skip to main content
10.1145/3318041.3355466acmconferencesArticle/Chapter ViewAbstractPublication PagesaftConference Proceedingsconference-collections
research-article

Spams meet Cryptocurrencies: Sextortion in the Bitcoin Ecosystem

Published:21 October 2019Publication History

ABSTRACT

In the past year, a new spamming scheme has emerged: sexual extortion messages requiring payments in the cryptocurrency Bitcoin, also known as sextortion. This scheme represents a first integration of the use of cryptocurrencies by members of the spamming industry. Using a dataset of 4,340,736 sextortion spams, this research aims at understanding such new amalgamation by uncovering spammers' operations. To do so, a simple, yet effective method for projecting Bitcoin addresses mentioned in sextortion spams onto transaction graph abstractions is computed over the entire Bitcoin blockchain. This allows us to track and investigate monetary flows between involved actors and gain insights into the financial structure of sextortion campaigns. We find that sextortion spammers are somewhat sophisticated, following pricing strategies and benefiting from cost reductions as their operations cut the upper-tail of the spamming supply chain. We discover that one single entity is likely controlling the financial backbone of the majority of the sextortion campaigns and that the 11-month operation studied yielded a lower-bound revenue between $1,300,620 and $1,352,266. We conclude that sextortion spamming is a lucrative business and spammers will likely continue to send bulk emails that try to extort money through cryptocurrencies.

