Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
167 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
42 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Give and Take: An End-To-End Investigation of Giveaway Scam Conversion Rates (2405.09757v2)

Published 16 May 2024 in cs.CR

Abstract: Scams -- fraudulent schemes designed to swindle money from victims -- have existed for as long as recorded history. However, the Internet's combination of low communication cost, global reach, and functional anonymity has allowed scam volumes to reach new heights. Designing effective interventions requires first understanding the context: how scammers reach potential victims, the earnings they make, and any potential bottlenecks for durable interventions. In this short paper, we focus on these questions in the context of cryptocurrency giveaway scams, where victims are tricked into irreversibly transferring funds to scammers under the pretense of even greater returns. Combining data from Twitter, YouTube and Twitch livestreams, landing pages, and cryptocurrency blockchains, we measure how giveaway scams operate at scale. We find that 1 in 1000 scam tweets, and 4 in 100,000 livestream views, net a victim, and that scammers managed to extract nearly \$4.62 million from just hundreds of victims during our measurement window.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (60)
  1. How to turn on security alerts. https://support.metamask.io/privacy-and-security/how-to-turn-on-security-alerts/.
  2. E. Abraham. Elon Musk will give away 1 million Dogecoin if you can prove his family own emerald mine. https://www.indy100.com/science-tech/elon-musk-emerald-mine-dogecoin-2659890703, Apr. 2023.
  3. Bits under the mattress: Understanding different risk perceptions and security behaviors of crypto-asset users. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, pages 1–19, 2021.
  4. Conning the crypto conman: End-to-end analysis of cryptocurrency-based technical support scams. In Proceedings of the 2024 IEEE Symposium on Security & Privacy (S&P), 2024.
  5. S. Ahmed. Linus Tech Tips YouTube channel hacked to promote Elon Musk crypto scam videos, Mar. 2023. https://www.dexerto.com/entertainment/linus-tech-tips-youtube-channel-hacked-crypto-elon-musk-scam-2094461/.
  6. A. Alshamsi and P. Andras. User perception of Bitcoin usability and security across novice users. International Journal of Human-Computer Studies, 126:94–110, 2019.
  7. A. Andryukhin. Phishing attacks and preventions in blockchain based projects. In 2019 international conference on engineering technologies and computer science (EnT), pages 15–19. IEEE, 2019.
  8. Anonymized for submission, 2023.
  9. Dissecting Ponzi schemes on Ethereum: identification, analysis, and impact. Future Generation Computer Systems, 102:259–277, 2020.
  10. Data mining for detecting Bitcoin Ponzi schemes. In Proceedings of the Crypto Valley Conference on Blockchain Technology (CVCBT), 2018.
  11. Icorating: A deep-learning system for scam ICO identification. arXiv preprint arXiv:1803.03670, 2018.
  12. Investigating MMM Ponzi scheme on Bitcoin. In Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, pages 519–530, 2020.
  13. Detecting Ponzi schemes on Ethereum: Towards healthier blockchain technology. In Proceedings of the 2018 World Wide Web Conference, 2018.
  14. Exploiting blockchain data to detect smart Ponzi schemes on Ethereum. IEEE Access, 7:37575–37586, 2019.
  15. Christsim. multicoin-address-validator - npm, 05 2024.
  16. Understanding security issues in the NFT ecosystem. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2022.
  17. Don’t stop me now! exploring challenges of first-time cryptocurrency users. In Designing Interactive Systems Conference 2021, pages 138–148, 2021.
  18. Tracking counterfeit cryptocurrency end-to-end. Proceedings of the ACM on Measurement and Analysis of Computing Systems, 4(3):1–28, 2020.
  19. Cybercrime Bitcoin revenue estimations: Quantifying the impact of methodology and coverage. In Proceedings of ACM CCS, pages 3183–3197, 2023.
  20. M. Grguric. What Are Mobile Game Whales and How to Catch Them? https://www.blog.udonis.co/mobile-marketing/mobile-games/mobile-games-whales, Mar. 2024.
  21. Examining user perceptions of stablecoins: Understandings and risks. In Posters at the Symposium on Usable Privacy and Security (SOUPS), 2023.
  22. The economics of cryptocurrency pump and dump schemes. SSRN Electronic Journal, 01 2018.
  23. Txphishscope: Towards detecting and understanding transaction-based phishing on Ethereum. In Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, pages 120–134, 2023.
  24. A. Holub and J. O’Connor. Coinhoarder: Tracking a Ukrainian Bitcoin phishing ring DNS style. In 2018 APWG Symposium on Electronic Crime Research (eCrime), pages 1–5. IEEE, 2018.
  25. D. Horetski. Twitch battles fake Elon Musk streams again with scam Bitcoin giveaways. https://www.dexerto.com/entertainment/twitch-battles-fake-elon-musk-streams-again-with-scam- bitcoin-giveaways-1803537/, Apr. 2022.
  26. A deep dive into NFT rug pulls, 2023. https://arxiv.org/pdf/2305.06108.pdf.
  27. Data mining-based Ethereum fraud detection. In 2019 IEEE international conference on blockchain (Blockchain), pages 266–273. IEEE, 2019.
