[PDF][PDF] Double and nothing: Understanding and detecting cryptocurrency giveaway scams

X Li, A Yepuri, N Nikiforakis - … of the Network and Distributed System …, 2023 - par.nsf.gov
As cryptocurrencies increase in popularity and users obtain and manage their own assets,
attackers are pivoting from just abusing cryptocurrencies as a payment mechanism, to …

Cybercrime bitcoin revenue estimations: Quantifying the impact of methodology and coverage

G Gomez, K van Liebergen, J Caballero - Proceedings of the 2023 ACM …, 2023 - dl.acm.org
Multiple works have leveraged the public Bitcoin ledger to estimate the revenue
cybercriminals obtain from their victims. Estimations focusing on the same target often do not …

The rise of goodfatr: A novel accuracy comparison methodology for indicator extraction tools

J Caballero, G Gomez, S Matic, G Sánchez… - Future Generation …, 2023 - Elsevier
To adapt to a constantly evolving landscape of cyber threats, organizations actively need to
collect Indicators of Compromise (IOCs), ie, forensic artifacts that signal that a host or …

Towards understanding and characterizing the arbitrage bot scam in the wild

K Li, S Guan, D Lee - Proceedings of the ACM on Measurement and …, 2023 - dl.acm.org
This paper presents the first comprehensive analysis of an emerging cryptocurrency scam
named" arbitrage bot" disseminated on online social networks. The scam revolves around …

Towards safe cyber practices: Developing a proactive cyber-threat intelligence system for dark web forum content by identifying cybercrimes

KS Sangher, A Singh, HM Pandey, V Kumar - Information, 2023 - mdpi.com
The untraceable part of the Deep Web, also known as the Dark Web, is one of the most used
“secretive spaces” to execute all sorts of illegal and criminal activities by terrorists …

On the Dark Side of the Coin: Characterizing Bitcoin Use for Illicit Activities

H Rosenquist, D Hasselquist, M Arlitt… - … Conference on Passive …, 2024 - Springer
The decentralized nature of Bitcoin allows for pseudonymous money exchange beyond
authorities' control, contributing to its popularity for diverse illegal activities such as scams …

Is Bitcoin gathering dust? An analysis of low-amount Bitcoin transactions

M Loporchio, A Bernasconi… - Applied Network …, 2023 - Springer
In the Bitcoin protocol, dust refers to small amounts of currency that are lower than the fee
required to spend them in a transaction. Although “economically irrational”, dust is …

Towards Safe Cyber Practices: Developing Proactive Cyber Threat Intelligence System for Dark Web Forums Content By Employing Deep Learning Approaches

KS Sangher, A Singh, HM Pandey… - Information …, 2023 - eprints.bournemouth.ac.uk
The untraceable part of the Deep Web, also known as the Dark Web, is one of the most
used" secretive spaces" to execute all sorts of illegal and criminal activities by terrorists …

How do cybercriminals launder the proceeds of their crimes?

F Teichmann, S Boticiu - International Cybersecurity Law Review, 2024 - Springer
Cybercrime is on the rise. Hence, cybercriminals need to launder the increasing proceeds of
their crimes. Collaboration between cybercrime and money laundering allows …

Illicit Promotion on Twitter

H Wang, Y Li, R Huang, X Mi - arXiv preprint arXiv:2404.07797, 2024 - arxiv.org
In this paper, we present an extensive study of the promotion of illicit goods and services on
Twitter, a popular online social network (OSN). This study is made possible through the …