Cybercriminal minds: an investigative study of cryptocurrency abuses in the dark web

S Lee, C Yoon, H Kang, Y Kim, Y Kim… - … Annual Network and …, 2019 - koasas.kaist.ac.kr
The Dark Web is notorious for being a major distribution channel of harmful content as well
as unlawful goods. Perpetrators have also used cryptocurrencies to conduct illicit financial …

An automatic detection and analysis of the bitcoin generator scam

E Badawi, GV Jourdan, G Bochmann… - 2020 IEEE european …, 2020 - ieeexplore.ieee.org
We investigate what we call the" Bitcoin Generator Scam"(BGS), a simple system in which
the scammers promise to" generate" new bitcoins using the ones that were sent to them. A …

A large-scale empirical analysis of ransomware activities in bitcoin

K Wang, J Pang, D Chen, Y Zhao, D Huang… - ACM Transactions on …, 2021 - dl.acm.org
Exploiting the anonymous mechanism of Bitcoin, ransomware activities demanding ransom
in bitcoins have become rampant in recent years. Several existing studies quantify the …

Don't fish in troubled waters! characterizing coronavirus-themed cryptocurrency scams

P Xia, H Wang, X Luo, L Wu, Y Zhou… - … on Electronic Crime …, 2020 - ieeexplore.ieee.org
As COVID-19 has been spreading across the world since early 2020, a growing number of
malicious campaigns are capitalizing the topic of COVID-19. COVID-19 themed …

Charting the landscape of online cryptocurrency manipulation

L Nizzoli, S Tardelli, M Avvenuti, S Cresci… - IEEE …, 2020 - ieeexplore.ieee.org
Cryptocurrencies represent one of the most attractive markets for financial speculation. As a
consequence, they have attracted unprecedented attention on social media. Besides …

Bitiodine: Extracting intelligence from the bitcoin network

M Spagnuolo, F Maggi, S Zanero - … , Christ Church, Barbados, March 3-7 …, 2014 - Springer
Bitcoin, the famous peer-to-peer, decentralized electronic currency system, allows users to
benefit from pseudonymity, by generating an arbitrary number of aliases (or addresses) to …

Follow the money: Analyzing darknet activity using cryptocurrency and the Bitcoin blockchain

TE Dearden, SE Tucker - Journal of Contemporary Criminal …, 2023 - journals.sagepub.com
Transactions on the darknet are notoriously difficult to examine. Prior criminological
research has generally used web scraping and qualitative text analysis to examine illegal …

Ransomware payments in the bitcoin ecosystem

M Paquet-Clouston, B Haslhofer… - Journal of …, 2019 - academic.oup.com
Ransomware can prevent a user from accessing a device and its files until a ransom is paid
to the attacker, most frequently in Bitcoin. With over 500 known ransomware families, it has …

Tracing cryptocurrency scams: Clustering replicated advance-fee and phishing websites

R Phillips, H Wilder - 2020 IEEE international conference on …, 2020 - ieeexplore.ieee.org
Over the past few years, there has been a growth in activity, public knowledge, and
awareness of cryptocurrencies and related blockchain technology. As the industry has …

Watch your back: Identifying cybercrime financial relationships in Bitcoin through back-and-forth exploration

G Gomez, P Moreno-Sanchez, J Caballero - Proceedings of the 2022 …, 2022 - dl.acm.org
Cybercriminals often leverage Bitcoin for their illicit activities. In this work, we propose back-
and-forth exploration, a novel automated Bitcoin transaction tracing technique to identify …