Skip to main content
Top
Published in:

01-12-2020 | Original Article

An ego network analysis of sextortionists

Authors: Frédérique Oggier, Anwitaman Datta, Silivanxay Phetsouvanh

Published in: Social Network Analysis and Mining | Issue 1/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

We consider a particular instance of user interactions in the Bitcoin network, that of interactions among wallet addresses belonging to scammers. Aggregation of multiple inputs and change addresses are common heuristics used to establish relationships among addresses and analyze transaction amounts in the Bitcoin network. We propose a flow centric approach that complements such heuristics, by studying the branching, merger and propagation of Bitcoin flows. We study a recent sextortion campaign by exploring the ego network of known offending wallet addresses. We compare and combine different existing and new heuristics, which allows us to identify (1) Bitcoin addresses of interest (including possible recurrent go-to addresses for the scammers) and (2) relevant Bitcoin flows, from scam Bitcoin addresses to a Binance exchange and to other other scam addresses, that suggest connections among prima facie disparate waves of similar scams.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Footnotes
1
The curated ego network dataset used in this paper can be found at Oggier et al. (2019).
 
2
Our tool uses the Python library Beautifulsoup4.
 
Literature
go back to reference Akcora CG, Li Y, Gel YR, Kantarcioglu M (2019) Bitcoinheist: topological data analysis for ransomware detection on the bitcoin blockchain. arXiv:1906.07852 Akcora CG, Li Y, Gel YR, Kantarcioglu M (2019) Bitcoinheist: topological data analysis for ransomware detection on the bitcoin blockchain. arXiv:​1906.​07852
go back to reference Ayoub J, Lotfi D, El Marraki M, Hammouch A (2020) Accurate link prediction method based on path length between a pair of unlinked nodes and their degree. Soc Netw Anal Min 10(1):9CrossRef Ayoub J, Lotfi D, El Marraki M, Hammouch A (2020) Accurate link prediction method based on path length between a pair of unlinked nodes and their degree. Soc Netw Anal Min 10(1):9CrossRef
go back to reference Bistarelli S, Santini F (2017) Go with the -bitcoin- flow, with visual analytics. In: International conference on availability, reliability & security (ARES) Bistarelli S, Santini F (2017) Go with the -bitcoin- flow, with visual analytics. In: International conference on availability, reliability & security (ARES)
go back to reference Borggren N, Koplik G, Bendich P, Harer J (2017) Deanonymizing shapeshift: Linking transactions across multiple blockchains Borggren N, Koplik G, Bendich P, Harer J (2017) Deanonymizing shapeshift: Linking transactions across multiple blockchains
go back to reference Bursztein E, McRoberts K, Invernizzi L (2017) Tracking desktop ransomware payments. Black Hat USA Presentation, Las Vegas Bursztein E, McRoberts K, Invernizzi L (2017) Tracking desktop ransomware payments. Black Hat USA Presentation, Las Vegas
go back to reference Catanese S, Ferrara E, Fiumara G (2013) Forensic analysis of phone call networks. Soc Netw Anal Min 3(1):15–33CrossRef Catanese S, Ferrara E, Fiumara G (2013) Forensic analysis of phone call networks. Soc Netw Anal Min 3(1):15–33CrossRef
go back to reference Di Battista G, Di Donato V, Patrignani M, Pizzonia M, Roselli V, Tamassia R (2015) Bitconeview: visualization of flows in the bitcoin transaction graph. In: IEEE symposium on visualization for cyber security (VizSec) Di Battista G, Di Donato V, Patrignani M, Pizzonia M, Roselli V, Tamassia R (2015) Bitconeview: visualization of flows in the bitcoin transaction graph. In: IEEE symposium on visualization for cyber security (VizSec)
go back to reference Huang DY, Aliapoulios MM, Li VG, Invernizzi L, McRoberts K, Bursztein E, Levin J, Levchenko K, Snoeren AC, McCoy D (2018) Tracking ransomware end-to-end. In: IEEE Symposium on security and privacy Huang DY, Aliapoulios MM, Li VG, Invernizzi L, McRoberts K, Bursztein E, Levin J, Levchenko K, Snoeren AC, McCoy D (2018) Tracking ransomware end-to-end. In: IEEE Symposium on security and privacy
go back to reference Huber M, Mulazzani M, Leithner M, Schrittwieser S, Wondracek G, Weippl E (2011) Social snapshots: digital forensics for online social networks. In: 27th annual computer security applications conference Huber M, Mulazzani M, Leithner M, Schrittwieser S, Wondracek G, Weippl E (2011) Social snapshots: digital forensics for online social networks. In: 27th annual computer security applications conference