References

  1. Androutsopoulos, I., Paliouras, G., Karkaletsis, V., Sakkis, G., Spyropoulos, C. D., and Stamatopoulos, P. Learning to filter spam e-mail: A comparison of a naive bayesian and a memory-based approach. In Proceedings of the workshop "Machine Learning and Textual Information Access" (2000), 4th European Conference on Principles and Practice of Knowledge Discovery in Databases (PKDD-2000), pp. 1--11.Google ScholarGoogle Scholar
  2. Bitcoin-Wiki. Privacy. https://en.bitcoin.it/wiki/Privacy, 2019. Retrieved May 17, 2019.Google ScholarGoogle Scholar
  3. Chen, C., Zhang, J., Chen, X., Xiang, Y., and Zhou, W. 6 million spam tweets: A large ground truth for timely twitter spam detection. In 2015 IEEE international conference on communications (ICC) (2015), IEEE, pp. 7065--7070.Google ScholarGoogle ScholarCross RefCross Ref
  4. EUROPOL. Internet organized crime threat assessment report IOCTA. https://www.europol.europa.eu/activities-services/main-reports/internet-organised-crime-threat-assessment, 2018. Retrieved March 6, 2019.Google ScholarGoogle Scholar
  5. F. Reid, M. H. An analysis of anonymity in the bitcoin system. In 2011 IEEE International Conference on Privacy, Security, Risk, and Trust, and IEEE International Conference on Social Computing (2011).Google ScholarGoogle ScholarCross RefCross Ref
  6. Filtz, E., Polleres, A., Karl, R., and Haslhofer, B. Evolution of the bitcoin address graph. In Data Science--Analytics and Applications. Springer, 2017, pp. 77--82.Google ScholarGoogle ScholarCross RefCross Ref
  7. Gutmann, P. The commercial malware industry. DEF CON conference, https://www.cs.auckland.ac.nz/~pgut001/pubs/malwarebiz.pdf, 2007. Retrieved February 2, 2019.Google ScholarGoogle Scholar
  8. Harrigan, M., and Fretter, C. The unreasonable effectiveness of address clustering. In 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld) (2016), IEEE, pp. 368--373.Google ScholarGoogle Scholar
  9. Haslhofer, B., Karl, R., and Filtz, E. O bitcoin where art thou? insight into large-scale transaction graphs. In SEMANTiCS (Posters, Demos, SuCCESS) (2016).Google ScholarGoogle Scholar
  10. Hernandez-Castro, J., Cartwright, E., and Stepanova, A. Economic analysis of ransomware. Available at SSRN 2937641, 2017. Retrieved March 6, 2019.Google ScholarGoogle Scholar
  11. Heydari, A., ali Tavakoli, M., Salim, N., and Heydari, Z. Detection of review spam: A survey. Expert Systems with Applications 42, 7 (2015), 3634--3642.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Huang, D. Y., Aliapoulios, M. M., Li, V. G., Invernizzi, L., Bursztein, E., McRoberts, K., Levin, J., Levchenko, K., Snoeren, A. C., and McCoy, D. Tracking ransomware end-to-end. In 2018 IEEE Symposium on Security and Privacy (SP) (2018), IEEE, pp. 618--631.Google ScholarGoogle ScholarCross RefCross Ref
  13. IBM-X-Force-Exchange. Necurs delivers language targeted porn scams. IBM, https://exchange.xforce.ibmcloud.com/collection/Necurs-delivers-language-targeted-porn-scams-fdb9d6b7941506807cbe56dd06e142d0, Sept 2018. Retrieved February 7, 2019.Google ScholarGoogle Scholar
  14. John, J. P., Moshchuk, A., Gribble, S. D., Krishnamurthy, A., et al. Studying spamming botnets using botlab. In USENIX Symposium on Networked Systems Design and Implementation (NSDI) (2009), vol. 9.Google ScholarGoogle Scholar
  15. Kalodner, H. A., Goldfeder, S., Chator, A., Möser, M., and Narayanan, A. Blocksci: Design and applications of a blockchain analysis platform. Retrieved March 6, 2019.Google ScholarGoogle Scholar
  16. Kanich, C., Kreibich, C., Levchenko, K., Enright, B., Voelker, G. M., Paxson, V., and Savage, S. Spamalytics: An empirical analysis of spam marketing conversion. In Proceedings of the 15th ACM conference on Computer and communications security (2008), ACM, pp. 3--14.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Kanich, C., Weaver, N., McCoy, D., Halvorson, T., Kreibich, C., Levchenko, K., Paxson, V., Voelker, G. M., and Savage, S. Show me the money: Characterizing spam-advertised revenue. In USENIX Security Symposium (2011), pp. 15--15.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Kessem, L. The necurs botnet: A pandora's box of malicious spam. IBM, https://securityintelligence.com/the-necurs-botnet-a-pandoras-box-of-malicious-spam/, April 2017. Retrieved March 6, 2019.Google ScholarGoogle Scholar
  19. Levchenko, K., Pitsillidis, A., Chachra, N., Enright, B., Félegyházi, M., Grier, C., Halvorson, T., Kanich, C., Kreibich, C., Liu, H., et al. Click trajectories: End-to-end analysis of the spam value chain. In 2011 ieee symposium on security and privacy (2011), IEEE, pp. 431--446.Google ScholarGoogle Scholar
