Conning the Crypto Conman: End-to-End Analysis of Cryptocurrency-based Technical Support Scams

Bhupendra Acharya,Muhammad Saad,Antonio Emanuele Cinà,Lea Schönherr,Hoang Dai Nguyen,Adam Oest,Phani Vadrevu,Thorsten Holz
2024-01-18
Abstract:The mainstream adoption of cryptocurrencies has led to a surge in wallet-related issues reported by ordinary users on social media platforms. In parallel, there is an increase in an emerging fraud trend called cryptocurrency-based technical support scam, in which fraudsters offer fake wallet recovery services and target users experiencing wallet-related issues.
Cryptography and Security
What problem does this paper attempt to address?
The problems that this paper attempts to solve are as follows: With the mainstream adoption of cryptocurrencies, users have reported an increasing number of wallet - related problems on social media platforms. At the same time, an emerging fraud trend - cryptocurrency - based technical support scams - is also on the rise. In these scams, scammers offer false wallet recovery services, specifically targeting users who encounter wallet problems. Specifically, the paper aims to: 1. **Comprehensively analyze cryptocurrency - based technical support scams**: - Research the modus operandi of these scams. - Reveal how scammers use social media platforms (such as Twitter, Instagram, Telegram, etc.) to conduct fraud activities. - Identify different types of scammers and their behavior patterns. 2. **Develop and apply new scam - detection tools**: - Propose an analytical tool named HoneyTweet, which lures scammers by posting false technical support requests (called "honey tweets"). - Interact with scammers through an automated system to reveal their payment methods and other key information. 3. **Verify scams and propose mitigation suggestions**: - Verify private key theft through setting up honey - pot wallet addresses. - Cooperate with payment service providers (such as PayPal) to share scammer data to obtain feedback and support. - Provide advice on how to prevent such scams. ### Main contributions of the paper 1. **Scam detection**: By generating customized tweets with HoneyTweet, it has successfully attracted more than 9,000 technical - support scammers. 2. **Scammer profiling**: Collected and analyzed the data of more than 9,000 scammers, and used machine - learning models to study the correlations among scammers. 3. **Scam life - cycle analysis**: Through automated and manual techniques to interact with scammers, it has analyzed in detail the entire process from the initial contact to the final completion of fraud. 4. **Scam verification**: Verified the actual success rate of scams through honey - pot wallet experiments and cooperated with PayPal to confirm the fraudulent behavior. In conclusion, through systematic analysis and experiments, this paper has proven the widespread existence of cryptocurrency - based technical support scams and proposed an effective detection and response method.