Skip to main content
Erschienen in: Social Network Analysis and Mining 1/2020

01.12.2020 | Original Article

An ego network analysis of sextortionists

Erschienen in: Social Network Analysis and Mining | Ausgabe 1/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

We consider a particular instance of user interactions in the Bitcoin network, that of interactions among wallet addresses belonging to scammers. Aggregation of multiple inputs and change addresses are common heuristics used to establish relationships among addresses and analyze transaction amounts in the Bitcoin network. We propose a flow centric approach that complements such heuristics, by studying the branching, merger and propagation of Bitcoin flows. We study a recent sextortion campaign by exploring the ego network of known offending wallet addresses. We compare and combine different existing and new heuristics, which allows us to identify (1) Bitcoin addresses of interest (including possible recurrent go-to addresses for the scammers) and (2) relevant Bitcoin flows, from scam Bitcoin addresses to a Binance exchange and to other other scam addresses, that suggest connections among prima facie disparate waves of similar scams.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Fußnoten
1
The curated ego network dataset used in this paper can be found at Oggier et al. (2019).
 
2
Our tool uses the Python library Beautifulsoup4.
 
Literatur
Zurück zum Zitat Akcora CG, Li Y, Gel YR, Kantarcioglu M (2019) Bitcoinheist: topological data analysis for ransomware detection on the bitcoin blockchain. arXiv:1906.07852 Akcora CG, Li Y, Gel YR, Kantarcioglu M (2019) Bitcoinheist: topological data analysis for ransomware detection on the bitcoin blockchain. arXiv:​1906.​07852
Zurück zum Zitat Ayoub J, Lotfi D, El Marraki M, Hammouch A (2020) Accurate link prediction method based on path length between a pair of unlinked nodes and their degree. Soc Netw Anal Min 10(1):9CrossRef Ayoub J, Lotfi D, El Marraki M, Hammouch A (2020) Accurate link prediction method based on path length between a pair of unlinked nodes and their degree. Soc Netw Anal Min 10(1):9CrossRef
Zurück zum Zitat Bistarelli S, Santini F (2017) Go with the -bitcoin- flow, with visual analytics. In: International conference on availability, reliability & security (ARES) Bistarelli S, Santini F (2017) Go with the -bitcoin- flow, with visual analytics. In: International conference on availability, reliability & security (ARES)
Zurück zum Zitat Borggren N, Koplik G, Bendich P, Harer J (2017) Deanonymizing shapeshift: Linking transactions across multiple blockchains Borggren N, Koplik G, Bendich P, Harer J (2017) Deanonymizing shapeshift: Linking transactions across multiple blockchains
Zurück zum Zitat Bursztein E, McRoberts K, Invernizzi L (2017) Tracking desktop ransomware payments. Black Hat USA Presentation, Las Vegas Bursztein E, McRoberts K, Invernizzi L (2017) Tracking desktop ransomware payments. Black Hat USA Presentation, Las Vegas
Zurück zum Zitat Catanese S, Ferrara E, Fiumara G (2013) Forensic analysis of phone call networks. Soc Netw Anal Min 3(1):15–33CrossRef Catanese S, Ferrara E, Fiumara G (2013) Forensic analysis of phone call networks. Soc Netw Anal Min 3(1):15–33CrossRef
Zurück zum Zitat Di Battista G, Di Donato V, Patrignani M, Pizzonia M, Roselli V, Tamassia R (2015) Bitconeview: visualization of flows in the bitcoin transaction graph. In: IEEE symposium on visualization for cyber security (VizSec) Di Battista G, Di Donato V, Patrignani M, Pizzonia M, Roselli V, Tamassia R (2015) Bitconeview: visualization of flows in the bitcoin transaction graph. In: IEEE symposium on visualization for cyber security (VizSec)
Zurück zum Zitat Huang DY, Aliapoulios MM, Li VG, Invernizzi L, McRoberts K, Bursztein E, Levin J, Levchenko K, Snoeren AC, McCoy D (2018) Tracking ransomware end-to-end. In: IEEE Symposium on security and privacy Huang DY, Aliapoulios MM, Li VG, Invernizzi L, McRoberts K, Bursztein E, Levin J, Levchenko K, Snoeren AC, McCoy D (2018) Tracking ransomware end-to-end. In: IEEE Symposium on security and privacy
Zurück zum Zitat Huber M, Mulazzani M, Leithner M, Schrittwieser S, Wondracek G, Weippl E (2011) Social snapshots: digital forensics for online social networks. In: 27th annual computer security applications conference Huber M, Mulazzani M, Leithner M, Schrittwieser S, Wondracek G, Weippl E (2011) Social snapshots: digital forensics for online social networks. In: 27th annual computer security applications conference
Zurück zum Zitat Kharraz A, Robertson WK, Balzarotti D, Bilge L, Kirda E (2015) Cutting the Gordian knot: a look under the hood of ransomware attacks. In: International conference on detection of intrusions and malware, and vulnerability assessment Kharraz A, Robertson WK, Balzarotti D, Bilge L, Kirda E (2015) Cutting the Gordian knot: a look under the hood of ransomware attacks. In: International conference on detection of intrusions and malware, and vulnerability assessment
Zurück zum Zitat Kondor D, Pósfai M, Csabai I, Vattay G (2014) Do the rich get richer? An empirical analysis of the bitcoin transaction network. PLoS ONE 9(2):e97205CrossRef Kondor D, Pósfai M, Csabai I, Vattay G (2014) Do the rich get richer? An empirical analysis of the bitcoin transaction network. PLoS ONE 9(2):e97205CrossRef
Zurück zum Zitat Liao K, Zhao Z, Doupé A, Ahn GJ (2016) Behind closeddoors: measurement and analysis of cryptolocker ransoms in bitcoin. In: IEEE APWG symposium on electronic crime research (eCrime) Liao K, Zhao Z, Doupé A, Ahn GJ (2016) Behind closeddoors: measurement and analysis of cryptolocker ransoms in bitcoin. In: IEEE APWG symposium on electronic crime research (eCrime)
Zurück zum Zitat Liben-Nowell D, Kleinberg J (2007) The link-prediction problem for social networks. J Am Soc Inf Sci Technol 58(7):1019–1031CrossRef Liben-Nowell D, Kleinberg J (2007) The link-prediction problem for social networks. J Am Soc Inf Sci Technol 58(7):1019–1031CrossRef
Zurück zum Zitat Meiklejohn S, Pomarole M, Jordan G, Levchenko K, McCoy D, Voelker GM, Savage S (2013) A fistful of bitcoins: characterizing payments among men with no names. In: ACM conference on internet measurement Meiklejohn S, Pomarole M, Jordan G, Levchenko K, McCoy D, Voelker GM, Savage S (2013) A fistful of bitcoins: characterizing payments among men with no names. In: ACM conference on internet measurement
Zurück zum Zitat Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system
Zurück zum Zitat Nick J (2015) Data-driven de-anonymization in bitcoin. ETH master thesis Nick J (2015) Data-driven de-anonymization in bitcoin. ETH master thesis
Zurück zum Zitat Paquet-Clouston M, Haslhofer B, Romiti M, Charvat T (2019) Spams meet cryptocurrencies: sextortion in the bitcoin ecosystem. In: Proceedings of advances in financial technologies Paquet-Clouston M, Haslhofer B, Romiti M, Charvat T (2019) Spams meet cryptocurrencies: sextortion in the bitcoin ecosystem. In: Proceedings of advances in financial technologies
Zurück zum Zitat Phetsouvanh S, Oggier F, Datta A (2018) Egret: extortion graph exploration techniques in the bitcoin network. In: IEEE international conference on data mining workshops (ICDMW) Phetsouvanh S, Oggier F, Datta A (2018) Egret: extortion graph exploration techniques in the bitcoin network. In: IEEE international conference on data mining workshops (ICDMW)
Zurück zum Zitat Reid F, Harrigan M (2013) An analysis of anonymity in the bitcoin system. In: Altshuler Y, Elovici Y, Cremers A, Aharony N, Pentland A (eds) Security and privacy in social networks. Springer, New York, pp 197–223CrossRef Reid F, Harrigan M (2013) An analysis of anonymity in the bitcoin system. In: Altshuler Y, Elovici Y, Cremers A, Aharony N, Pentland A (eds) Security and privacy in social networks. Springer, New York, pp 197–223CrossRef
Zurück zum Zitat Spagnuolo M, Federico M, Stefano Z (2014) Bitiodine: extracting intelligence from the bitcoin network. In: International conference on financial cryptography & data security Spagnuolo M, Federico M, Stefano Z (2014) Bitiodine: extracting intelligence from the bitcoin network. In: International conference on financial cryptography & data security
Zurück zum Zitat Tuna T, Akbas E, Aksoy A, Canbaz MA, Karabiyik U, Gonen B, Aygun R (2016) User characterization for online social networks. Soc Netw Anal Min 6(1):104CrossRef Tuna T, Akbas E, Aksoy A, Canbaz MA, Karabiyik U, Gonen B, Aygun R (2016) User characterization for online social networks. Soc Netw Anal Min 6(1):104CrossRef
Zurück zum Zitat Yousaf H, Kappos G, Meiklejohn S (2019) Tracing transactions across cryptocurrency ledgers. In: 28th USENIX security symposium Yousaf H, Kappos G, Meiklejohn S (2019) Tracing transactions across cryptocurrency ledgers. In: 28th USENIX security symposium
Metadaten
Titel
An ego network analysis of sextortionists
Publikationsdatum
01.12.2020
Erschienen in
Social Network Analysis and Mining / Ausgabe 1/2020
Print ISSN: 1869-5450
Elektronische ISSN: 1869-5469
DOI
https://doi.org/10.1007/s13278-020-00650-x

Weitere Artikel der Ausgabe 1/2020

Social Network Analysis and Mining 1/2020 Zur Ausgabe

Premium Partner