Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Tracking Counterfeit Cryptocurrency End-to-end

Published: 30 November 2020 Publication History

Abstract

The production of counterfeit money has a long history. It refers to the creation of imitation currency that is produced without the legal sanction of government. With the growth of the cryptocurrency ecosystem, there is expanding evidence that counterfeit cryptocurrency has also appeared. In this paper, we empirically explore the presence of counterfeit cryptocurrencies on Ethereum and measure their impact. By analyzing over 190K ERC-20 tokens (or cryptocurrencies) on Ethereum, we have identified $2,117$ counterfeit tokens that target 94 of the 100 most popular cryptocurrencies. We perform an end-to-end characterization of the counterfeit token ecosystem, including their popularity, creators and holders, fraudulent behaviors and advertising channels. Through this, we have identified two types of scams related to counterfeit tokens and devised techniques to identify such scams. We observe that over 7,104 victims were deceived in these scams, and the overall financial loss sums to a minimum of \$ 17 million (74,271.7 ETH). Our findings demonstrate the urgency to identify counterfeit cryptocurrencies and mitigate this threat.

References

[1]
$1.1 billion in cryptocurrency has been stolen this year, and it was apparently easy to do. https://www.cnbc.com/2018/06/07/1-point-1b-in-cryptocurrency-was-stolen-this-year-and-it-was-easy-to-do.html, 2018.
[2]
Three types of cryptocurrency tokens explained as quickly as possible. https://thenextweb.com/hardfork/2018/11/19/cryptocurrency-tokens-explained/, 2018.
[3]
Binance exchange hackers steal bitcoins worth $41m. https://www.bbc.com/news/technology-48199375, 2019.
[4]
Bctalk. https://bctalk.info/, 2020.
[5]
Bitcointalk, 2020. https://bitcointalk.org/.
[6]
Bytechats. https://bytechats.info/, 2020.
[7]
Coin hunter. https://coinhunter.io, 2020.
[8]
Facebook. https://www.facebook.com/, 2020.
[9]
Imtoken wallet security. https://imtoken.fans/c/18-category/33-category, 2020.
[10]
Libra (digital currency), 2020. https://en.wikipedia.org/wiki/Libra_(digital_currency).
[11]
Medium. https://medium.com/, 2020.
[12]
Sina. http://blog.sina.com.cn/, 2020.
[13]
Steemkr. https://steemkr.com/, 2020.
[14]
Telegram. https://telegram.org/, 2020.
[15]
Telegraph. https://telegra.ph/, 2020.
[16]
Telemetr. https://telemetr.me/, 2020.
[17]
Tgchannels. https://ru.tgchannels.org/, 2020.
[18]
Token tracker. https://cn.etherscan.com/tokens, 2020.
[19]
Total crypto market capitalization and volume. https://www.tradingview.com/markets/cryptocurrencies/global-charts/, 2020.
[20]
Total supply, 2020. https://academy.binance.com/en/glossary/total-supply.
[21]
Twipu. https://www.twipu.com/, 2020.
[22]
V2ex. https://www.v2ex.com/, 2020.
[23]
Youtube. https://www.youtube.com/, 2020.
[24]
Zhihu. https://www.zhihu.com/, 2020.
[25]
Massimo Bartoletti, Salvatore Carta, Tiziana Cimoli, and Roberto Saia. Dissecting ponzi schemes on ethereum: identification, analysis, and impact. Future Generation Computer Systems, 102:259--277, 2020.
[26]
Massimo Bartoletti, Barbara Pes, and Sergio Serusi. Data mining for detecting bitcoin ponzi schemes. In 2018 Crypto Valley Conference on Blockchain Technology (CVCBT), pages 75--84. IEEE, 2018.
[27]
Shuqing Bian, Zhenpeng Deng, Fei Li, Will Monroe, Peng Shi, Zijun Sun, Wei Wu, Sikuang Wang, William Yang Wang, Arianna Yuan, Tianwei Zhang, and Jiwei Li. Icorating: A deep-learning system for scam ico identification. arXiv preprint arXiv:1803.03670, 2018.
[28]
Alex Biryukov, Dmitry Khovratovich, and Ivan Pustogarov. Deanonymisation of clients in bitcoin p2p network. In Proceedings of CCS 2014. ACM, 2014.
[29]
Connor Blenkinsop. Arbitrage trading in crypto, explained. https://cointelegraph.com/explained/arbitrage-trading-in-crypto-explained, 2019.
[30]
Ting Chen, Yufei Zhang, Zihao Li, Xiapu Luo, Ting Wang, Rong Cao, Xiuzhuo Xiao, and Xiaosong Zhang. Tokenscope: Automatically detecting inconsistent behaviors of cryptocurrency tokens in ethereum. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS '19, page 1503--1520, 2019.
[31]
