Bitcoin Forensics and its Practice with case Study


Bitcoin Forensics
1.     Crimes associated with Bitcoins
Present century is encircled by the technological revolution and various new inventions are taking place with the rapid pace. A lot of money is flowing in areas of Artificial Intelligence and FinTech industry as a result of great start-up revolution.In last few years, countless users across the globe were attacked by ransomwares and malicious programmes which have capability to encrypt their systems and demanded ransom in terms of Bitcoins to decrypt the locked systems. The crypto criminals received thousands of cryptocurrencies - mostly Bitcoins and fiat currency.
Online transactions revels digital footprints. Any digital banking transaction activity can be tracked by banks, security agencies or central authorities. Due to such reasons new decentralized transaction technology evolved. In this technology each transaction can be identified but sender and receivers of that amount are remaining anonymous. Due to such anonymity and decentralization – no regulatory authority.
Bitcoin is one type of cryptocurrency which is widely used by the users foreasy and anonymous transactions. And due to its anonymity it ispopular among crypto criminals.
Bitcoins is evolved as blockchain based virtual currency, but afterwards due to its anonymity nature crypto criminals used it for illegal purpose. There are various crimes committed over darkweb and even in Ransomware as a Service.
Here we discuss on types of crimes involving Bitcoins as a payment means for getting illegal goods and services.

1.1          Using bitcoins over Darkweb for illegal purchase.
The darkweb - a wide collection of anonymous networks, from tiny peer-to-peer networks to large wide area IP switched anonymous networks. Few popular networks like Freenet, I2P and Tor which is operated by public agencies and individual users. Some of the hidden services over dark web is:
·         Piracy
·         Ransomware as a Service
·         Drugs
·         Illegal Documents like passports, visa etc.
·         FinTech Fraud&Gambling
·         Hacking
·         Anonyms Hosting
·         Whistleblower
·         Human Trafficking
·         Weapons and ammunition
There are few Darkweb sites accepting Bitcoin as a payment and few seized by security agencies. Data are sourced from www.gwern.net.
Table 1 : Darknet sites accepting bitcoin, current and past
Market
Launch date
End date
Closure reason
Dream
November 15, 2013
Operational

Outlaw
December 29, 2013
May 16, 2017
Hacked
Silk Road 1
January 31, 2011
October 2, 2013
Raided
Black Market Reloaded
June 30, 2011
December 2, 2013
Hacked
AlphaBay
December 22, 2014
July 4, 2017
Raided
Tochka
January 30, 2015
Operational

Crypto Market / Diabolus
February 14, 2015
Operational

Real Deal
April 9, 2015
Operational

Darknet Heroes
May 27, 2015
Operational

Agora
December 3, 2013
September 6, 2015
Voluntary
Nucleus
October 24, 2014
April 13, 2016
Scam
Middle Earth
June 22, 2014
November 4, 2015
Scam
BlackBank
February 5, 2014
May 18, 2015
Scam
Evolution
January 14, 2014
March 14, 2015
Scam
Silk Road Reloaded
January 13, 2015
February 27, 2016
Unknown
Anarchia
May 7, 2015
May 9, 2016
Unknown
Silk Road 2
November 6, 2013
November 5, 2014
Raided
The Marketplace
November 28, 2013
November 9, 2014
Voluntary
Blue Sky Market
December 3, 2013
November 5, 2014
Raided
Abraxas
December 13, 2014
November 5, 2015
Scam
Pandora
October 21, 2013
August 19, 2014
Scam
BuyItNow
April 30, 2013
February 17, 2014
Voluntary
TorBazaar
January 26, 2014
November 5, 2014
Raided
Sheep
February 28, 2013
November 29, 2013
Scam
Cloud-Nine
February 11, 2014
November 5, 2014
Raided
Pirate Market
November 29, 2013
August 15, 2014
Scam
East India Company
April 28, 2015
January 1, 2016
Scam
Mr Nice Guy 2
February 21, 2015
October 14, 2015
Scam
Andromeda
April 5, 2014
November 18, 2014
Scam
Topix 2
March 25, 2014
November 5, 2014
Voluntary

2       Frauds related to crypto currencies and case study
Crypto currencies are widely used due to its anonymity nature and decentralized mechanism. Initially these currencies are used by the dark net markets for purchasing the goods or services anonymously. After that few dark web markets used crypto currencies for illegal transactions. The biggest hike in these currencies was happen after it used in trading and money laundering. Frauds related to such currencies like phishing, hacking, fake ICOs, fake exchanges, hard cash to digital currency conversations, ponzi schemes, multilevel marketing or pyramid schemes etc.  Now a day’s digital currencies i.e. crypto currency is being demanded as ransom.Bitcoin also asked from victims, when their computer systemsinfected viaRansomware or malware.
Law enforcement agenciesare concerned in investigating those virtual currencies which can be used for illegal transactions, human and drug trafficking. Crypto criminals use bitcoin like crypto currency because of its anonymity. Victimsor sometimes culprits can easily setup or open a digital wallet to transact bitcoin without furnishing identity of user. There is no any central authority like bank or government, to regulate or collectuser related information.
There are common crypto currencies frauds tactics are as under
2.1 Hacking and Phishing
This is one of the common and old tricks used by crypto criminals. Fraudulent email is sent from authenticemail id, faking users to go through or click on a malicious but look alike genuineURL or sometimes send review forms and ask users to fill the form in details. These URLs usually contain malware that infect or drop malicious agents like spywares or key loggers to systems. After thencrypto criminals can clone the victim’s data, stealing other important information related to wallets etc.
Case Study: Many investors of crypto currencies approached the law enforcement agencies or government authorities after they lost hard cash earned money invested in fake bitcoin wallets, schemes. One of the lady from India lost Rs35 lakh to crooks who promised to help retrieve the earlier amount.


2.2 Fake apps and social media accounts: 
Fake apps over app stores in popular smart devices, after installing it, sometimes spread malwares and also install add-on for mining the crypto currencies through devices. In some cases, fake websites and social network handles are used to cheatinnocent people. Few social chat apps also created the groups and attract innocent users to buy or sell Bitcoins and take advantage of users.
Case Study: Few crypto currency exchangers, received messages asking them to deposit a certain amount of money as part of a survey in exchange for bitcoins. These messages were sent out from a Twitter handle that looked very similar to cryptocurrency exchange’s actual account. Local law enforcement agency caught one Telegram account for Bitcoin investors in India, few of members’ advice investors to invest into their own ICOs and once investor invest money they closed Telegram group. Few of the scams are listed by https://deadcoins.com/.   

2.3 Ponzi schemes: 
In such crime, Multi Level Marketing or fraudulent ICO is used. Crypto Criminals impress the investors by showing them golden future of huge return in small investment. Almost investor fall into pray of this kind of ponzi scheme and also fetch innocent relatives or other investor to be a part of such fraudulent schemes and became victim. 
Case Study: In the case of GainBitcoin, culprit had promised investors a 10% monthly return on cryptocurrency investments for 18 months under multi-level marketing (MLM) schemes such as the Bitcoin Growth Fund.
In another case, investors in OneCoin, another company that launched a digital coin-led investment scheme, realised that the firm didn’t even have a registered office address or a bank account. Nearly 400 people were taken in by the promise of high returns.

2.4          Fake Exchanges , Wallets:
Fake Exchanges and wallets might look like genuine exchange, but they’re operated by the crypto criminals. They market fake exchanges and wallets massively over social networks. They also gave juicy schemes to attract victims, even offering “bonuses” to investors who deposit huge investment. Once they got the enough investment they closed or discontinue the exchange or wallet. This kind of exchanges and wallets are not associated or registered.In some cases they have investors hard earned moneyand these fake exchanges or wallets may charge incredibly high service fees and make victim investor difficult to withdraw amount or sometime steal their investment altogether.
Case Study: Plenty fake exchanges and digital wallets were uncovered by the Bitcoin community and financial authorities across the globe. One of the fake exchanges was BitKRX, named after Korea Exchange (KRX), the largest financial trading platform in South Korea established by KOSDAQ, South Korea Futures Exchange and South Korea Stock Exchange.The BitKRX exchange marketed itself as a branch of KRX, coaxing users into its platform by promoting its businesses as a regulated and legitimate venture led created by KRX.
(Source: https://cointelegraph.com/news/south-korean-government-concerned-with-scams-in-bitcoin-market-fake-exchanges)

2.5               Exchanges under attack: 
Hackers primary targets ‘Bitcoin Exchange Online services’ that store the private keys forusers or investors. Hackers dumping the database of all acquired private keys and gain the control of the exchange data of bitcoins addresses. Hacker get and use acquired bitcoins wherever they want to use. Hackers illegally acquireshuge amount of dollars in bitcoin by using mobile numbers &email addresses.

Fraudulent marketing through social media (Source: Quora)
Case Study: In this yearIndia based cryptocurrency exchange, was hacked and hacker acquired around 438 bitcoins worth 1.8 million dollars. The firm named an employee in a first information report filed later that month, while promising to refund money to its investors in due time. It’s the first time that an exchange came under attack in India. (Source: Times of India)

3.Checklist to safeguard from crypto currency frauds:
Few common checklist for avoiding crypto currency scam is mentioned here (Source: https://www.finder.com/bitcoin-scams)
·        Does the website connect securely over https (not http)? If the address starts with “http” instead of “https,” the data you send to the website is not secure.

·        Can you see the word “Secure” or an image of a padlock in your web browser’s address bar? This indicates that a website is secure.

·        Does the website’s URL have any noticeable spelling mistakes or errors? If so, it could be a fake.

·        Does the site feature bad grammar, awkward phrasing or spelling mistakes? If it does, this doesn’t necessarily indicate a scam, but it does mean you should proceed with caution.

·        Does the website promise abnormally high returns? (For example, does it claim you’ll be able to double your investment?) This should raise a big red flag and is a common indicator of a scam.

·        Is there an “About us” page? Does it show the real people behind the company? Does it provide any details about where the company is registered? If there’s little or no information about who the company is and what it does, you could be dealing with a scam.

·        Do legitimate, reputable websites link to this site? This could indicate that the site is trusted and respected.

·        What do other users say about the website? Are there any negative reviews and, if so, what do they say? The crypto community is usually pretty quick to spread the word about scams.

·        Who is the registered owner of a domain or website? Is the owner hidden behind private registration? Has the domain been registered for less than six months? (You can find this information by searching for the platform’s URL registration details on a site like WHOis.net). The more information you can find about the people/company behind a website, the better.

·        Is there anything else about the website that raises red flags or just seems too good to be true?

4. Bitcoin transaction tracking using blockchain
Bitcoin and other alternative coins can be tracked using one of the several blockchain explorers. It is important to remember that each coin has its own individual blockchain. The following figure shows the recent blocks which have been mined by various cryptocurrency miners, the time and the number of transactions in a particular block that have been mined. All the successive blocks are linked with their preceding blocks which ensures that fake transactions can not be inserted into the block chain.

If the metadata of one of the block : #551843 is looked upon the following details are obtained as shown in figure. The block consists of 1873 transactions totalling to 12.5 bitcoins.


Mined blocks containseveral information regarding the transactions which have been included in those blocks. Information such as a unique transaction ID, transaction time, sender wallet address, receiver wallet address, miner wallet address and amount such as sent, received and miner fees. The same have been depicted in the following figure.

Anonymity in bitcoin:
The following figure shows that several senders have combined a perticular bitcoin value which has been sent to a single wallet address. The bitcoin network achieves anonymity regarding the sender if such protocol is used.

Bitcoin Wallet:
A bit coin wallet is represented by a hexadecimal string of 34 characters. The wallet is accessible through its own and unique wallet key which is of 256 bit in length and consist of 64 characters. It is impossible to derive the key from the wallet address as it will required enormous amount of processing power and may take hundreds of years to unlock a single wallet. Attacks such as brute force using rainbow tables are possible but due to the wallet key size, it becomes infeasible and intangible to deploy the required processing power.

Bitcoin transaction tracking:
To achieve anonymity, the bitcoin network employs several techniques. It is possible to analyze the sender and the receiver of the coins by analysis of the complete block chain. There are a limited number of intermediate transactions between the sender and the receiver due to the payment of fees which is required for each transaction irrespective of the amount of bitcoin transferred. The following figure shows some of the large transfers which have been made in a single transaction between a set of senders and receivers.

The following figure depicts the ongoing transactions within a specific political geographic boundary (India). Each transaction can be further followed as all the transactions between the senders and the receivers are public and are available from the blockchain. This tracking of transactions within a geographic boundary is limited by the privacy of the miners, sender and receivers and may not be available in all the cases.
Intermediary transactions which are used to impede the tracking of senders and receivers have been depicted in the following figure. The figure also shows that the sender makes one transaction to himself using an intermediary transaction. As every transaction costs a miner fee, it restricts employing such intermediary transactions for small amounts to be transfers.

As the IP addresses of the miners are available to the mining pools and it is upon their discretion to keep them secure or hidden. There are several mining pools which allows public access to the IP address of the miners using intermediary subsidiaries which provide blockchain analysis and tracking tools.One such example has been depicted in the following figure.

Case Study of investigation of illegal mining through Company’s resources:
Mr. X, working at professional firm, which is associated with high performance computing systems. Mr. X knows very well that mining through company’s resources can be given good amount of bitcoins in his wallet. He is started on miner application on his home laptop and using high performance server IP he created one admin account. He is regularly mining the bitcoin and adds inside his wallet, after a month few indications were noticed by the information security unit, but they cannot identify the person. Mr. X already left the company within that month. After conducting digital investigation of disks and network logs they identified one blockchain link with transaction address. After reversing the transaction address and finding common bitcoin address they identified the actual amount and exchange details. Afterwards company lodged a police complaint. Police investigated the case and found few information through getting information from exchange and wallet provider.  
          Maltego is providing community level free tool for identifying and visualizing such transaction. Following figure depicts the transaction details.
 
Tracking the other transactions using blockchain visualization, as shown in figure.


Comments

Popular posts from this blog

Introduction To Big Data Forensics

CYBER SECURITY: Improving Cyber Defense Through Coherent Joint Red Team and Blue Team

Digital Forensics: Investigation VS Security