skip to main content
10.1145/3589334.3645475acmconferencesArticle/Chapter ViewAbstractPublication PagesthewebconfConference Proceedingsconference-collections
research-article
Open access

Identifying Risky Vendors in Cryptocurrency P2P Marketplaces

Published: 13 May 2024 Publication History

Abstract

Peer-to-Peer (P2P) cryptocurrency exchanges are two-sided marketplaces, similar to eBay, where individuals can offer to sell cryptocurrencies in exchange for payment. Due to disintermediation, these marketplaces trade off increased privacy for higher risk (e.g., scams/fraud). Although these marketplaces use feedback systems to encourage healthier transactions, anecdotal evidence suggests that feedback often fails to capture vendor-associated risks. This work documents the online safety of cryptocurrency P2P marketplaces, identifies underlying issues in feedback-based reputation systems, and proposes improved mechanisms for predicting/monitoring risky accounts. We collect data from two cryptocurrency marketplaces, Paxful and LocalCoinSwap (LCS) for 12 months (06/2022--06/2023). The data includes over 396,000 listings, 67,000 vendors, and 4.7 million feedback for Paxful; and about 52,000 listings, 14,000 users, and 146,000 feedback for LCS.First, we show that the current feedback system does not sufficiently convey enough information about risky vendors, and is susceptible to reputation manipulation through user collusion and automation. Second, combining various publicly available information, we build machine learning models to predict account suspension, and achieve a 0.86 F1-score and 0.93 AUC for Paxful. Third, while our models appear to have limited transferability across markets, we identify which features most help account suspension across platforms. Finally, we perform a month-long online evaluation to show that our models are significantly more successful than mere feedback-based reputation schemes at predicting which users will be suspended in the future.

