Perspectives [0.6445605125467572]
We look at various questions of criminal use and misuse of technology.
The aim of the paper is to raise a set of concerns arising in the criminal justice and policing circles.
We propose a simplified classification of crimes related to crypto currency.
arXiv Detail & Related papers (2021-09-01T09:56:28Z) - GuiltyWalker: Distance to illicit nodes in the Bitcoin network [1.7550798084784973]
We propose new features based on the structure of the graph and past labels to boost the performance of machine learning methods to detect money laundering.
Our method, GuiltyWalker, performs random walks on the bitcoin transaction graph and computes features based on the distance to illicit transactions.
arXiv Detail & Related papers (2021-02-10T10:29:13Z) - Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's
Post-Quantum Security [67.06003361150228]
A proof of work (PoW) is an important cryptographic construct enabling a party to convince others that they invested some effort in solving a computational task.
In this work, we examine the hardness of finding such chain of PoWs against quantum strategies.
We prove that the chain of PoWs problem reduces to a problem we call multi-solution Bernoulli search, for which we establish its quantum query complexity.
arXiv Detail & Related papers (2020-12-30T18:03:56Z) - How to Not Get Caught When You Launder Money on Blockchain? [20.970223434542508]
Public blockchains have become a hotbed of research for developing AI tools to detect and trace users and transactions that are related to e-crime.
We argue that following a few select strategies can make money laundering on blockchain virtually undetectable with most of the existing tools and algorithms.
arXiv Detail & Related papers (2020-09-22T02:12:15Z) - Pump and Dumps in the Bitcoin Era: Real Time Detection of Cryptocurrency Market Manipulations [50.521292491613224]
We perform an in-depth analysis of pump and dump schemes organized by communities over the Internet.
We observe how these communities are organized and how they carry out the fraud.
We introduce an approach to detect the fraud in real time that outperforms the current state of the art.
arXiv Detail & Related papers (2020-05-04T21:36:18Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.