There's No Free Lunch, Even Using Bitcoin: Tracking the Popularity and Profits of Virtual Currency Scams

被引:138
作者
Vasek, Marie [1 ]
Moore, Tyler [1 ]
机构
[1] So Methodist Univ, Dept Comp Sci & Engn, Dallas, TX 75275 USA
来源
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY (FC 2015) | 2015年 / 8975卷
关键词
D O I
10.1007/978-3-662-47854-7_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present the first empirical analysis of Bitcoin-based scams: operations established with fraudulent intent. By amalgamating reports gathered by voluntary vigilantes and tracked in online forums, we identify 192 scams and categorize them \into four groups: Ponzi schemes, mining scams, scam wallets and fraudulent exchanges. In 21% of the cases, we also found the associated Bitcoin addresses, which enables us to track payments into and out of the scams. We find that at least $11 million has been contributed to the scams from 13 000 distinct victims. Furthermore, we present evidence that the most successful scams depend on large contributions from a very small number of victims. Finally, we discuss ways in which the scams could be countered.
引用
收藏
页码:44 / 61
页数:18
相关论文
共 14 条
[1]  
[Anonymous], Coinjoin: Bitcoin privacy for the real world
[2]  
[Anonymous], 2013, P 2013 ECRIME RES SU, DOI DOI 10.1109/ECRS.2013.6805780
[3]  
[Anonymous], 2008, Bitcoin: A Peer-to-Peer Electronic Cash System
[4]  
Bitcoin Foundation, REM IMP BITC SUCC RI
[5]  
Christin N., 2013, P 22 INT C WORLD WID, V213, P224, DOI [10.1145/2488388.2488408, DOI 10.1145/2488388.2488408]
[6]   Botcoin: Monetizing Stolen Cycles [J].
Huang, Danny Yuxing ;
Dharmdasani, Hitesh ;
Meiklejohn, Sarah ;
Dave, Vacha ;
Grier, Chris ;
McCoy, Damon ;
Savage, Stefan ;
Weaver, Nicholas ;
Snoeren, Alex C. ;
Levchenko, Kirill .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[7]  
Meiklejohn S., 2013, P C INT MEAS C, P127, DOI [10.1145/2504730.2504747.10.1145, DOI 10.1145/2504730.2504747.10.1145, 10.1145/2504730.2504747, DOI 10.1145/2504730.2504747]
[8]  
MOORE T, 2013, LECT NOTES COMPUTER, V7859
[9]  
Moore T., 2012, Financial Cryptography and Data Security, V7397, P41, DOI [10.1007/978-3-642-32946-3_4, DOI 10.1007/978-3-642-32946-3_4]
[10]  
Neisius J., 2014, P 8 APWG ECRIME RES