Detecting Cybercriminal Bitcoin Relationships through Backwards Exploration

06/01/2022
by   Gibran Gómez, et al.
0

Cybercriminals often leverage Bitcoin for their illicit activities. In this work, we propose back-and-forth exploration, a novel automated Bitcoin transaction tracing technique to identify cybercrime financial relationships. Given seed addresses belonging to a cybercrime campaign, it outputs a transaction graph, and identifies paths corresponding to relationships between the campaign under study and external services and other cybercrime campaigns. Back-and-forth exploration provides two key contributions. First, it explores both forward and backwards, instead of only forward as done by prior work, enabling the discovery of relationships that cannot be found by only exploring forward (e.g., deposits from clients of a mixer). Second, it prevents graph explosion by combining a tagging database with a machine learning classifier for identifying addresses belonging to exchanges. We evaluate back-and-forth exploration on 30 malware families. We build oracles for 4 families using Bitcoin for C C and use them to demonstrate that back-and-forth exploration identifies 13 C C signaling addresses missed by prior work, 8 of which are fundamentally missed by forward-only explorations. Our approach uncovers a wealth of services used by the malware including 44 exchanges, 11 gambling sites, 5 payment service providers, 4 underground markets, 4 mining pools, and 2 mixers. In 4 families, the relations include new attribution points missed by forward-only explorations. It also identifies relationships between the malware families and other cybercrime campaigns, highlighting how some malware operators participate in a variety of cybercriminal activities.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/07/2021

Cluster Analysis of Malware Family Relationships

In this paper, we use K-means clustering to analyze various relationship...
research
03/19/2019

An Evaluation of Bitcoin Address Classification based on Transaction History Summarization

Bitcoin is a cryptocurrency that features a distributed, decentralized a...
research
12/27/2019

Characterizing and Detecting Money Laundering Activities on the Bitcoin Network

Bitcoin is by far the most popular crypto-currency solution enabling pee...
research
11/18/2022

Clustering based opcode graph generation for malware variant detection

Malwares are the key means leveraged by threat actors in the cyber space...
research
10/30/2020

Towards Understanding and Demystifying Bitcoin Mixing Services

The popularity of Bitcoin benefits a lot from its anonymity. However, th...
research
08/28/2021

Identifying Ransomware Actors in the Bitcoin Network

Due to the pseudo-anonymity of the Bitcoin network, users can hide behin...
research
01/29/2019

Throttling Malware Families in 2D

Malicious software are categorized into families based on their static a...

Please sign up or login with your details

Forgot password? Click here to reset