skip to main content
research-article

Tracking Counterfeit Cryptocurrency End-to-end

Authors Info & Claims
Published:15 June 2021Publication History
Skip Abstract Section

Abstract

The production of counterfeit money has a long history. It refers to the creation of imitation currency that is produced without the legal sanction of government. With the growth of the cryptocurrency ecosystem, there is expanding evidence that counterfeit cryptocurrency has also appeared. In this paper, we empirically explore the presence of counterfeit cryptocurrencies on Ethereum and measure their impact. By analyzing over 190K ERC-20 tokens (or cryptocurrencies) on Ethereum, we have identified $2,117$ counterfeit tokens that target 94 of the 100 most popular cryptocurrencies. We perform an end-to-end characterization of the counterfeit token ecosystem, including their popularity, creators and holders, fraudulent behaviors and advertising channels. Through this, we have identified two types of scams related to counterfeit tokens and devised techniques to identify such scams. We observe that over 7,104 victims were deceived in these scams, and the overall financial loss sums to a minimum of \$ 17 million (74,271.7 ETH). Our findings demonstrate the urgency to identify counterfeit cryptocurrencies and mitigate this threat.

References

  1. $1.1 billion in cryptocurrency has been stolen this year, and it was apparently easy to do. https://www.cnbc.com/2018/06/07/1-point-1b-in-cryptocurrency-was-stolen-this-year-and-it-was-easy-to-do.html, 2018.Google ScholarGoogle Scholar
  2. Three types of cryptocurrency tokens explained as quickly as possible. https://thenextweb.com/hardfork/2018/11/19/cryptocurrency-tokens-explained/, 2018.Google ScholarGoogle Scholar
  3. Binance exchange hackers steal bitcoins worth $41m. https://www.bbc.com/news/technology-48199375, 2019.Google ScholarGoogle Scholar
  4. Bctalk. https://bctalk.info/, 2020.Google ScholarGoogle Scholar
  5. Bitcointalk, 2020. https://bitcointalk.org/.Google ScholarGoogle Scholar
  6. Bytechats. https://bytechats.info/, 2020.Google ScholarGoogle Scholar
  7. Coin hunter. https://coinhunter.io, 2020.Google ScholarGoogle Scholar
  8. Facebook. https://www.facebook.com/, 2020.Google ScholarGoogle Scholar
  9. Imtoken wallet security. https://imtoken.fans/c/18-category/33-category, 2020.Google ScholarGoogle Scholar
  10. Libra (digital currency), 2020. https://en.wikipedia.org/wiki/Libra_(digital_currency).Google ScholarGoogle Scholar
  11. Medium. https://medium.com/, 2020.Google ScholarGoogle Scholar
  12. Sina. http://blog.sina.com.cn/, 2020.Google ScholarGoogle Scholar
  13. Steemkr. https://steemkr.com/, 2020.Google ScholarGoogle Scholar
  14. Telegram. https://telegram.org/, 2020.Google ScholarGoogle Scholar
  15. Telegraph. https://telegra.ph/, 2020.Google ScholarGoogle Scholar
  16. Telemetr. https://telemetr.me/, 2020.Google ScholarGoogle Scholar
  17. Tgchannels. https://ru.tgchannels.org/, 2020.Google ScholarGoogle Scholar
  18. Token tracker. https://cn.etherscan.com/tokens, 2020.Google ScholarGoogle Scholar
  19. Total crypto market capitalization and volume. https://www.tradingview.com/markets/cryptocurrencies/global-charts/, 2020.Google ScholarGoogle Scholar
  20. Total supply, 2020. https://academy.binance.com/en/glossary/total-supply.Google ScholarGoogle Scholar
  21. Twipu. https://www.twipu.com/, 2020.Google ScholarGoogle Scholar
  22. V2ex. https://www.v2ex.com/, 2020.Google ScholarGoogle Scholar
  23. Youtube. https://www.youtube.com/, 2020.Google ScholarGoogle Scholar
  24. Zhihu. https://www.zhihu.com/, 2020.Google ScholarGoogle Scholar
  25. Massimo Bartoletti, Salvatore Carta, Tiziana Cimoli, and Roberto Saia. Dissecting ponzi schemes on ethereum: identification, analysis, and impact. Future Generation Computer Systems, 102:259--277, 2020.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Massimo Bartoletti, Barbara Pes, and Sergio Serusi. Data mining for detecting bitcoin ponzi schemes. In 2018 Crypto Valley Conference on Blockchain Technology (CVCBT), pages 75--84. IEEE, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  27. Shuqing Bian, Zhenpeng Deng, Fei Li, Will Monroe, Peng Shi, Zijun Sun, Wei Wu, Sikuang Wang, William Yang Wang, Arianna Yuan, Tianwei Zhang, and Jiwei Li. Icorating: A deep-learning system for scam ico identification. arXiv preprint arXiv:1803.03670, 2018.Google ScholarGoogle Scholar
  28. Alex Biryukov, Dmitry Khovratovich, and Ivan Pustogarov. Deanonymisation of clients in bitcoin p2p network. In Proceedings of CCS 2014. ACM, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Connor Blenkinsop. Arbitrage trading in crypto, explained. https://cointelegraph.com/explained/arbitrage-trading-in-crypto-explained, 2019.Google ScholarGoogle Scholar
  30. Ting Chen, Yufei Zhang, Zihao Li, Xiapu Luo, Ting Wang, Rong Cao, Xiuzhuo Xiao, and Xiaosong Zhang. Tokenscope: Automatically detecting inconsistent behaviors of cryptocurrency tokens in ethereum. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS '19, page 1503--1520, 2019. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Ting Chen, Yuxiao Zhu, Zihao Li, Jiachi Chen, Xiaoqi Li, Xiapu Luo, Xiaodong Lin, and Xiaosong Zhang. Understanding ethereum via graph analysis. In IEEE International Conference on Computer Communications (INFOCOM), 2018.Google ScholarGoogle ScholarCross RefCross Ref
  32. Weili Chen, Jun Wu, Zibin Zheng, Chuan Chen, and Yuren Zhou. Market manipulation of bitcoin: evidence from mining the mt. gox transaction network. In IEEE INFOCOM 2019-IEEE Conference on Computer Communications, pages 964--972. IEEE, 2019.Google ScholarGoogle ScholarCross RefCross Ref
  33. Weili Chen, YueJin Xu, Zibin Zheng, Yuren Zhou, Jianxun Eileen Yang, and Jing Bian. Detecting" pump & dump schemes" on cryptocurrency market using an improved apriori algorithm. In 2019 IEEE International Conference on Service-Oriented System Engineering (SOSE), pages 293--2935. IEEE, 2019.Google ScholarGoogle ScholarCross RefCross Ref
  34. Weili Chen, Tuo Zhang, Zhiguang Chen, Zibin Zheng, and Yutong Lu. Traveling the token world: A graph analysis of ethereum erc20 token ecosystem. In Proceedings of The Web Conference 2020, pages 1411--1421, 2020. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Weili Chen, Zibin Zheng, Jiahui Cui, Edith Ngai, Peilin Zheng, and Yuren Zhou. Detecting ponzi schemes on ethereum: Towards healthier blockchain technology. In Proceedings of the 2018 World Wide Web Conference, pages 1409--1418, 2018. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Panayiotis Christodoulou and Klitos Christodoulou. A decentralized voting mechanism: Engaging erc-20 token holders in decision-making. In 2020 Seventh International Conference on Software Defined Systems (SDS), pages 160--164. IEEE, 2020.Google ScholarGoogle ScholarCross RefCross Ref
  37. Patrick Schueffel Daniel Liebau. Cryptocurrencies&initial coin offerings: Are they scams? - an empirical study. volume 2, pages 47--55, 2019.Google ScholarGoogle Scholar
  38. Matthias; Welsch Giacomo; Dürr, Alexander; Griebel and Frédéric Thiesse. Predicting fraudulent initial coin offerings using information extracted from whitepapers. the 28th European Conference on Information Systems(ECIS),An Online AIS Conference, June 15--17, 2020.Google ScholarGoogle Scholar
  39. Simon F Dyson, William J Buchanan, and Liam Bell. Scenario-based creation and digital investigation of ethereum erc20 tokens. Forensic Science International: Digital Investigation, 32:200894, 2020.Google ScholarGoogle ScholarCross RefCross Ref
  40. Michael Fleder, Michael S. Kester, and Sudeep Pillai. Bitcoin transaction graph analysis, 02 2015.Google ScholarGoogle Scholar
  41. Neil Gandal, JT Hamrick, Tyler Moore, and Tali Oberman. Price manipulation in the bitcoin ecosystem. Journal of Monetary Economics, 95:86--96, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  42. JT Hamrick, Farhang Rouhi, Arghya Mukherjee, Amir Feder, Neil Gandal, Tyler Moore, and Marie Vasek. The economics of cryptocurrency pump and dump schemes. 2018.Google ScholarGoogle Scholar
  43. JT Hamrick, Farhang Rouhi, Arghya Mukherjee, Amir Feder, Neil Gandal, Tyler Moore, and Marie Vasek. An examination of the cryptocurrency pump and dump ecosystem. Available at SSRN 3303365, 2018.Google ScholarGoogle Scholar
  44. Kevin Helms. Chinese authorities confiscate $15 million in cryptocurrencies, arrest 10 scammers. https://news.bitcoin.com/chinese-authorities-confiscate-15-million-cryptocurrencies/, 2020.Google ScholarGoogle Scholar
  45. Yangyu Hu, Haoyu Wang, Ren He, Li Li, Gareth Tyson, Ignacio Castro, Yao Guo, Lei Wu, and Guoai Xu. Mobile app squatting. In Proceedings of The Web Conference 2020, pages 1727--1738, 2020. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Yuheng Huang, Haoyu Wang, Lei Wu, Gareth Tyson, Xiapu Luo, Run Zhang, Xuanzhe Liu, Gang Huang, and Xuxian Jiang. Understanding (mis)behavior on the eosio blockchain. Proc. ACM Meas. Anal. Comput. Syst., 4(2), June 2020. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Panagiotis Kintis, Najmeh Miramirkhani, Charles Lever, Yizheng Chen, Rosa Romero-Gómez, Nikolaos Pitropakis, Nick Nikiforakis, and Manos Antonakakis. Hiding in plain sight: A longitudinal study of combosquatting abuse. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS '17, page 569--586, 2017. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Mirko Koscina, Mariusz Lombard-Platet, and Pierre Cluchet. Plasticcoin: an erc20 implementation on hyperledger fabric for circular economy and plastic reuse. In IEEE/WIC/ACM International Conference on Web Intelligence-Companion Volume, pages 223--230, 2019. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Dan Liebau and Patrick Schueffel. Crypto-currencies and icos: Are they scams? an empirical study. An Empirical Study (January 23, 2019), 2019.Google ScholarGoogle ScholarCross RefCross Ref
  50. Damiano Di Francesco Maesa, Andrea Marino, and Laura Ricci. An analysis of the bitcoin users graph: inferring unusual behaviours. In International Workshop on Complex Networks and their Applications, 2016.Google ScholarGoogle Scholar
  51. Hartwig Mayer, Ismael Bejarano, Daniel Fernandez, Gustavo Ajzenman, Nicolas Ayala, Nahuel Santoalla, Carlos Sarraute, and Ariel Futoransky. Batpay: a gas efficient protocol for the recurrent micropayment of erc20 tokens. arXiv preprint arXiv:2002.02316, 2020.Google ScholarGoogle Scholar
  52. Rachel McIntosh. Nearly a year after libra's launch, fake libra token scams persist. https://www.financemagnates.com/cryptocurrency/news/nearly-a-year-after-libras-launch-fake-libra-token-scams-persist/, 2020.Google ScholarGoogle Scholar
  53. Adrian Gepp& Kuldeep Kumar Milind Tiwari. The future of raising finance-a new opportunity to commit fraud: a review of initial coin offering(icos) scams. In Crime Law Soc Change 73, pages 417--441. Springer, 2020.Google ScholarGoogle Scholar
  54. Alfredo J Morales, Shahar Somin, Yaniv Altshuler, and Alex'Sandy' Pentland. User behavior and token adoption on erc20. arXiv preprint arXiv:2005.12218, 2020.Google ScholarGoogle Scholar
  55. Masarah Paquet-Clouston, Matteo Romiti, Bernhard Haslhofer, and Thomas Charvat. Spams meet cryptocurrencies: Sextortion in the bitcoin ecosystem. In Proceedings of the 1st ACM Conference on Advances in Financial Technologies (AFT '19), page 76--88, 2019. Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Silivanxay Phetsouvanh, Frédérique Oggier, and Anwitaman Datta. Egret: Extortion graph exploration techniques in the bitcoin network. In IEEE International Conference on Data Mining Workshops (ICDMW), 2018.Google ScholarGoogle ScholarCross RefCross Ref
  57. Ross Phillips and Heidi Wilder. Tracing cryptocurrency scams: Clustering replicated advance-fee and phishing websites. arXiv preprint arXiv:2005.14440, 2020.Google ScholarGoogle Scholar
  58. Reza Rahimian, Shayan Eskandari, and Jeremy Clark. Resolving the multiple withdrawal attack on erc20 tokens. In 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), pages 320--329. IEEE, 2019.Google ScholarGoogle ScholarCross RefCross Ref
  59. Fergal Reid and Martin Harrigan. An analysis of anonymity in the bitcoin system. In 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing. IEEE, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  60. Dorit Ron and Adi Shamir. Quantitative analysis of the full bitcoin transaction graph. In Financial Cryptography (FC), 2013.Google ScholarGoogle ScholarCross RefCross Ref
  61. Christof Ferreira Torres, Mathis Steichen, et al. The art of the scam: Demystifying honeypots in ethereum smart contracts. In 28th $$USENIX$$ Security Symposium ($$USENIX$$ Security 19), pages 1591--1607, 2019. Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. Kentaroh Toyoda, P Takis Mathiopoulos, and Tomoaki Ohtsuki. A novel methodology for hyip operators? bitcoin addresses identification. IEEE Access, 7:74835--74848, 2019.Google ScholarGoogle ScholarCross RefCross Ref
  63. Kentaroh Toyoda, Tomoaki Ohtsuki, and P Takis Mathiopoulos. Identification of high yielding investment programs in bitcoin via transactions pattern analysis. In GLOBECOM 2017--2017 IEEE Global Communications Conference, pages 1--6. IEEE, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  64. Marie Vasek and Tyler Moore. There's no free lunch, even using bitcoin: Tracking the popularity and profits of virtual currency scams. In International conference on financial cryptography and data security, pages 44--61. Springer, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  65. Marie Vasek and Tyler Moore. Analyzing the bitcoin ponzi scheme ecosystem. In International Conference on Financial Cryptography and Data Security, pages 101--112. Springer, 2018.Google ScholarGoogle Scholar
  66. Friedhelm Victor and Bianca Katharina Luders. Measuring ethereum-based erc20 token networks. In International conference on financial cryptography and data security. Springer, 2019.Google ScholarGoogle ScholarCross RefCross Ref
  67. Wikipedia. Airdrop (cryptocurrency). https://en.wikipedia.org/wiki/Airdrop_(cryptocurrency), 2020.Google ScholarGoogle Scholar
  68. Wikipedia. Counterfeit money. https://en.wikipedia.org/wiki/Counterfeit_money, 2020.Google ScholarGoogle Scholar
  69. Jiajing Wu, Qi Yuan, Dan Lin, Wei You, Weili Chen, Chuan Chen, and Zibin Zheng. Who are the phishers? phishing scam detection on ethereum via network embedding. arXiv preprint arXiv:1911.09259, 2019.Google ScholarGoogle Scholar
  70. Pengcheng Xia, Haoyu Wang, Xiapu Luo, Lei Wu, Yajin Zhou, Guangdong Bai, Guoai Xu, Gang Huang, and Xuanzhe Liu. Don't fish in troubled waters! characterizing coronavirus-themed cryptocurrency scams, 2020.Google ScholarGoogle Scholar
  71. Pengcheng Xia, Bowen Zhang, Ru Ji, Bingyu Gao, Lei Wu, Xiapu Luo, Haoyu Wang, and Guoai Xu. Characterizing cryptocurrency exchange scams. arXiv preprint arXiv:2003.07314, 2020.Google ScholarGoogle Scholar
  72. Dirk A Zetzsche, Ross P Buckley, Douglas W Arner, and Linus Föhr. The ico gold rush: It's a scam, it's a bubble, it's a super challenge for regulators. University of Luxembourg Law Working Paper, (11):17--83, 2017.Google ScholarGoogle Scholar
  73. Chen Zhao and Yong Guan. A graph-based investigation of bitcoin transactions. In 11th IFIP International Conference on Digital Forensics (DF), 2015.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Tracking Counterfeit Cryptocurrency End-to-end

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader
        About Cookies On This Site

        We use cookies to ensure that we give you the best experience on our website.

        Learn more

        Got it!