go back to reference Kharraz A, Robertson WK, Balzarotti D, Bilge L, Kirda E (2015) Cutting the Gordian knot: a look under the hood of ransomware attacks. In: International conference on detection of intrusions and malware, and vulnerability assessment Kharraz A, Robertson WK, Balzarotti D, Bilge L, Kirda E (2015) Cutting the Gordian knot: a look under the hood of ransomware attacks. In: International conference on detection of intrusions and malware, and vulnerability assessment
go back to reference Kondor D, Pósfai M, Csabai I, Vattay G (2014) Do the rich get richer? An empirical analysis of the bitcoin transaction network. PLoS ONE 9(2):e97205CrossRef Kondor D, Pósfai M, Csabai I, Vattay G (2014) Do the rich get richer? An empirical analysis of the bitcoin transaction network. PLoS ONE 9(2):e97205CrossRef
go back to reference Liao K, Zhao Z, Doupé A, Ahn GJ (2016) Behind closeddoors: measurement and analysis of cryptolocker ransoms in bitcoin. In: IEEE APWG symposium on electronic crime research (eCrime) Liao K, Zhao Z, Doupé A, Ahn GJ (2016) Behind closeddoors: measurement and analysis of cryptolocker ransoms in bitcoin. In: IEEE APWG symposium on electronic crime research (eCrime)
go back to reference Liben-Nowell D, Kleinberg J (2007) The link-prediction problem for social networks. J Am Soc Inf Sci Technol 58(7):1019–1031CrossRef Liben-Nowell D, Kleinberg J (2007) The link-prediction problem for social networks. J Am Soc Inf Sci Technol 58(7):1019–1031CrossRef
go back to reference Meiklejohn S, Pomarole M, Jordan G, Levchenko K, McCoy D, Voelker GM, Savage S (2013) A fistful of bitcoins: characterizing payments among men with no names. In: ACM conference on internet measurement Meiklejohn S, Pomarole M, Jordan G, Levchenko K, McCoy D, Voelker GM, Savage S (2013) A fistful of bitcoins: characterizing payments among men with no names. In: ACM conference on internet measurement
go back to reference Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system
go back to reference Nick J (2015) Data-driven de-anonymization in bitcoin. ETH master thesis Nick J (2015) Data-driven de-anonymization in bitcoin. ETH master thesis
go back to reference Paquet-Clouston M, Haslhofer B, Romiti M, Charvat T (2019) Spams meet cryptocurrencies: sextortion in the bitcoin ecosystem. In: Proceedings of advances in financial technologies Paquet-Clouston M, Haslhofer B, Romiti M, Charvat T (2019) Spams meet cryptocurrencies: sextortion in the bitcoin ecosystem. In: Proceedings of advances in financial technologies
go back to reference Phetsouvanh S, Oggier F, Datta A (2018) Egret: extortion graph exploration techniques in the bitcoin network. In: IEEE international conference on data mining workshops (ICDMW) Phetsouvanh S, Oggier F, Datta A (2018) Egret: extortion graph exploration techniques in the bitcoin network. In: IEEE international conference on data mining workshops (ICDMW)
go back to reference Reid F, Harrigan M (2013) An analysis of anonymity in the bitcoin system. In: Altshuler Y, Elovici Y, Cremers A, Aharony N, Pentland A (eds) Security and privacy in social networks. Springer, New York, pp 197–223CrossRef Reid F, Harrigan M (2013) An analysis of anonymity in the bitcoin system. In: Altshuler Y, Elovici Y, Cremers A, Aharony N, Pentland A (eds) Security and privacy in social networks. Springer, New York, pp 197–223CrossRef
go back to reference Spagnuolo M, Federico M, Stefano Z (2014) Bitiodine: extracting intelligence from the bitcoin network. In: International conference on financial cryptography & data security Spagnuolo M, Federico M, Stefano Z (2014) Bitiodine: extracting intelligence from the bitcoin network. In: International conference on financial cryptography & data security
go back to reference Tuna T, Akbas E, Aksoy A, Canbaz MA, Karabiyik U, Gonen B, Aygun R (2016) User characterization for online social networks. Soc Netw Anal Min 6(1):104CrossRef Tuna T, Akbas E, Aksoy A, Canbaz MA, Karabiyik U, Gonen B, Aygun R (2016) User characterization for online social networks. Soc Netw Anal Min 6(1):104CrossRef
go back to reference Yousaf H, Kappos G, Meiklejohn S (2019) Tracing transactions across cryptocurrency ledgers. In: 28th USENIX security symposium Yousaf H, Kappos G, Meiklejohn S (2019) Tracing transactions across cryptocurrency ledgers. In: 28th USENIX security symposium
Metadata
Title
An ego network analysis of sextortionists
Authors
Frédérique Oggier
Anwitaman Datta
Silivanxay Phetsouvanh
Publication date
01-12-2020
Publisher
Springer Vienna
Published in
Social Network Analysis and Mining / Issue 1/2020
Print ISSN: 1869-5450
Electronic ISSN: 1869-5469
DOI
https://doi.org/10.1007/s13278-020-00650-x

Premium Partner