Conning the Crypto Conman: End-to-End Analysis of Cryptocurrency-based Technical Support Scams
- URL: http://arxiv.org/abs/2401.09824v1
- Date: Thu, 18 Jan 2024 09:31:45 GMT
- Title: Conning the Crypto Conman: End-to-End Analysis of Cryptocurrency-based Technical Support Scams
- Authors: Bhupendra Acharya, Muhammad Saad, Antonio Emanuele Cinà, Lea Schönherr, Hoang Dai Nguyen, Adam Oest, Phani Vadrevu, Thorsten Holz,
- Abstract summary: There is an increase in an emerging fraud trend called cryptocurrency-based technical support scam.
We present an analysis apparatus called HoneyTweet to analyze this kind of scam.
- Score: 19.802676243375615
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The mainstream adoption of cryptocurrencies has led to a surge in wallet-related issues reported by ordinary users on social media platforms. In parallel, there is an increase in an emerging fraud trend called cryptocurrency-based technical support scam, in which fraudsters offer fake wallet recovery services and target users experiencing wallet-related issues. In this paper, we perform a comprehensive study of cryptocurrency-based technical support scams. We present an analysis apparatus called HoneyTweet to analyze this kind of scam. Through HoneyTweet, we lure over 9K scammers by posting 25K fake wallet support tweets (so-called honey tweets). We then deploy automated systems to interact with scammers to analyze their modus operandi. In our experiments, we observe that scammers use Twitter as a starting point for the scam, after which they pivot to other communication channels (eg email, Instagram, or Telegram) to complete the fraud activity. We track scammers across those communication channels and bait them into revealing their payment methods. Based on the modes of payment, we uncover two categories of scammers that either request secret key phrase submissions from their victims or direct payments to their digital wallets. Furthermore, we obtain scam confirmation by deploying honey wallet addresses and validating private key theft. We also collaborate with the prominent payment service provider by sharing scammer data collections. The payment service provider feedback was consistent with our findings, thereby supporting our methodology and results. By consolidating our analysis across various vantage points, we provide an end-to-end scam lifecycle analysis and propose recommendations for scam mitigation.
Related papers
- Pirates of Charity: Exploring Donation-based Abuses in Social Media Platforms [15.45960607413968]
We conduct a large-scale analysis of donation-based scams on social media platforms.
We identified 832 scammers using various techniques to deceive users into making fraudulent donations.
Our study highlights significant weaknesses in social media platforms' ability to protect users from fraudulent donations.
arXiv Detail & Related papers (2024-12-20T07:26:43Z) - ScamChatBot: An End-to-End Analysis of Fake Account Recovery on Social Media via Chatbots [18.10200822118935]
This study focuses on scammers engaging in fake technical support to target users who are having problems recovering their accounts.
The main contribution of our work is the development of an automated system that interacts with scammers.
Our results show that scammers employ many social media profiles asking users to contact them via a few communication channels.
This automated approach highlights how scammers use a variety of strategies, including role-playing, to trick victims into disclosing personal or financial information.
arXiv Detail & Related papers (2024-12-19T17:22:35Z) - Jäger: Automated Telephone Call Traceback [45.67265362470739]
We introduce J"ager, a distributed secure call traceback system.
J"ager can trace a call in a few seconds, even with partial deployment.
arXiv Detail & Related papers (2024-09-04T16:09:28Z) - Understanding crypter-as-a-service in a popular underground marketplace [51.328567400947435]
Crypters are pieces of software whose main goal is to transform a target binary so it can avoid detection from Anti Viruses (AVs) applications.
The crypter-as-a-service model has gained popularity, in response to the increased sophistication of detection mechanisms.
This paper provides the first study on an online underground market dedicated to crypter-as-a-service.
arXiv Detail & Related papers (2024-05-20T08:35:39Z) - Give and Take: An End-To-End Investigation of Giveaway Scam Conversion Rates [8.24724427283375]
We study how cryptocurrency giveaway scams operate at scale.
We find that 1 in 1000 scam tweets, and 4 in 100,000 livestream views, net a victim.
Scammers managed to extract nearly $4.62 million from just hundreds of victims.
arXiv Detail & Related papers (2024-05-16T01:50:50Z) - Towards Understanding and Characterizing the Arbitrage Bot Scam In the Wild [4.129433926074777]
This paper presents the first comprehensive analysis of an emerging cryptocurrency scam named "arbitrage bot" disseminated on online social networks.
The scam revolves around Decentralized Exchanges (DEX) arbitrage and aims to lure victims into executing a so-called "bot contract" to steal funds from them.
To collect the scam at a large scale, we developed a fully automated scam detection system named CryptoScamHunter.
arXiv Detail & Related papers (2023-10-18T20:13:17Z) - Active Countermeasures for Email Fraud [2.6856688022781556]
Scam-baiters play the roles of victims, reply to scammers, and try to waste their time and attention with long and unproductive conversations.
We developed and deployed an expandable scam-baiting mailserver that can conduct scam-baiting activities automatically.
arXiv Detail & Related papers (2022-10-26T21:20:13Z) - Uncovering the Dark Side of Telegram: Fakes, Clones, Scams, and
Conspiracy Movements [67.39353554498636]
We perform a large-scale analysis of Telegram by collecting 35,382 different channels and over 130,000,000 messages.
We find some of the infamous activities also present on privacy-preserving services of the Dark Web, such as carding.
We propose a machine learning model that is able to identify fake channels with an accuracy of 86%.
arXiv Detail & Related papers (2021-11-26T14:53:31Z) - The Doge of Wall Street: Analysis and Detection of Pump and Dump Cryptocurrency Manipulations [50.521292491613224]
This paper performs an in-depth analysis of two market manipulations organized by communities over the Internet: The pump and dump and the crowd pump.
The pump and dump scheme is a fraud as old as the stock market. Now, it got new vitality in the loosely regulated market of cryptocurrencies.
We report on three case studies related to pump and dump groups.
arXiv Detail & Related papers (2021-05-03T10:20:47Z) - Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's
Post-Quantum Security [67.06003361150228]
A proof of work (PoW) is an important cryptographic construct enabling a party to convince others that they invested some effort in solving a computational task.
In this work, we examine the hardness of finding such chain of PoWs against quantum strategies.
We prove that the chain of PoWs problem reduces to a problem we call multi-solution Bernoulli search, for which we establish its quantum query complexity.
arXiv Detail & Related papers (2020-12-30T18:03:56Z) - Pump and Dumps in the Bitcoin Era: Real Time Detection of Cryptocurrency Market Manipulations [50.521292491613224]
We perform an in-depth analysis of pump and dump schemes organized by communities over the Internet.
We observe how these communities are organized and how they carry out the fraud.
We introduce an approach to detect the fraud in real time that outperforms the current state of the art.
arXiv Detail & Related papers (2020-05-04T21:36:18Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.