  20. Lumley, T., Diehr, P., Emerson, S., and Chen, L. The importance of the normality assumption in large public health data sets. Annual review of public health 23, 1 (2002), 151--169.Google ScholarGoogle Scholar
  21. Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G. M., and Savage, S. A fistful of bitcoins: Characterizing payments among men with no names. In Proceedings of the 2013 conference on Internet measurement conference (2013), ACM, pp. 127--140.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Monaco, J. V. Identifying bitcoin users by transaction behavior. In Biometric and Surveillance Technology for Human and Activity Identification XII (2015), vol. 9457, International Society for Optics and Photonics, p. 945704.Google ScholarGoogle Scholar
  23. Möser, M., and Böhme, R. Join me on a market for anonymity. In Proceedings of the Workshop on the Economics of Information Security (WEIS) (University of California at Berkeley, 2016). Retrieved March 7, 2019.Google ScholarGoogle Scholar
  24. Möser, M., Böhme, R., and Breuker, D. An inquiry into money laundering tools in the bitcoin ecosystem. In 2013 APWG eCrime Researchers Summit (2013), IEEE, pp. 1--14. Retreived March 20, 2019.Google ScholarGoogle Scholar
  25. Nakamoto, S. Bitcoin: A peer-to-peer electronic cash system. https://bitcoin.org/bitcoin. pdf, 2008. Retrieved January 4, 2019.Google ScholarGoogle Scholar
  26. Nick, J. D. Data-driven de-anonymization in bitcoin. Master's thesis, ETH-Zürich, 2015. Retrieved March 11, 2019.Google ScholarGoogle Scholar
  27. Overall, J. E., Atlas, R. S., and Gibson, J. M. Tests that are robust against variance heterogeneity in kx 2 designs with unequal cell frequencies. Psychological reports 76, 3 (1995), 1011--1017.Google ScholarGoogle Scholar
  28. Paquet-Clouston, M., Haslhofer, B., and Dupont, B. Ransomware payments in the bitcoin ecosystem. Journal of Cybersecurity 5, 1 (2019), tyz003.Google ScholarGoogle ScholarCross RefCross Ref
  29. Rao, J. M., and Reiley, D. H. The economics of spam. Journal of Economic Perspectives 26, 3 (2012), 87--110.Google ScholarGoogle ScholarCross RefCross Ref
  30. Reid, F., and Harrigan, M. An analysis of anonymity in the bitcoin system. In Security and Privacy in Social Networks. Springer, 2013, pp. 197--223.Google ScholarGoogle ScholarCross RefCross Ref
  31. Ron, D., and Shamir, A. Quantitative analysis of the full bitcoin transaction graph. In Financial Cryptography and Data Security (2013), Springer, pp. 6--24. Retrieved February 15, 2019.Google ScholarGoogle ScholarCross RefCross Ref
  32. Schultz, J. Anatomy of a sextortion scam. Cisco Talos Intelligence, https://blog.talosintelligence.com/2018/10/anatomy-of-sextortion-scam.html, Oct 2018. Retrieved January 17, 2019.Google ScholarGoogle Scholar
  33. Sedhai, S., and Sun, A. Hspam14: A collection of 14 million tweets for hashtag-oriented spam research. In Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval (2015), ACM, pp. 223--232.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Spagnuolo, M., Maggi, F., and Zanero, S. Bitiodine: Extracting intelligence from the bitcoin network. In International Conference on Financial Cryptography and Data Security (2014), Springer, pp. 457--468.Google ScholarGoogle ScholarCross RefCross Ref
  35. Stone-Gross, B., Holz, T., Stringhini, G., and Vigna, G. The underground economy of spam: A botmaster's perspective of coordinating large-scale spam campaigns. LEET 11 (2011), 4--4.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Stringhini, G., Hohlfeld, O., Kruegel, C., and Vigna, G. The harvester, the botmaster, and the spammer: on the relations between the different actors in the spam landscape. In Proceedings of the 9th ACM symposium on Information, computer and communications security (2014), ACM, pp. 353--364.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Tu, H., Doupé, A., Zhao, Z., and Ahn, G.-J. Sok: Everyone hates robocalls: A survey of techniques against telephone spam. In 2016 IEEE Symposium on Security and Privacy (SP) (2016), IEEE, pp. 320--338.Google ScholarGoogle ScholarCross RefCross Ref
  38. Zimmerman, D. W., and Zumbo, B. D. Rank transformations and the power of the student t test and welch t'test for non-normal populations with unequal variances. Canadian Journal of Experimental Psychology/Revue canadienne de psychologie expérimentale 47, 3 (1993), 523.Google ScholarGoogle Scholar
  1. Spams meet Cryptocurrencies: Sextortion in the Bitcoin Ecosystem

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      AFT '19: Proceedings of the 1st ACM Conference on Advances in Financial Technologies
      October 2019
      240 pages
      ISBN:9781450367325
      DOI:10.1145/3318041

      Copyright © 2019 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 21 October 2019

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader