SlideShare a Scribd company logo
1 of 24
Download to read offline
Spams meet Cryptocurrencies
Sextortion in the Bitcoin Ecosystem
MASARAH PAQUET-CLOUSTON, MATTEO ROMITI,
BERNHARD HASLHOFER, TOMÁŠ CHARVÁT
1
Collaboration
Masarah Paquet-Clouston
Researcher at GoSecure & PhD Student in Criminology at SFU
Matteo Romiti
Researcher @ AIT’s / Digital Insight Lab
Bernhard Haslhofer
Senior Scientist @ AIT’s / Digital Insight Lab
Tomáš Charvát
VirusFree
2
What is Sextortion Spam?
I know *** one of your pass word.
I installed a trojan from the adult videos site
I will send your video recording to your contacts
solution should be to compensate me $1000
via Bitcoin (google "how to buy bitcoin" ).
BTC Address: 1GYfPNat1uQzrBBKTzftMtZ5TgzNdNmTL9
[...]
3
FAKE!!
Research Questions
1. How do sextortion spammers operate?
2. Is there a financial relationship among them?
3. Are they more profitable than traditional spam?
4. Where is the money going? Any known entities?
5
Data Pipeline
PRIVATE - PUBLIC - PARTIALLY PUBLIC
INTERNET
BTC SPAM
FILTER
EMAIL
BUCKETING
BUCKETS
MANUAL
CLASSIFICATION
DATA
EXTRACTION
ADDRESS
PASSWORD
AMOUNT
LANGUAGE
…
DATA
ANALYSIS
RESULTS
SEXTORTION
CAMPAIGNSBUCKETS
6
SPAM
NOT
SPAM
NOT
SEXTORTION
How to collect spam emails?
Emails blocked from October 2018 until February 2019 that:
• Included BTC or Bitcoin in singular or plural form
• Were classified as spam by our spam filter
• Originated from an IP address of a botnet
Personally Identifiable Information were masked.
These spam emails never reached end-users
4,360,575 emails
7
How to extract data?
• Not all spam emails are sextortions.
• Sextortion emails follow different structures and
languages.
• How to extract BTC address, language, date, password,
amount asked from each email?
Email bucketing
8
Email Bucketing
4M spam
emails
1,810
buckets
28,282
buckets
groupBy(last_line)
groupBy(similarity(last_line))
filter(sextortion)
96 buckets
(sextortion)
9
Similar
syntax
Can we improve the bucketing?
Manual investigation is needed
35 campaigns
I sent you an email from your account. This means
I have full access to your account. Your
account ([...@....com]) password: [...] I watched
you for months. The fact is that you have been
infected with malicious trojan software via the
porn website you have used.
Hello! You can see, I contact you from your email
and yes I control your account. I’ve been
watching you for a few days now. Indeed, your
computer is infected by a trojan through an adult
site that you visited.
10
Two emails in two different buckets but same campaign
What are these campaigns about?
Some examples:
A. Trojan that can't be detected
B. RDP with a keylogger
C. Sender is an international hacker
D. RAT software installed
E. Specific CVE is mentioned
F. Attacker is from China
11
What about Bitcoin Data?
12,533 BTC addresses from 4M sextortion emails
Only 245 addresses received payments
Multiple-input clustering to expand the dataset (485
sextortion addresses)
3 specific filters to select sextortion payments
13
Remember:
blocked emails!
Using
GraphSense
How to Select Sextortion Payments?
• Collector filter
Removes transactions with one sextortion address in the input and the output
• Range filter
Selects transactions where sextortion addresses receive payments within the
range found in spams
• Moving-money filter
Removes transactions with only one output–known as exact-amount payment
15
Results
16
What is the Pricing Strategy?
17
• Higher prices for:
1. English
2. Slovenian
3. Korean
• Lower prices for:
1. Spanish
2. Italian
3. Portuguese
NO HIGHER PRICES FOR SPAMS WITH
PASSWORDS
Are Passwords Coming From Leaks?
• Created list of cleartext passwords seen only once in the dataset
• Fetched 21 publicly available data breaches
• Randomly selected 25% of the passwords in the list above
• Investigated whether they were contained in one of these breaches
51% of passwords appear in data leaks
19
How are Bitcoin Addresses used?
A1
A2A1
A2
Bucket 1
Bucket 2
Bucket 3
20
Any Financial Connection?
Node = Bucket
Node Color = Campaign
Red Edge = Address in common
Black Edge = Cluster in common
The main component out of 4 sub-graphs
21
What are the Revenues?
1: Collector filter
2: Range filter
3: Money-moving filter
22
Emails Collection
Where is the Money Going?
24
Known exchanges found : Huobi.com, CoinPayments.net, Cubits.com and Luno.com
Discussion
25
Discussion
Spammers are somewhat sophisticated…
(+) Price discrimination based on language
(-) No higher prices with a password
(-) Do not track which campaign is more effective
26
Discussion
Lower-Bound Revenue of
$1,300,620 for an 11-month operation
$122,933 per month
In line with traditional spam (Kanich et al., 2011),
but much more cost-effective
27
What's next?
• Litecoin is now used for sextortion
• Update spam filters
• Many more emails to collect
• Many more tags about real-world entities
30
Want to help?
Paper: http://webee.technion.ac.il/people/ittay/aft19/aft19-final44.pdf
Sextortion addresses github.com/MatteoRomiti/Sextortion_Spam_Bitcoin
Tags github.com/graphsense/graphsense-tagpacks/
GraphSense graphsense.info
Masarah Paquet-Clouston mcpc@gosecure.ca, @masarahclouston
Matteo Romiti matteo.Romiti@ait.ac.at, @MattRomiti
Bernhard Haslhofer bernhard.haslhofer@ait.ac.at, @bhaslhofer
Tomáš Charvát tc@excello.cz
31