Supplemental Material

MP4 File
Supplemental video

References

[1]
Matt Ahlborg. 2019. Paxful is the Most Important Bitcoin Company You Aren't Paying Attention to. https://medium.com/dlabvc/paxful-is-the-most-important-bitcoin-company-you-arent-paying-attention-to-4e699db0c5ca. Accessed Mar. 28th, 2023.
[2]
Abdullah Almaatouq, Ahmad Alabdulkareem, Mariam Nouh, Erez Shmueli, Mansour Alsaleh, Vivek K Singh, Abdulrahman Alarifi, Anas Alfaris, and Alex Pentland. 2014. Twitter: who gets caught? Observed trends in social micro-blogging spam. In Proceedings of the 2014 ACM conference on Web science. 33--41.
[3]
Hamad Alsaleh and Lina Zhou. 2018. A Heuristic Method for Identifying Scam Ads on Craigslist. In 2018 European Intelligence and Security Informatics Conference (EISIC). IEEE, 69--72.
[4]
Marina Andreianova, Sebastian Sonntag, Teemu Antikainen, Cecilia Alho, and Jukka Blomberg. 2021. Bitcoin Usage: Study on Bitcoin Usage Around the World 2020. The Journal of FinTech, Vol. 1, 02 (2021), 2150005.
[5]
Z Banković, Juan Carlos Vallejo, David Fraga, and José Manuel Moya. 2011. Detecting bad-mouthing attacks on reputation systems using self-organizing maps. In Proceedings of Computational Intelligence in Security for Information Systems: 4th International Conference (CISIS 2011). Torremolinos-Málaga, Spain, 9--16.
[6]
Binance. 2021. How to Spot and Avoid P2P Scams and Fraud. https://www.binance.com/en/blog/p2p/how-to-spot-and-avoid-p2p-scams-and-fraud-6416111153825153913. Accessed Jun. 27th, 2023.
[7]
Qiang Cao, Xiaowei Yang, Jieqi Yu, and Christopher Palow. 2014. Uncovering large groups of active malicious accounts in online social networks. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. 477--488.
[8]
Tianqi Chen and Carlos Guestrin. 2016. Xgboost: A scalable tree boosting system. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 785--794.
[9]
Nicolas Christin. 2013. Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace. In Proceedings of the 22nd International Conference on the World Wide Web. 213--224.
[10]
Jacob Cohen. 1960. A coefficient of agreement for nominal scales. Educational and psychological measurement, Vol. 20, 1 (1960), 37--46.
[11]
Lin William Cong, Campbell R Harvey, Daniel Rabetti, and Zong-Yu Wu. 2022. An anatomy of crypto-enabled cybercrimes. Available at SSRN 4188661 (2022).
[12]
Alejandro Cuevas and Nicolas Christin. 2024. Does Online Anonymous Market Vendor Reputation Matter?. In Proceedings of the 33rd USENIX Security Symposium (USENIX Security'24). Philadelphia, PA. To appear.
[13]
Clayton Allen Davis, Onur Varol, Emilio Ferrara, Alessandro Flammini, and Filippo Menczer. 2016. Botornot: A system to evaluate social bots. In Proceedings of the 25th international conference companion on world wide web. 273--274.
[14]
Emilio Ferrara, Onur Varol, Clayton Davis, Filippo Menczer, and Alessandro Flammini. 2016. The rise of social bots. Commun. ACM, Vol. 59, 7 (2016), 96--104.
[15]
Emma Fletcher. 2022. Reports show scammers cashing in on crypto craze. https://www.ftc.gov/news-events/data-visualizations/data-spotlight/2022/06/reports-show-scammers-cashing-crypto-craze#crypto1
[16]
Teddy Fusaro, Matt Hougan, Hope Jarkowski, Jamie Patturelli, David DeGregorio, Tom Conner, and John Sanders. 2019. Meeting with Bitwise Asset Management, Inc., NYSE Arca, Inc., and Vedder Price P.C. Official Memorandum. https://www.sec.gov/comments/sr-nysearca-2019-01/srnysearca201901--5164833--183434.pdf
[17]
Vaibhav Garg and Shirin Nilizadeh. 2013. Craigslist scams and community composition: Investigating online fraud victimization. In 2013 IEEE Security and Privacy Workshops. IEEE, 123--126.
[18]
Chris Hays, Zachary Schutzman, Manish Raghavan, Erin Walk, and Philipp Zimmer. 2023. Simplistic Collection and Labeling Practices Limit the Utility of Benchmark Datasets for Twitter Bot Detection. arXiv preprint arXiv:2301.07015 (2023).
[19]
Kevin Hoffman, David Zage, and Cristina Nita-Rotaru. 2009. A survey of attack and defense techniques for reputation systems. ACM Computing Surveys (CSUR), Vol. 42, 1 (2009), 1--31.
[20]
Audun Jøsang and Jennifer Golbeck. 2009. Challenges for robust trust and reputation systems. In Proceedings of the 5th International Workshop on Security and Trust Management (SMT 2009), Saint Malo, France, Vol. 5. Citeseer.
[21]
Guolin Ke, Qi Meng, Thomas Finley, Taifeng Wang, Wei Chen, Weidong Ma, Qiwei Ye, and Tie-Yan Liu. 2017. Lightgbm: A highly efficient gradient boosting decision tree. Advances in neural information processing systems, Vol. 30 (2017).
[22]
Huyen Le, GR Boynton, Zubair Shafiq, and Padmini Srinivasan. 2019. A postmortem of suspended Twitter accounts in the 2016 US presidential election. In 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). IEEE, 258--265.
[23]
Yuewen Liu, Juan Feng, and Kwok Kee Wei. 2012. Negative price premium effect in online market-The impact of competition and buyer informativeness on the pricing strategies of sellers with different reputation levels. Decision Support Systems, Vol. 54, 1 (2012), 681--690.
[24]
LocalCoinSwap. 2023. Terms of Service and Use - LocalCoinSwap. https://localcoinswap.com/terms-of-service. Accessed Jul. 13th, 2023.
[25]
James Martin and Nicolas Christin. 2016. Ethics in cryptomarket research. International Journal of Drug Policy, Vol. 35 (2016), 84--91.
[26]
Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. Technical Report.
[27]
Chris Nosko and Steven Tadelis. 2015. The limits of reputation in platform markets: An empirical analysis and field experiment. Technical Report. National Bureau of Economic Research.
[28]
Youngsam Park, Jackie Jones, Damon McCoy, Elaine Shi, and Markus Jakobsson. 2014. Scambaiter: Understanding targeted nigerian scams on craigslist. system, Vol. 1 (2014), 2.
[29]
Youngsam Park, Damon McCoy, and Elaine Shi. 2017. Understanding craigslist rental scams. In Financial Cryptography and Data Security: 20th International Conference, FC 2016, Christ Church, Barbados, February 22--26, 2016, Revised Selected Papers 20. Springer, 3--21.
[30]
Paxful. 2021. Make Trading More Rewarding with the Paxful Rewards Program. https://paxful.com/university/new-rewards-program/. Accessed Jun. 27th, 2023.
[31]
Paxful. 2022. List of Banned Countries, OFAC. https://web.archive.org/web/20230324163159/https://paxful.zendesk.com/hc/en-us/articles/360013470374-List-of-Banned-Countries-OFAC. Accessed Mar. 28th, 2023, but page deleted.
[32]
Paxful. 2023 a. What Countries Require ID Verification? https://web.archive.org/web/20230610111357/https://support.paxful.com/hc/en-us/articles/360021175133-What-Countries-Require-ID-Verification- . Accessed Mar. 28th, 2023, but page deleted.
[33]
Paxful. 2023 b. Why is My Paxful Account Frozen or Restricted? https://paxful.zendesk.com/hc/en-us/articles/360014551640-Why-is-My-Paxful-Account-Frozen-or-Restricted. Accessed Mar. 28th, 2023.
[34]
Reddit. 2020. https://www.reddit.com/r/paxful/comments/jjq1qd/nigerians_using_vpn/. Accessed Jun. 27th, 2023.
[35]
Reddit. 2021. https://www.reddit.com/r/paxful/comments/xh22gx/what_does_user_not_active_mean/. Accessed Mar. 28th, 2023.
[36]
Paul Resnick, Ko Kuwabara, Richard Zeckhauser, and Eric Friedman. 2000. Reputation systems. Commun. ACM, Vol. 43, 12 (2000), 45--48.
[37]
Paul Resnick, Richard Zeckhauser, John Swanson, and Kate Lockwood. 2006. The value of reputation on eBay: A controlled experiment. Experimental economics, Vol. 9, 2 (2006), 79--101.
[38]
Kyle Soska and Nicolas Christin. 2015. Measuring the longitudinal evolution of the online anonymous marketplace ecosystem. In 24th USENIX Security Symposium (USENIX Security 15). 33--48.
[39]
Kyle Soska, Jin-Dong Dong, Alex Khodaverdian, Ariel Zetlin-Jones, Bryan Routledge, and Nicolas Christin. 2021. Towards understanding cryptocurrency derivatives: A case study of BitMEX. In WWW'21: Proceedings of the ACM Web Conference 2021, Ljubljana, Slovenia (online).
[40]
Steven Tadelis. 2016. Reputation and feedback systems in online platform markets. Annual Review of Economics, Vol. 8 (2016), 321--340.
[41]
Global Legal Research Directorate The Law Library of Congress. 2021. Regulation of cryptocurrency around the world: November 2021 update. https://tile.loc.gov/storage-services/service/ll/llglrd/2021687419/2021687419.pdf?roistat_visit=513132.
[42]
Kurt Thomas, Chris Grier, Dawn Song, and Vern Paxson. 2011. Suspended accounts in retrospect: an analysis of twitter spam. In Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference. 243--258.
[43]
Hung Tran, Thomas Hornbeck, Viet Ha-Thuc, James Cremer, and Padmini Srinivasan. 2011. Spam detection in online classified advertisements. In Proceedings of the 2011 Joint WICOW/AIRWeb Workshop on Web Quality. 35--41.
[44]
Taro Tsuchiya, Alejandro Cuevas, Thomas Magelinski, and Nicolas Christin. 2023. Misbehavior and Account Suspension in an Online Financial Communication Platform. In WWW'23: Proceedings of the ACM Web Conference 2023, Austin, TX, USA.
[45]
Tavish Vaidya, Daniel Votipka, Michelle L Mazurek, and Micah Sherr. 2019. Does being verified make you more credible? Account verification's effect on tweet credibility. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 1--13.
[46]
Jochem van de Laarschot and Rolf van Wegberg. 2021. Risky Business? Investigating the Security Practices of Vendors on an Online Anonymous Market using $$Ground-Truth$$ Data. In 30th USENIX Security Symposium (USENIX Security 21). 4079--4095.
[47]
Clemens Graf von Luckner, Carmen M Reinhart, and Kenneth Rogoff. 2023. Decrypting new age international capital flows. Journal of Monetary Economics (2023).
[48]
Madelyne Xiao, Mona Wang, Anunay Kulshrestha, and Jonathan Mayer. 2023. Account Verification on Social Media: User Perceptions and Paid Enrollment. arXiv preprint arXiv:2304.14939 (2023).
[49]
Haitao Xu, Daiping Liu, Haining Wang, and Angelos Stavrou. 2015. E-commerce reputation manipulation: The emergence of reputation-escalation-as-a-service. In Proceedings of the 24th International Conference on World Wide Web. 1296--1306.
[50]
Chao Yang, Robert Harkreader, Jialong Zhang, Seungwon Shin, and Guofei Gu. 2012. Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter. In Proceedings of the 21st international conference on World Wide Web. 71--80.
[51]
Kai-Cheng Yang, Onur Varol, Pik-Mai Hui, and Filippo Menczer. 2020. Scalable and generalizable social bot detection through data selection. In Proceedings of the AAAI conference on artificial intelligence, Vol. 34. 1096--1103.
[52]
David Yermack. 2015. Is Bitcoin a real currency? An economic appraisal. In Handbook of digital currency. Elsevier, 31--43.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WWW '24: Proceedings of the ACM Web Conference 2024
May 2024
4826 pages
ISBN:9798400701719
DOI:10.1145/3589334
This work is licensed under a Creative Commons Attribution International 4.0 License.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 May 2024

Check for updates

Author Tags

  1. cryptocurrency
  2. financial fraud
  3. online marketplace
  4. online safety and trust
  5. reputation system
  6. sybil attack

Qualifiers

  • Research-article

Conference

WWW '24
Sponsor:
WWW '24: The ACM Web Conference 2024
May 13 - 17, 2024
Singapore, Singapore

Acceptance Rates

Overall Acceptance Rate 1,899 of 8,196 submissions, 23%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 684
    Total Downloads
  • Downloads (Last 12 months)684
  • Downloads (Last 6 weeks)91
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media