Ting Chen, Yuxiao Zhu, Zihao Li, Jiachi Chen, Xiaoqi Li, Xiapu Luo, Xiaodong Lin, and Xiaosong Zhang. Understanding ethereum via graph analysis. In IEEE International Conference on Computer Communications (INFOCOM), 2018.
[32]
Weili Chen, Jun Wu, Zibin Zheng, Chuan Chen, and Yuren Zhou. Market manipulation of bitcoin: evidence from mining the mt. gox transaction network. In IEEE INFOCOM 2019-IEEE Conference on Computer Communications, pages 964--972. IEEE, 2019.
[33]
Weili Chen, YueJin Xu, Zibin Zheng, Yuren Zhou, Jianxun Eileen Yang, and Jing Bian. Detecting" pump & dump schemes" on cryptocurrency market using an improved apriori algorithm. In 2019 IEEE International Conference on Service-Oriented System Engineering (SOSE), pages 293--2935. IEEE, 2019.
[34]
Weili Chen, Tuo Zhang, Zhiguang Chen, Zibin Zheng, and Yutong Lu. Traveling the token world: A graph analysis of ethereum erc20 token ecosystem. In Proceedings of The Web Conference 2020, pages 1411--1421, 2020.
[35]
Weili Chen, Zibin Zheng, Jiahui Cui, Edith Ngai, Peilin Zheng, and Yuren Zhou. Detecting ponzi schemes on ethereum: Towards healthier blockchain technology. In Proceedings of the 2018 World Wide Web Conference, pages 1409--1418, 2018.
[36]
Panayiotis Christodoulou and Klitos Christodoulou. A decentralized voting mechanism: Engaging erc-20 token holders in decision-making. In 2020 Seventh International Conference on Software Defined Systems (SDS), pages 160--164. IEEE, 2020.
[37]
Patrick Schueffel Daniel Liebau. Cryptocurrencies&initial coin offerings: Are they scams? - an empirical study. volume 2, pages 47--55, 2019.
[38]
Matthias; Welsch Giacomo; Dürr, Alexander; Griebel and Frédéric Thiesse. Predicting fraudulent initial coin offerings using information extracted from whitepapers. the 28th European Conference on Information Systems(ECIS),An Online AIS Conference, June 15--17, 2020.
[39]
Simon F Dyson, William J Buchanan, and Liam Bell. Scenario-based creation and digital investigation of ethereum erc20 tokens. Forensic Science International: Digital Investigation, 32:200894, 2020.
[40]
Michael Fleder, Michael S. Kester, and Sudeep Pillai. Bitcoin transaction graph analysis, 02 2015.
[41]
Neil Gandal, JT Hamrick, Tyler Moore, and Tali Oberman. Price manipulation in the bitcoin ecosystem. Journal of Monetary Economics, 95:86--96, 2018.
[42]
JT Hamrick, Farhang Rouhi, Arghya Mukherjee, Amir Feder, Neil Gandal, Tyler Moore, and Marie Vasek. The economics of cryptocurrency pump and dump schemes. 2018.
[43]
JT Hamrick, Farhang Rouhi, Arghya Mukherjee, Amir Feder, Neil Gandal, Tyler Moore, and Marie Vasek. An examination of the cryptocurrency pump and dump ecosystem. Available at SSRN 3303365, 2018.
[44]
Kevin Helms. Chinese authorities confiscate $15 million in cryptocurrencies, arrest 10 scammers. https://news.bitcoin.com/chinese-authorities-confiscate-15-million-cryptocurrencies/, 2020.
[45]
Yangyu Hu, Haoyu Wang, Ren He, Li Li, Gareth Tyson, Ignacio Castro, Yao Guo, Lei Wu, and Guoai Xu. Mobile app squatting. In Proceedings of The Web Conference 2020, pages 1727--1738, 2020.
[46]
Yuheng Huang, Haoyu Wang, Lei Wu, Gareth Tyson, Xiapu Luo, Run Zhang, Xuanzhe Liu, Gang Huang, and Xuxian Jiang. Understanding (mis)behavior on the eosio blockchain. Proc. ACM Meas. Anal. Comput. Syst., 4(2), June 2020.
[47]
Panagiotis Kintis, Najmeh Miramirkhani, Charles Lever, Yizheng Chen, Rosa Romero-Gómez, Nikolaos Pitropakis, Nick Nikiforakis, and Manos Antonakakis. Hiding in plain sight: A longitudinal study of combosquatting abuse. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS '17, page 569--586, 2017.
[48]
Mirko Koscina, Mariusz Lombard-Platet, and Pierre Cluchet. Plasticcoin: an erc20 implementation on hyperledger fabric for circular economy and plastic reuse. In IEEE/WIC/ACM International Conference on Web Intelligence-Companion Volume, pages 223--230, 2019.
[49]
Dan Liebau and Patrick Schueffel. Crypto-currencies and icos: Are they scams? an empirical study. An Empirical Study (January 23, 2019), 2019.
[50]
Damiano Di Francesco Maesa, Andrea Marino, and Laura Ricci. An analysis of the bitcoin users graph: inferring unusual behaviours. In International Workshop on Complex Networks and their Applications, 2016.
[51]
Hartwig Mayer, Ismael Bejarano, Daniel Fernandez, Gustavo Ajzenman, Nicolas Ayala, Nahuel Santoalla, Carlos Sarraute, and Ariel Futoransky. Batpay: a gas efficient protocol for the recurrent micropayment of erc20 tokens. arXiv preprint arXiv:2002.02316, 2020.
[52]
Rachel McIntosh. Nearly a year after libra's launch, fake libra token scams persist. https://www.financemagnates.com/cryptocurrency/news/nearly-a-year-after-libras-launch-fake-libra-token-scams-persist/, 2020.
[53]
Adrian Gepp& Kuldeep Kumar Milind Tiwari. The future of raising finance-a new opportunity to commit fraud: a review of initial coin offering(icos) scams. In Crime Law Soc Change 73, pages 417--441. Springer, 2020.
[54]
Alfredo J Morales, Shahar Somin, Yaniv Altshuler, and Alex'Sandy' Pentland. User behavior and token adoption on erc20. arXiv preprint arXiv:2005.12218, 2020.
[55]
Masarah Paquet-Clouston, Matteo Romiti, Bernhard Haslhofer, and Thomas Charvat. Spams meet cryptocurrencies: Sextortion in the bitcoin ecosystem. In Proceedings of the 1st ACM Conference on Advances in Financial Technologies (AFT '19), page 76--88, 2019.
[56]
Silivanxay Phetsouvanh, Frédérique Oggier, and Anwitaman Datta. Egret: Extortion graph exploration techniques in the bitcoin network. In IEEE International Conference on Data Mining Workshops (ICDMW), 2018.
[57]
Ross Phillips and Heidi Wilder. Tracing cryptocurrency scams: Clustering replicated advance-fee and phishing websites. arXiv preprint arXiv:2005.14440, 2020.
[58]
Reza Rahimian, Shayan Eskandari, and Jeremy Clark. Resolving the multiple withdrawal attack on erc20 tokens. In 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), pages 320--329. IEEE, 2019.
[59]
Fergal Reid and Martin Harrigan. An analysis of anonymity in the bitcoin system. In 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing. IEEE, 2011.
[60]
Dorit Ron and Adi Shamir. Quantitative analysis of the full bitcoin transaction graph. In Financial Cryptography (FC), 2013.
[61]
Christof Ferreira Torres, Mathis Steichen, et al. The art of the scam: Demystifying honeypots in ethereum smart contracts. In 28th $$USENIX$$ Security Symposium ($$USENIX$$ Security 19), pages 1591--1607, 2019.
[62]
Kentaroh Toyoda, P Takis Mathiopoulos, and Tomoaki Ohtsuki. A novel methodology for hyip operators? bitcoin addresses identification. IEEE Access, 7:74835--74848, 2019.
[63]
Kentaroh Toyoda, Tomoaki Ohtsuki, and P Takis Mathiopoulos. Identification of high yielding investment programs in bitcoin via transactions pattern analysis. In GLOBECOM 2017--2017 IEEE Global Communications Conference, pages 1--6. IEEE, 2017.
[64]
Marie Vasek and Tyler Moore. There's no free lunch, even using bitcoin: Tracking the popularity and profits of virtual currency scams. In International conference on financial cryptography and data security, pages 44--61. Springer, 2015.
[65]
Marie Vasek and Tyler Moore. Analyzing the bitcoin ponzi scheme ecosystem. In International Conference on Financial Cryptography and Data Security, pages 101--112. Springer, 2018.
[66]
Friedhelm Victor and Bianca Katharina Luders. Measuring ethereum-based erc20 token networks. In International conference on financial cryptography and data security. Springer, 2019.
[67]
Wikipedia. Airdrop (cryptocurrency). https://en.wikipedia.org/wiki/Airdrop_(cryptocurrency), 2020.
[68]
Wikipedia. Counterfeit money. https://en.wikipedia.org/wiki/Counterfeit_money, 2020.
[69]
Jiajing Wu, Qi Yuan, Dan Lin, Wei You, Weili Chen, Chuan Chen, and Zibin Zheng. Who are the phishers? phishing scam detection on ethereum via network embedding. arXiv preprint arXiv:1911.09259, 2019.
[70]
Pengcheng Xia, Haoyu Wang, Xiapu Luo, Lei Wu, Yajin Zhou, Guangdong Bai, Guoai Xu, Gang Huang, and Xuanzhe Liu. Don't fish in troubled waters! characterizing coronavirus-themed cryptocurrency scams, 2020.
[71]
Pengcheng Xia, Bowen Zhang, Ru Ji, Bingyu Gao, Lei Wu, Xiapu Luo, Haoyu Wang, and Guoai Xu. Characterizing cryptocurrency exchange scams. arXiv preprint arXiv:2003.07314, 2020.
[72]
Dirk A Zetzsche, Ross P Buckley, Douglas W Arner, and Linus Föhr. The ico gold rush: It's a scam, it's a bubble, it's a super challenge for regulators. University of Luxembourg Law Working Paper, (11):17--83, 2017.
[73]
Chen Zhao and Yong Guan. A graph-based investigation of bitcoin transactions. In 11th IFIP International Conference on Digital Forensics (DF), 2015.

Cited By

View all
  • (2024)Towards Understanding and Characterizing the Arbitrage Bot Scam In the WildACM SIGMETRICS Performance Evaluation Review10.1145/3673660.365508852:1(89-90)Online publication date: 13-Jun-2024
  • (2024)Towards Understanding and Characterizing the Arbitrage Bot Scam In the WildAbstracts of the 2024 ACM SIGMETRICS/IFIP PERFORMANCE Joint International Conference on Measurement and Modeling of Computer Systems10.1145/3652963.3655088(89-90)Online publication date: 10-Jun-2024
  • (2024)DenseFlow: Spotting Cryptocurrency Money Laundering in Ethereum Transaction GraphsProceedings of the ACM Web Conference 202410.1145/3589334.3645692(4429-4438)Online publication date: 13-May-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Proceedings of the ACM on Measurement and Analysis of Computing Systems
Proceedings of the ACM on Measurement and Analysis of Computing Systems  Volume 4, Issue 3
POMACS
December 2020
345 pages
EISSN:2476-1249
DOI:10.1145/3440131
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 November 2020
Published in POMACS Volume 4, Issue 3

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. blockchain
  2. counterfeit cryptocurrency
  3. erc-20 token
  4. scam

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)126
  • Downloads (Last 6 weeks)9
Reflects downloads up to 30 Aug 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Towards Understanding and Characterizing the Arbitrage Bot Scam In the WildACM SIGMETRICS Performance Evaluation Review10.1145/3673660.365508852:1(89-90)Online publication date: 13-Jun-2024
  • (2024)Towards Understanding and Characterizing the Arbitrage Bot Scam In the WildAbstracts of the 2024 ACM SIGMETRICS/IFIP PERFORMANCE Joint International Conference on Measurement and Modeling of Computer Systems10.1145/3652963.3655088(89-90)Online publication date: 10-Jun-2024
  • (2024)DenseFlow: Spotting Cryptocurrency Money Laundering in Ethereum Transaction GraphsProceedings of the ACM Web Conference 202410.1145/3589334.3645692(4429-4438)Online publication date: 13-May-2024
  • (2024)Interface Illusions: Uncovering the Rise of Visual Scams in Cryptocurrency WalletsProceedings of the ACM Web Conference 202410.1145/3589334.3645348(1585-1595)Online publication date: 13-May-2024
  • (2024)Who is Who on Ethereum? Account Labeling Using Heterophilic Graph Convolutional NetworkIEEE Transactions on Systems, Man, and Cybernetics: Systems10.1109/TSMC.2023.332952054:3(1541-1553)Online publication date: Mar-2024
  • (2024)Blockchain Data Mining With Graph Learning: A SurveyIEEE Transactions on Pattern Analysis and Machine Intelligence10.1109/TPAMI.2023.332740446:2(729-748)Online publication date: Feb-2024
  • (2024)Toward Understanding Asset Flows in Crypto Money Laundering Through the Lenses of Ethereum HeistsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.334627619(1994-2009)Online publication date: 2024
  • (2024)The Dark Crypto World!IEEE Internet Computing10.1109/MIC.2024.337370628:3(26-36)Online publication date: 7-Mar-2024
  • (2023)Token spammers, rug pulls, and sniper botsProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620425(3349-3366)Online publication date: 9-Aug-2023
  • (2023)DeFi Security: Turning The Weakest Link Into The Strongest AttractionSSRN Electronic Journal10.2139/ssrn.4528793Online publication date: 2023
  • Show More Cited By

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media