More Related Content

Similar to Spams meet cryptocurrencies

Who Uses Crypto Transaction Mixing?
Who Uses Crypto Transaction Mixing?Who Uses Crypto Transaction Mixing?
Who Uses Crypto Transaction Mixing?InvestingTips
 
Gez Daring - Building Online Communities
Gez Daring - Building Online CommunitiesGez Daring - Building Online Communities
Gez Daring - Building Online CommunitiesInBlackandWhite
 
protecting your digital personal life
protecting your digital personal lifeprotecting your digital personal life
protecting your digital personal lifeNathan Lesser
 
Top 5 Cryptocurrency Scam Risk Factors
Top 5 Cryptocurrency Scam Risk FactorsTop 5 Cryptocurrency Scam Risk Factors
Top 5 Cryptocurrency Scam Risk FactorsMaxim Kozlovsky
 
Unearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet FraudUnearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet FraudInternet Law Center
 
2010q1 Threats Report
2010q1 Threats Report2010q1 Threats Report
2010q1 Threats ReportMcafeeCareers
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Shawon Raffi
 
When Blockchain Meets Law: the Birth of Decentralized Justice
When Blockchain Meets Law: the Birth of Decentralized JusticeWhen Blockchain Meets Law: the Birth of Decentralized Justice
When Blockchain Meets Law: the Birth of Decentralized JusticeFederico Ast
 
Thinking Like They Do: An Inside Look At Cybercriminal Operations
Thinking Like They Do: An Inside Look At Cybercriminal OperationsThinking Like They Do: An Inside Look At Cybercriminal Operations
Thinking Like They Do: An Inside Look At Cybercriminal OperationsGianluca Stringhini
 
The Many Faces of Ad Fraud
The Many Faces of Ad FraudThe Many Faces of Ad Fraud
The Many Faces of Ad FraudWhite Ops
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityMuhammad Hamza
 
EvilCohort: Detecting Communities of Malicious Accounts on Online Services
EvilCohort: Detecting Communities of Malicious Accounts on Online ServicesEvilCohort: Detecting Communities of Malicious Accounts on Online Services
EvilCohort: Detecting Communities of Malicious Accounts on Online ServicesGianluca Stringhini
 
The Tricks of the Trade: What Makes Spam Campaigns Successful?
The Tricks of the Trade: What Makes Spam Campaigns Successful?The Tricks of the Trade: What Makes Spam Campaigns Successful?
The Tricks of the Trade: What Makes Spam Campaigns Successful?Gianluca Stringhini
 
What is cryptocurrency everything you need to know - ultimate guide
What is cryptocurrency  everything you need to know - ultimate guideWhat is cryptocurrency  everything you need to know - ultimate guide
What is cryptocurrency everything you need to know - ultimate guidePreparationInfo
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1Abdelfatah hegazy
 
Extended summary of "Into the Deep Web: Understanding E-commerce Fraud from A...
Extended summary of "Into the Deep Web: Understanding E-commerce Fraud from A...Extended summary of "Into the Deep Web: Understanding E-commerce Fraud from A...
Extended summary of "Into the Deep Web: Understanding E-commerce Fraud from A...PierantonioAzzalini
 

Similar to Spams meet cryptocurrencies (20)

Who Uses Crypto Transaction Mixing?
Who Uses Crypto Transaction Mixing?Who Uses Crypto Transaction Mixing?
Who Uses Crypto Transaction Mixing?
 
Gez Daring - Building Online Communities
Gez Daring - Building Online CommunitiesGez Daring - Building Online Communities
Gez Daring - Building Online Communities
 
Botnets 101
Botnets 101Botnets 101
Botnets 101
 
protecting your digital personal life
protecting your digital personal lifeprotecting your digital personal life
protecting your digital personal life
 
Top 5 Cryptocurrency Scam Risk Factors
Top 5 Cryptocurrency Scam Risk FactorsTop 5 Cryptocurrency Scam Risk Factors
Top 5 Cryptocurrency Scam Risk Factors
 
Unearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet FraudUnearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet Fraud
 
2010q1 Threats Report
2010q1 Threats Report2010q1 Threats Report
2010q1 Threats Report
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
When Blockchain Meets Law: the Birth of Decentralized Justice
When Blockchain Meets Law: the Birth of Decentralized JusticeWhen Blockchain Meets Law: the Birth of Decentralized Justice
When Blockchain Meets Law: the Birth of Decentralized Justice
 
Thinking Like They Do: An Inside Look At Cybercriminal Operations
Thinking Like They Do: An Inside Look At Cybercriminal OperationsThinking Like They Do: An Inside Look At Cybercriminal Operations
Thinking Like They Do: An Inside Look At Cybercriminal Operations
 
Cryptocurrency
CryptocurrencyCryptocurrency
Cryptocurrency
 
The Many Faces of Ad Fraud
The Many Faces of Ad FraudThe Many Faces of Ad Fraud
The Many Faces of Ad Fraud
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
EvilCohort: Detecting Communities of Malicious Accounts on Online Services
EvilCohort: Detecting Communities of Malicious Accounts on Online ServicesEvilCohort: Detecting Communities of Malicious Accounts on Online Services
EvilCohort: Detecting Communities of Malicious Accounts on Online Services
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
The Tricks of the Trade: What Makes Spam Campaigns Successful?
The Tricks of the Trade: What Makes Spam Campaigns Successful?The Tricks of the Trade: What Makes Spam Campaigns Successful?
The Tricks of the Trade: What Makes Spam Campaigns Successful?
 
What is cryptocurrency everything you need to know - ultimate guide
What is cryptocurrency  everything you need to know - ultimate guideWhat is cryptocurrency  everything you need to know - ultimate guide
What is cryptocurrency everything you need to know - ultimate guide
 
Stop Scam
Stop ScamStop Scam
Stop Scam
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
Extended summary of "Into the Deep Web: Understanding E-commerce Fraud from A...
Extended summary of "Into the Deep Web: Understanding E-commerce Fraud from A...Extended summary of "Into the Deep Web: Understanding E-commerce Fraud from A...
Extended summary of "Into the Deep Web: Understanding E-commerce Fraud from A...
 

Recently uploaded

Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz1
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxStephen266013
 
(ISHITA) Call Girls Service Hyderabad Call Now 8617697112 Hyderabad Escorts
(ISHITA) Call Girls Service Hyderabad Call Now 8617697112 Hyderabad Escorts(ISHITA) Call Girls Service Hyderabad Call Now 8617697112 Hyderabad Escorts
(ISHITA) Call Girls Service Hyderabad Call Now 8617697112 Hyderabad EscortsCall girls in Ahmedabad High profile
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusTimothy Spann
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfLars Albertsson
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998YohFuh
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxolyaivanovalion
 
Call Girls In Mahipalpur O9654467111 Escorts Service
Call Girls In Mahipalpur O9654467111  Escorts ServiceCall Girls In Mahipalpur O9654467111  Escorts Service
Call Girls In Mahipalpur O9654467111 Escorts ServiceSapana Sha
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystSamantha Rae Coolbeth
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsappssapnasaifi408
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxolyaivanovalion
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxolyaivanovalion
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxolyaivanovalion
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxolyaivanovalion
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfMarinCaroMartnezBerg
 

Recently uploaded (20)

Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docx
 
(ISHITA) Call Girls Service Hyderabad Call Now 8617697112 Hyderabad Escorts
(ISHITA) Call Girls Service Hyderabad Call Now 8617697112 Hyderabad Escorts(ISHITA) Call Girls Service Hyderabad Call Now 8617697112 Hyderabad Escorts
(ISHITA) Call Girls Service Hyderabad Call Now 8617697112 Hyderabad Escorts
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and Milvus
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdf
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptx
 
Call Girls In Mahipalpur O9654467111 Escorts Service
Call Girls In Mahipalpur O9654467111  Escorts ServiceCall Girls In Mahipalpur O9654467111  Escorts Service
Call Girls In Mahipalpur O9654467111 Escorts Service
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data Analyst
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptx
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptx
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptx
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 