  28. Spamalytics: An empirical analysis of spam marketing conversion. In Proceedings of the Conference on Computer and Communications Security, 2008.
  29. Forsage: Anatomy of a smart-contract pyramid scheme. In Proceedings of the 27th Conference on Financial Cryptography and Data Security, 2023.
  30. The other side of the coin: User experiences with Bitcoin security and privacy. In Financial Cryptography and Data Security: 20th International Conference, FC 2016, Christ Church, Barbados, February 22–26, 2016, Revised Selected Papers 20, pages 555–580. Springer, 2017.
  31. N. Kshetri. Scams, frauds, and crimes in the nonfungible token market. Computer, 55(4):60–64, 2022.
  32. Towards understanding and characterizing the arbitrage bot scam in the wild. Proceedings of the ACM on Measurement and Analysis of Computing Systems, 7(3):1–29, 2023.
  33. Understanding the cryptocurrency free giveaway scam disseminated on Twitter lists. In 2023 IEEE International Conference on Blockchain (Blockchain), pages 9–16. IEEE, 2023.
  34. Double and nothing: Understanding and detecting cryptocurrency giveaway scams. In Proceedings of the Network and Distributed Systems Security (NDSS) Symposium, 2023.
  35. D. Liebau and P. Schueffel. Crypto-currencies and ICOs: Are they scams? an empirical study, 2019. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3320884.
  36. PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs. In Proceedings of the 21st USENIX Security Symposium, Bellevue, WA, Aug. 2012.
  37. A fistful of bitcoins: Characterizing payments among men with no names. In Proceedings of the Internet Measurement Conference - IMC ’13, pages 127–140, 2013.
  38. T. Moore and N. Christin. Beware the middleman: Empirical analysis of Bitcoin-exchange risk. In Financial Cryptography and Data Security: 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers 17, pages 25–33. Springer, 2013.
  39. Nobitex. Github - nobitex/coinaddrvalidator, 05 2024.
  40. An ego network analysis of sextortionists. Social Network Analysis and Mining, 10:1–14, 2020.
  41. Embracing Bitcoin: users’ perceived security and trust. Quality & Quantity, 55:1219–1237, 2021.
  42. Spams meet cryptocurrencies: Sextortion in the bitcoin ecosystem. In Proceedings of the 1st ACM conference on advances in financial technologies, pages 76–88, 2019.
  43. R. Phillips and H. Wilder. Tracing cryptocurrency scams: Clustering replicated advance-fee and phishing websites. In 2020 IEEE international conference on blockchain and cryptocurrency (ICBC), pages 1–8. IEEE, 2020.
  44. F. Reid and M. Harrigan. An analysis of anonymity in the Bitcoin system. In Security and Privacy in Social Networks, page 197–223, 2013.
  45. Unveiling the risks of NFT promotion scams, 2023. https://arxiv.org/pdf/2301.09806.pdf.
  46. How much are we willing to lose in cyberspace? On the tail risk of scam in the market for initial coin offerings. On the Tail Risk of Scam in the Market for Initial Coin Offerings (November 18, 2020), 2020.
  47. G. A. Siu and A. Hutchings. “Get a higher return on your savings!”: Comparing adverts for cryptocurrency investment scams across platforms. In 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), pages 158–169. IEEE, 2023.
  48. “Invest in crypto!”: An analysis of investment scam advertisements found in Bitcointalk. In Proceedings of the Symposium on Electronic Crime Research (eCrime 2022), 2022.
  49. Streamlink. Streamlink 6.7.4 documentation, 05 2024.
  50. The future of raising finance-a new opportunity to commit fraud: a review of initial coin offering (icos) scams. Crime, Law and Social Change, 73:417–441, 2020.
  51. B. Toulas. Fake cryptocurrency giveaway sites have tripled this year, Sept. 2022. https://www.bleepingcomputer.com/news/security/fake-cryptocurrency-giveaway-sites-have-tripled-this-year/.
  52. A novel methodology for HYIP operators’ Bitcoin addresses identification. IEEE Access, 7:74835–74848, 2019.
  53. I. Vakilinia. Cryptocurrency giveaway scam with YouTube live stream. In Proceedings of the IEEE 13th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), 2022.
  54. M. Vasek and T. Moore. There’s no free lunch, even using Bitcoin: Tracking the popularity and profits of virtual currency scams. In Proceedings of the 19th Conference on Financial Cryptography and Data Security, 2015.
  55. M. Vasek and T. Moore. Analyzing the Bitcoin Ponzi scheme ecosystem. In Proceedings of the 5th Workshop on Bitcoin and Blockchain Research, 2018.
  56. Trade or trick? detecting and characterizing scam tokens on Uniswap decentralized exchange. Proceedings of the ACM on Measurement and Analysis of Computing Systems, 5(3):1–26, 2021.
  57. Don’t fish in troubled waters! characterizing coronavirus-themed cryptocurrency scams. In Proceedings of the Symposium on Electronic Crime Research (eCrime 2020), 2020.
  58. Characterizing cryptocurrency exchange scams. Computers & Security, 98:101993, 2020.
  59. J. Xu and B. Livshits. The anatomy of a cryptocurrency pump-and-dump scheme. In Proceedings of the 28th USENIX Security Symposium, pages 1609–1625, 2019.
  60. The ICO gold rush: It’s a scam, it’s a bubble, it’s a super challenge for regulators. University of Luxembourg Law Working Paper, pages 17–83, 2017.
Citations (1)

Summary

We haven't generated a summary for this paper yet.