Abstract
The production of counterfeit money has a long history. It refers to the creation of imitation currency that is produced without the legal sanction of government. With the growth of the cryptocurrency ecosystem, there is expanding evidence that counterfeit cryptocurrency has also appeared. In this paper, we empirically explore the presence of counterfeit cryptocurrencies on Ethereum and measure their impact. By analyzing over 190K ERC-20 tokens (or cryptocurrencies) on Ethereum, we have identified $2,117$ counterfeit tokens that target 94 of the 100 most popular cryptocurrencies. We perform an end-to-end characterization of the counterfeit token ecosystem, including their popularity, creators and holders, fraudulent behaviors and advertising channels. Through this, we have identified two types of scams related to counterfeit tokens and devised techniques to identify such scams. We observe that over 7,104 victims were deceived in these scams, and the overall financial loss sums to a minimum of \$ 17 million (74,271.7 ETH). Our findings demonstrate the urgency to identify counterfeit cryptocurrencies and mitigate this threat.
- $1.1 billion in cryptocurrency has been stolen this year, and it was apparently easy to do. https://www.cnbc.com/2018/06/07/1-point-1b-in-cryptocurrency-was-stolen-this-year-and-it-was-easy-to-do.html, 2018.Google Scholar
- Three types of cryptocurrency tokens explained as quickly as possible. https://thenextweb.com/hardfork/2018/11/19/cryptocurrency-tokens-explained/, 2018.Google Scholar
- Binance exchange hackers steal bitcoins worth $41m. https://www.bbc.com/news/technology-48199375, 2019.Google Scholar
- Bctalk. https://bctalk.info/, 2020.Google Scholar
- Bitcointalk, 2020. https://bitcointalk.org/.Google Scholar
- Bytechats. https://bytechats.info/, 2020.Google Scholar
- Coin hunter. https://coinhunter.io, 2020.Google Scholar
- Facebook. https://www.facebook.com/, 2020.Google Scholar
- Imtoken wallet security. https://imtoken.fans/c/18-category/33-category, 2020.Google Scholar
- Libra (digital currency), 2020. https://en.wikipedia.org/wiki/Libra_(digital_currency).Google Scholar
- Medium. https://medium.com/, 2020.Google Scholar
- Sina. http://blog.sina.com.cn/, 2020.Google Scholar
- Steemkr. https://steemkr.com/, 2020.Google Scholar
- Telegram. https://telegram.org/, 2020.Google Scholar
- Telegraph. https://telegra.ph/, 2020.Google Scholar
- Telemetr. https://telemetr.me/, 2020.Google Scholar
- Tgchannels. https://ru.tgchannels.org/, 2020.Google Scholar
- Token tracker. https://cn.etherscan.com/tokens, 2020.Google Scholar
- Total crypto market capitalization and volume. https://www.tradingview.com/markets/cryptocurrencies/global-charts/, 2020.Google Scholar
- Total supply, 2020. https://academy.binance.com/en/glossary/total-supply.Google Scholar
- Twipu. https://www.twipu.com/, 2020.Google Scholar
- V2ex. https://www.v2ex.com/, 2020.Google Scholar
- Youtube. https://www.youtube.com/, 2020.Google Scholar
- Zhihu. https://www.zhihu.com/, 2020.Google Scholar
- Massimo Bartoletti, Salvatore Carta, Tiziana Cimoli, and Roberto Saia. Dissecting ponzi schemes on ethereum: identification, analysis, and impact. Future Generation Computer Systems, 102:259--277, 2020.Google Scholar
Digital Library
- Massimo Bartoletti, Barbara Pes, and Sergio Serusi. Data mining for detecting bitcoin ponzi schemes. In 2018 Crypto Valley Conference on Blockchain Technology (CVCBT), pages 75--84. IEEE, 2018.Google Scholar
Cross Ref
- Shuqing Bian, Zhenpeng Deng, Fei Li, Will Monroe, Peng Shi, Zijun Sun, Wei Wu, Sikuang Wang, William Yang Wang, Arianna Yuan, Tianwei Zhang, and Jiwei Li. Icorating: A deep-learning system for scam ico identification. arXiv preprint arXiv:1803.03670, 2018.Google Scholar