Spams meet cryptocurrencies

  • 1. Spams meet Cryptocurrencies Sextortion in the Bitcoin Ecosystem MASARAH PAQUET-CLOUSTON, MATTEO ROMITI, BERNHARD HASLHOFER, TOMÁŠ CHARVÁT 1
  • 2. Collaboration Masarah Paquet-Clouston Researcher at GoSecure & PhD Student in Criminology at SFU Matteo Romiti Researcher @ AIT’s / Digital Insight Lab Bernhard Haslhofer Senior Scientist @ AIT’s / Digital Insight Lab Tomáš Charvát VirusFree 2
  • 3. What is Sextortion Spam? I know *** one of your pass word. I installed a trojan from the adult videos site I will send your video recording to your contacts solution should be to compensate me $1000 via Bitcoin (google "how to buy bitcoin" ). BTC Address: 1GYfPNat1uQzrBBKTzftMtZ5TgzNdNmTL9 [...] 3 FAKE!!
  • 4. Research Questions 1. How do sextortion spammers operate? 2. Is there a financial relationship among them? 3. Are they more profitable than traditional spam? 4. Where is the money going? Any known entities? 5
  • 5. Data Pipeline PRIVATE - PUBLIC - PARTIALLY PUBLIC INTERNET BTC SPAM FILTER EMAIL BUCKETING BUCKETS MANUAL CLASSIFICATION DATA EXTRACTION ADDRESS PASSWORD AMOUNT LANGUAGE … DATA ANALYSIS RESULTS SEXTORTION CAMPAIGNSBUCKETS 6 SPAM NOT SPAM NOT SEXTORTION
  • 6. How to collect spam emails? Emails blocked from October 2018 until February 2019 that: • Included BTC or Bitcoin in singular or plural form • Were classified as spam by our spam filter • Originated from an IP address of a botnet Personally Identifiable Information were masked. These spam emails never reached end-users 4,360,575 emails 7
  • 7. How to extract data? • Not all spam emails are sextortions. • Sextortion emails follow different structures and languages. • How to extract BTC address, language, date, password, amount asked from each email? Email bucketing 8
  • 9. Can we improve the bucketing? Manual investigation is needed 35 campaigns I sent you an email from your account. This means I have full access to your account. Your account ([...@....com]) password: [...] I watched you for months. The fact is that you have been infected with malicious trojan software via the porn website you have used. Hello! You can see, I contact you from your email and yes I control your account. I’ve been watching you for a few days now. Indeed, your computer is infected by a trojan through an adult site that you visited. 10 Two emails in two different buckets but same campaign
  • 10. What are these campaigns about? Some examples: A. Trojan that can't be detected B. RDP with a keylogger C. Sender is an international hacker D. RAT software installed E. Specific CVE is mentioned F. Attacker is from China 11
  • 11. What about Bitcoin Data? 12,533 BTC addresses from 4M sextortion emails Only 245 addresses received payments Multiple-input clustering to expand the dataset (485 sextortion addresses) 3 specific filters to select sextortion payments 13 Remember: blocked emails! Using GraphSense
  • 12. How to Select Sextortion Payments? • Collector filter Removes transactions with one sextortion address in the input and the output • Range filter Selects transactions where sextortion addresses receive payments within the range found in spams • Moving-money filter Removes transactions with only one output–known as exact-amount payment 15
  • 14. What is the Pricing Strategy? 17 • Higher prices for: 1. English 2. Slovenian 3. Korean • Lower prices for: 1. Spanish 2. Italian 3. Portuguese NO HIGHER PRICES FOR SPAMS WITH PASSWORDS
  • 15. Are Passwords Coming From Leaks? • Created list of cleartext passwords seen only once in the dataset • Fetched 21 publicly available data breaches • Randomly selected 25% of the passwords in the list above • Investigated whether they were contained in one of these breaches 51% of passwords appear in data leaks 19
  • 16. How are Bitcoin Addresses used? A1 A2A1 A2 Bucket 1 Bucket 2 Bucket 3 20
  • 17. Any Financial Connection? Node = Bucket Node Color = Campaign Red Edge = Address in common Black Edge = Cluster in common The main component out of 4 sub-graphs 21
  • 18. What are the Revenues? 1: Collector filter 2: Range filter 3: Money-moving filter 22 Emails Collection
  • 19. Where is the Money Going? 24 Known exchanges found : Huobi.com, CoinPayments.net, Cubits.com and Luno.com
  • 21. Discussion Spammers are somewhat sophisticated… (+) Price discrimination based on language (-) No higher prices with a password (-) Do not track which campaign is more effective 26
  • 22. Discussion Lower-Bound Revenue of $1,300,620 for an 11-month operation $122,933 per month In line with traditional spam (Kanich et al., 2011), but much more cost-effective 27
  • 23. What's next? • Litecoin is now used for sextortion • Update spam filters • Many more emails to collect • Many more tags about real-world entities 30
  • 24. Want to help? Paper: http://webee.technion.ac.il/people/ittay/aft19/aft19-final44.pdf Sextortion addresses github.com/MatteoRomiti/Sextortion_Spam_Bitcoin Tags github.com/graphsense/graphsense-tagpacks/ GraphSense graphsense.info Masarah Paquet-Clouston mcpc@gosecure.ca, @masarahclouston Matteo Romiti matteo.Romiti@ait.ac.at, @MattRomiti Bernhard Haslhofer bernhard.haslhofer@ait.ac.at, @bhaslhofer Tomáš Charvát tc@excello.cz 31