Skip to main content

There’s No Free Lunch, Even Using Bitcoin: Tracking the Popularity and Profits of Virtual Currency Scams

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8975))

Abstract

We present the first empirical analysis of Bitcoin-based scams: operations established with fraudulent intent. By amalgamating reports gathered by voluntary vigilantes and tracked in online forums, we identify 192 scams and categorize them into four groups: Ponzi schemes, mining scams, scam wallets and fraudulent exchanges. In 21 % of the cases, we also found the associated Bitcoin addresses, which enables us to track payments into and out of the scams. We find that at least $11 million has been contributed to the scams from 13 000 distinct victims. Furthermore, we present evidence that the most successful scams depend on large contributions from a very small number of victims. Finally, we discuss ways in which the scams could be countered.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    https://bitcointalk.org/index.php?topic=576337.

  2. 2.

    Data and analysis scripts are publicly available at doi:10.7910/DVN/28561.

  3. 3.

    Note that we deliberately make no attempt to deanonymize the actual victims beyond identifying that the addresses participated in the scam.

  4. 4.

    https://web.archive.org/web/20140322111925/https://leancy.com/.

  5. 5.

    https://bitcointalk.org/index.php?topic=448250.

  6. 6.

    https://bitcointalk.org/index.php?topic=576337#post_toc_38.

  7. 7.

    https://bitcointalk.org/index.php?topic=263445.msg3417016.

  8. 8.

    https://bitcointalk.org/index.php?action=profile;u=106769.

  9. 9.

    https://bitcointalk.org/index.php?action=profile;u=109912.

  10. 10.

    https://bitcointalk.org/index.php?action=profile;u=323407.

  11. 11.

    https://bitcointalk.org/index.php?action=profile;u=58460.

  12. 12.

    https://www.reddit.com/user/LutherForThePeople.

  13. 13.

    http://ow24et3tetp6tvmk.onion/.

  14. 14.

    http://easycoinsayj7p5l.onion/ and https://web.archive.org/web/20130905204338/https://easycoin.net/.

  15. 15.

    https://web.archive.org/web/20140213235218/https://bitcoinwallet.in/.

References

  1. Standage, T.: The Victorian Internet. Walker & Company, New York (1998)

    Google Scholar 

  2. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). https://bitcoin.org/bitcoin.pdf

  3. znort987, blockparser https://github.com/znort987/blockparser

  4. Maxwell, G.: CoinJoin: Bitcoin privacy for the real world, https://bitcointalk.org/index.php?topic=279249. Accessed 29 August 2014

  5. Moore, T., Han, J., Clayton, R.: The postmodern ponzi scheme: empirical analysis of high-yield investment programs. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 41–56. Springer, Heidelberg (2012)

    Google Scholar 

  6. Neisius, J., Clayton, R.: Orchestrated crime: the high yield investment fraud ecosystem. In: Proceedings of the Eighth APWG eCrime Researcher’s Summit, Birmingham, AL, Sep. 2014

    Google Scholar 

  7. Securities and Exchange Commission, SEC v. Trendon T. Shavers, et al. http://www.sec.gov/litigation/complaints/2013/comp-pr2013-132.pdf

  8. Huang, D.Y., Dharmdasani, H., Meiklejohn, S., Dave, V., Grier, C., McCoy, D., Savage, S., Weaver, N., Snoeren, A.C., Levchenko, K.: Botcoin: monetizing stolen cycles. In: Proceedings of the Network and Distributed System Security Symposium (2014)

    Google Scholar 

  9. Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G.M., Savage, S.: A fistful of Bitcoins: characterizing payments among men with no names. In: Proceedings of the Internet Measurement Conference, pp. 127–140. ACM (2013)

    Google Scholar 

  10. Ron, D., Shamir, A.: Quantitative analysis of the full bitcoin transaction graph. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 6–24. Springer, Heidelberg (2013)

    Google Scholar 

  11. Ron, D., Shamir, A.: How did dread pirate roberts acquire and protect his bitcoin wealth? In: Böhme, R., Brenner, M., Moore, T., Smith, M. (eds.) FC 2014 Workshops. LNCS, vol. 8438, pp. 3–15. Springer, Heidelberg (2014)

    Google Scholar 

  12. Vasek, M., Thornton, M., Moore, T.: Empirical analysis of denial-of-service attacks in the Bitcoin ecosystem. In: Böhme, R., Brenner, M., Moore, T., Smith, M. (eds.) FC 2014 Workshops. LNCS, vol. 8438, pp. 57–71. Springer, Heidelberg (2014)

    Google Scholar 

  13. Möser, M., Böhme, R., Breuker, D.: An inquiry into money laundering tools in the Bitcoin ecosystem. In: Proceedings of the Seventh APWG eCrime Researcher’s Summit. pp. 1–14. IEEE (2013)

    Google Scholar 

  14. Christin, N.: Traveling the Silk Road: a measurement analysis of a large anonymous online marketplace. In: Proceedings of the 22nd International Conference on World Wide Web, pp. 213–224 (2013)

    Google Scholar 

  15. Moore, T., Christin, N.: Beware the middleman: empirical analysis of Bitcoin-exchange risk. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 25–33. Springer, Heidelberg (2013)

    Google Scholar 

  16. Bitcoin Foundation, Removing impediments to Bitcoin’s success: A risk management study 2014. https://bitcoinfoundation.org/static/2014/04/Bitcoin-Risk-Management-Study-Spring-2014.pdf

Download references

Acknowledgments

This work was partially funded by the Department of Homeland Security (DHS) Science and Technology Directorate, Cyber Security Division (DHS S&T/CSD) Broad Agency Announcement 11.02, the Government of Australia and SPAWAR Systems Center Pacific via contract number N66001-13-C-0131. This paper represents the position of the authors and not that of the aforementioned agencies.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marie Vasek .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Vasek, M., Moore, T. (2015). There’s No Free Lunch, Even Using Bitcoin: Tracking the Popularity and Profits of Virtual Currency Scams. In: Böhme, R., Okamoto, T. (eds) Financial Cryptography and Data Security. FC 2015. Lecture Notes in Computer Science(), vol 8975. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-47854-7_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-47854-7_4

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-47853-0

  • Online ISBN: 978-3-662-47854-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics