In the past year, a new spamming scheme has emerged: sexual extortion messages requiring payments in the cryptocurrency Bitcoin, also known as sextortion. This scheme represents a first integration of the use of cryptocurrencies by members of the spamming industry. Using a dataset of 4,340,736 sextortion spams, this research aims at understanding such new amalgamation by uncovering spammers’ operations. To do so, a simple, yet effective method for projecting Bitcoin addresses mentioned in sextortion spams onto transaction graph abstractions is computed over the entire Bitcoin blockchain. This allows us to track and investigate monetary flows between involved actors and gain insights into the financial structure of sextortion campaigns. We f...
Purpose: This paper aims to shed light into money laundering using bitcoin. Digital payment methods ...
Abstract—Spam is a profitable business for cybercriminals, with the revenue of a spam campaign that ...
Cryptojacking, a phenomenon also known as drive-by cryptomining, involves stealing computing power f...
Bitcoin scams cause billions of dollars worth of damage every year, targeting both large corporation...
We consider a particular instance of user interactions in the Bitcoin network, that of interactions ...
Abstract. We present the first empirical analysis of Bitcoin-based scams: oper-ations established wi...
We present the first empirical analysis of Bitcoin-based scams: operations established with fraudule...
Cybercrime is negatively impacting everybody. In recent years cybercriminal activity has directly af...
Modern unsolicited bulk email, or spam, is ultimately driven by product sales: goods purchased by cu...
The Bitcoin network is a complex network that records anonymous financial transactions while encapsu...
Since the inception of Bitcoin in 2009, the market of cryptocurrencies has grown beyond the initial ...
Bitcoin is a digital currency that has recently gathered significant interest. From ecommercesites t...
Abstract—Spam-based advertising is a business. While it has engendered both widespread antipathy and...
© The Author(s) 2019. Cryptocurrencies are among the largest unregulated markets in the world. We fi...
This paper investigates the evolution of investment scam lures and scam-related keywords in the cryp...
Purpose: This paper aims to shed light into money laundering using bitcoin. Digital payment methods ...
Abstract—Spam is a profitable business for cybercriminals, with the revenue of a spam campaign that ...
Cryptojacking, a phenomenon also known as drive-by cryptomining, involves stealing computing power f...
Bitcoin scams cause billions of dollars worth of damage every year, targeting both large corporation...
We consider a particular instance of user interactions in the Bitcoin network, that of interactions ...
Abstract. We present the first empirical analysis of Bitcoin-based scams: oper-ations established wi...
We present the first empirical analysis of Bitcoin-based scams: operations established with fraudule...
Cybercrime is negatively impacting everybody. In recent years cybercriminal activity has directly af...
Modern unsolicited bulk email, or spam, is ultimately driven by product sales: goods purchased by cu...
The Bitcoin network is a complex network that records anonymous financial transactions while encapsu...
Since the inception of Bitcoin in 2009, the market of cryptocurrencies has grown beyond the initial ...
Bitcoin is a digital currency that has recently gathered significant interest. From ecommercesites t...
Abstract—Spam-based advertising is a business. While it has engendered both widespread antipathy and...
© The Author(s) 2019. Cryptocurrencies are among the largest unregulated markets in the world. We fi...
This paper investigates the evolution of investment scam lures and scam-related keywords in the cryp...
Purpose: This paper aims to shed light into money laundering using bitcoin. Digital payment methods ...
Abstract—Spam is a profitable business for cybercriminals, with the revenue of a spam campaign that ...
Cryptojacking, a phenomenon also known as drive-by cryptomining, involves stealing computing power f...