- Alex Biryukov, Dmitry Khovratovich, and Ivan Pustogarov. Deanonymisation of clients in bitcoin p2p network. In Proceedings of CCS 2014. ACM, 2014. Google Scholar
Digital Library
- Connor Blenkinsop. Arbitrage trading in crypto, explained. https://cointelegraph.com/explained/arbitrage-trading-in-crypto-explained, 2019.Google Scholar
- Ting Chen, Yufei Zhang, Zihao Li, Xiapu Luo, Ting Wang, Rong Cao, Xiuzhuo Xiao, and Xiaosong Zhang. Tokenscope: Automatically detecting inconsistent behaviors of cryptocurrency tokens in ethereum. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS '19, page 1503--1520, 2019. Google Scholar
Digital Library
- Ting Chen, Yuxiao Zhu, Zihao Li, Jiachi Chen, Xiaoqi Li, Xiapu Luo, Xiaodong Lin, and Xiaosong Zhang. Understanding ethereum via graph analysis. In IEEE International Conference on Computer Communications (INFOCOM), 2018.Google Scholar
Cross Ref
- Weili Chen, Jun Wu, Zibin Zheng, Chuan Chen, and Yuren Zhou. Market manipulation of bitcoin: evidence from mining the mt. gox transaction network. In IEEE INFOCOM 2019-IEEE Conference on Computer Communications, pages 964--972. IEEE, 2019.Google Scholar
Cross Ref
- Weili Chen, YueJin Xu, Zibin Zheng, Yuren Zhou, Jianxun Eileen Yang, and Jing Bian. Detecting" pump & dump schemes" on cryptocurrency market using an improved apriori algorithm. In 2019 IEEE International Conference on Service-Oriented System Engineering (SOSE), pages 293--2935. IEEE, 2019.Google Scholar
Cross Ref
- Weili Chen, Tuo Zhang, Zhiguang Chen, Zibin Zheng, and Yutong Lu. Traveling the token world: A graph analysis of ethereum erc20 token ecosystem. In Proceedings of The Web Conference 2020, pages 1411--1421, 2020. Google Scholar
Digital Library
- Weili Chen, Zibin Zheng, Jiahui Cui, Edith Ngai, Peilin Zheng, and Yuren Zhou. Detecting ponzi schemes on ethereum: Towards healthier blockchain technology. In Proceedings of the 2018 World Wide Web Conference, pages 1409--1418, 2018. Google Scholar
Digital Library
- Panayiotis Christodoulou and Klitos Christodoulou. A decentralized voting mechanism: Engaging erc-20 token holders in decision-making. In 2020 Seventh International Conference on Software Defined Systems (SDS), pages 160--164. IEEE, 2020.Google Scholar
Cross Ref
- Patrick Schueffel Daniel Liebau. Cryptocurrencies&initial coin offerings: Are they scams? - an empirical study. volume 2, pages 47--55, 2019.Google Scholar
- Matthias; Welsch Giacomo; Dürr, Alexander; Griebel and Frédéric Thiesse. Predicting fraudulent initial coin offerings using information extracted from whitepapers. the 28th European Conference on Information Systems(ECIS),An Online AIS Conference, June 15--17, 2020.Google Scholar
- Simon F Dyson, William J Buchanan, and Liam Bell. Scenario-based creation and digital investigation of ethereum erc20 tokens. Forensic Science International: Digital Investigation, 32:200894, 2020.Google Scholar
Cross Ref
- Michael Fleder, Michael S. Kester, and Sudeep Pillai. Bitcoin transaction graph analysis, 02 2015.Google Scholar
- Neil Gandal, JT Hamrick, Tyler Moore, and Tali Oberman. Price manipulation in the bitcoin ecosystem. Journal of Monetary Economics, 95:86--96, 2018.Google Scholar
Cross Ref
- JT Hamrick, Farhang Rouhi, Arghya Mukherjee, Amir Feder, Neil Gandal, Tyler Moore, and Marie Vasek. The economics of cryptocurrency pump and dump schemes. 2018.Google Scholar
- JT Hamrick, Farhang Rouhi, Arghya Mukherjee, Amir Feder, Neil Gandal, Tyler Moore, and Marie Vasek. An examination of the cryptocurrency pump and dump ecosystem. Available at SSRN 3303365, 2018.Google Scholar
- Kevin Helms. Chinese authorities confiscate $15 million in cryptocurrencies, arrest 10 scammers. https://news.bitcoin.com/chinese-authorities-confiscate-15-million-cryptocurrencies/, 2020.Google Scholar
- Yangyu Hu, Haoyu Wang, Ren He, Li Li, Gareth Tyson, Ignacio Castro, Yao Guo, Lei Wu, and Guoai Xu. Mobile app squatting. In Proceedings of The Web Conference 2020, pages 1727--1738, 2020. Google Scholar
Digital Library
- Yuheng Huang, Haoyu Wang, Lei Wu, Gareth Tyson, Xiapu Luo, Run Zhang, Xuanzhe Liu, Gang Huang, and Xuxian Jiang. Understanding (mis)behavior on the eosio blockchain. Proc. ACM Meas. Anal. Comput. Syst., 4(2), June 2020. Google Scholar
Digital Library
- Panagiotis Kintis, Najmeh Miramirkhani, Charles Lever, Yizheng Chen, Rosa Romero-Gómez, Nikolaos Pitropakis, Nick Nikiforakis, and Manos Antonakakis. Hiding in plain sight: A longitudinal study of combosquatting abuse. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS '17, page 569--586, 2017. Google Scholar
Digital Library
- Mirko Koscina, Mariusz Lombard-Platet, and Pierre Cluchet. Plasticcoin: an erc20 implementation on hyperledger fabric for circular economy and plastic reuse. In IEEE/WIC/ACM International Conference on Web Intelligence-Companion Volume, pages 223--230, 2019. Google Scholar
Digital Library
- Dan Liebau and Patrick Schueffel. Crypto-currencies and icos: Are they scams? an empirical study. An Empirical Study (January 23, 2019), 2019.Google Scholar
Cross Ref
- Damiano Di Francesco Maesa, Andrea Marino, and Laura Ricci. An analysis of the bitcoin users graph: inferring unusual behaviours. In International Workshop on Complex Networks and their Applications, 2016.Google Scholar
- Hartwig Mayer, Ismael Bejarano, Daniel Fernandez, Gustavo Ajzenman, Nicolas Ayala, Nahuel Santoalla, Carlos Sarraute, and Ariel Futoransky. Batpay: a gas efficient protocol for the recurrent micropayment of erc20 tokens. arXiv preprint arXiv:2002.02316, 2020.Google Scholar
- Rachel McIntosh. Nearly a year after libra's launch, fake libra token scams persist. https://www.financemagnates.com/cryptocurrency/news/nearly-a-year-after-libras-launch-fake-libra-token-scams-persist/, 2020.Google Scholar
- Adrian Gepp& Kuldeep Kumar Milind Tiwari. The future of raising finance-a new opportunity to commit fraud: a review of initial coin offering(icos) scams. In Crime Law Soc Change 73, pages 417--441. Springer, 2020.Google Scholar
- Alfredo J Morales, Shahar Somin, Yaniv Altshuler, and Alex'Sandy' Pentland. User behavior and token adoption on erc20. arXiv preprint arXiv:2005.12218, 2020.Google Scholar
- Masarah Paquet-Clouston, Matteo Romiti, Bernhard Haslhofer, and Thomas Charvat. Spams meet cryptocurrencies: Sextortion in the bitcoin ecosystem. In Proceedings of the 1st ACM Conference on Advances in Financial Technologies (AFT '19), page 76--88, 2019. Google Scholar
Digital Library
- Silivanxay Phetsouvanh, Frédérique Oggier, and Anwitaman Datta. Egret: Extortion graph exploration techniques in the bitcoin network. In IEEE International Conference on Data Mining Workshops (ICDMW), 2018.Google Scholar
Cross Ref
- Ross Phillips and Heidi Wilder. Tracing cryptocurrency scams: Clustering replicated advance-fee and phishing websites. arXiv preprint arXiv:2005.14440, 2020.Google Scholar
- Reza Rahimian, Shayan Eskandari, and Jeremy Clark. Resolving the multiple withdrawal attack on erc20 tokens. In 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), pages 320--329. IEEE, 2019.Google Scholar
Cross Ref
- Fergal Reid and Martin Harrigan. An analysis of anonymity in the bitcoin system. In 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing. IEEE, 2011.Google Scholar
Cross Ref
- Dorit Ron and Adi Shamir. Quantitative analysis of the full bitcoin transaction graph. In Financial Cryptography (FC), 2013.Google Scholar
Cross Ref
- Christof Ferreira Torres, Mathis Steichen, et al. The art of the scam: Demystifying honeypots in ethereum smart contracts. In 28th $$USENIX$$ Security Symposium ($$USENIX$$ Security 19), pages 1591--1607, 2019. Google Scholar
Digital Library
- Kentaroh Toyoda, P Takis Mathiopoulos, and Tomoaki Ohtsuki. A novel methodology for hyip operators? bitcoin addresses identification. IEEE Access, 7:74835--74848, 2019.Google Scholar
Cross Ref
- Kentaroh Toyoda, Tomoaki Ohtsuki, and P Takis Mathiopoulos. Identification of high yielding investment programs in bitcoin via transactions pattern analysis. In GLOBECOM 2017--2017 IEEE Global Communications Conference, pages 1--6. IEEE, 2017.Google Scholar
Cross Ref
- Marie Vasek and Tyler Moore. There's no free lunch, even using bitcoin: Tracking the popularity and profits of virtual currency scams. In International conference on financial cryptography and data security, pages 44--61. Springer, 2015.Google Scholar
Cross Ref
- Marie Vasek and Tyler Moore. Analyzing the bitcoin ponzi scheme ecosystem. In International Conference on Financial Cryptography and Data Security, pages 101--112. Springer, 2018.Google Scholar
- Friedhelm Victor and Bianca Katharina Luders. Measuring ethereum-based erc20 token networks. In International conference on financial cryptography and data security. Springer, 2019.Google Scholar
Cross Ref
- Wikipedia. Airdrop (cryptocurrency). https://en.wikipedia.org/wiki/Airdrop_(cryptocurrency), 2020.Google Scholar
- Wikipedia. Counterfeit money. https://en.wikipedia.org/wiki/Counterfeit_money, 2020.Google Scholar
- Jiajing Wu, Qi Yuan, Dan Lin, Wei You, Weili Chen, Chuan Chen, and Zibin Zheng. Who are the phishers? phishing scam detection on ethereum via network embedding. arXiv preprint arXiv:1911.09259, 2019.Google Scholar
- Pengcheng Xia, Haoyu Wang, Xiapu Luo, Lei Wu, Yajin Zhou, Guangdong Bai, Guoai Xu, Gang Huang, and Xuanzhe Liu. Don't fish in troubled waters! characterizing coronavirus-themed cryptocurrency scams, 2020.Google Scholar
- Pengcheng Xia, Bowen Zhang, Ru Ji, Bingyu Gao, Lei Wu, Xiapu Luo, Haoyu Wang, and Guoai Xu. Characterizing cryptocurrency exchange scams. arXiv preprint arXiv:2003.07314, 2020.Google Scholar
- Dirk A Zetzsche, Ross P Buckley, Douglas W Arner, and Linus Föhr. The ico gold rush: It's a scam, it's a bubble, it's a super challenge for regulators. University of Luxembourg Law Working Paper, (11):17--83, 2017.Google Scholar
- Chen Zhao and Yong Guan. A graph-based investigation of bitcoin transactions. In 11th IFIP International Conference on Digital Forensics (DF), 2015.Google Scholar
Cross Ref
Index Terms
Tracking Counterfeit Cryptocurrency End-to-end
Recommendations
Tracking Counterfeit Cryptocurrency End-to-end
SIGMETRICS '21With the growth of the cryptocurrency ecosystem, there is expanding evidence that counterfeit cryptocurrency has also appeared. In this paper, we empirically explore the presence of counterfeit cryptocurrencies on Ethereum and measure their impact. By ...
Tracking Counterfeit Cryptocurrency End-to-end
SIGMETRICS '21: Abstract Proceedings of the 2021 ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer SystemsWith the growth of the cryptocurrency ecosystem, there is expanding evidence that counterfeit cryptocurrency has also appeared. In this paper, we empirically explore the presence of counterfeit cryptocurrencies on Ethereum and measure their impact. By ...






Comments