Skip to main content

Do Dark Web and Cryptocurrencies Empower Cybercriminals?

  • Conference paper
  • First Online:
Digital Forensics and Cyber Crime (ICDF2C 2021)

Abstract

The dark web is often associated with criminal activities such as the sale of exploit kits using cryptocurrencies as payment. However, the difficulty in determining the identities of dark website owners and the tracing of the associated transactions compounds the challenges of investigating dark web activities. In this study, we explore how cryptocurrencies have been involved in cybercriminal activities on the dark web and the factors that drive cryptocurrency investments. Then, we present several recommendations and guidelines for prospective investors to help identify determinant factors for assessing investment risks in the cryptocurrency marketplace. We also present several potential research opportunities in cryptocurrency.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Darkmarket: World’s largest illegal dark web marketplace taken down (2021). https://www.europol.europa.eu/

  2. Cascavilla, G., Tamburri, D.A., Van Den Heuvel, W.-J.: Cybercrime threat intelligence: a systematic multi-vocal literature review. Comput. Secur. 105, 102258 (2021)

    Article  Google Scholar 

  3. Dargahi, T., et al.: A cyber-kill-chain based taxonomy of crypto-ransomware features. J. Comput. Virol. Hacking Tech. 15(4), 277–305 (2019). https://doi.org/10.1007/s11416-019-00338-7

    Article  Google Scholar 

  4. Fröwis, M., et al.: Safeguarding the evidential value of forensic cryptocurrency investigations. Forensic Sci. Int. Digit. Invest. 33, 200902 (2020)

    Article  Google Scholar 

  5. Vesely, V., Zadnk, M.: How to detect cryptocurrency miners? By traffic forensics! Digit. Invest. 31, 100884 (2019)

    Article  Google Scholar 

  6. Tziakouris, G.: Cryptocurrencies-a forensic challenge or opportunity for law enforcement? An interpol perspective. IEEE Secur. Priv. 16(4), 92–94 (2018)

    Article  Google Scholar 

  7. Volety, T., et al.: Cracking bitcoin wallets: I want what you have in the wallets. Future Gener. Comput. Syst. 91, 136–143 (2019)

    Article  Google Scholar 

  8. Dalins, J., Wilson, C., Carman, M.: Criminal motivation on the dark web: a categorisation model for law enforcement. Digit. Invest. 24, 62–71 (2018)

    Article  Google Scholar 

  9. Zhou, G., et al.: A market in dream: the rapid development of anonymous cybercrime. Mob. Netw. Appl. 25(1), 259–270 (2020). https://doi.org/10.1007/s11036-019-01440-2

    Article  Google Scholar 

  10. Conti, M., et al.: A survey on security and privacy issues of bitcoin. IEEE Commun. Surv. Tutor. 20(4), 3416–3452 (2018)

    Article  Google Scholar 

  11. The State of Ransomware (2021). https://secure2.sophos.com/

  12. Feng, W., Wang, Y., Zhang, Z.: Can cryptocurrencies be a safe haven: a tail risk perspective analysis. Appl. Econ. 50(44), 4745–4762 (2018)

    Article  Google Scholar 

  13. Crypto-Ransomware Attacks: The New Form of Kidnapping (2015). https://blog.trendmicro.com/crypto-ransomware-attacks-the-new-form-of-kidnapping/

  14. Annual number of ransomware attacks worldwide from 2016 to 2020 (2021). https://www.statista.com/statistics/494947/ransomware-attacks-per-year-worldwide/

  15. The most active crypto-ransomware families (2021). https://securelist.com/ransomware-by-the-numbers-reassessing-the-threats-global- impact/101965/

  16. ElBahrawy, A., et al.: Collective dynamics of dark web marketplaces. Sci. Rep. 10(1), 1–8 (2020)

    Article  Google Scholar 

  17. International Fire arms trade on the dark web (2021). https://www.rand.org/randeurope/research/projects/international-arms- trade-on-the-hidden-web.html

  18. da Cunha, B.R., et al.: Assessing police topological efficiency in a major sting operation on the dark web. Sci. Rep. 10(1), 1–10 (2020)

    Article  Google Scholar 

  19. How a bitcoin whitehat hacker helped the FBI catch a murderer (2021). https://bitcoinmagazine.com/

  20. Kaur, S., Randhawa, S.: Dark web: a web of crimes. Wireless Pers. Commun. 112(4), 2131–2158 (2020). https://doi.org/10.1007/s11277-020-07143-2

    Article  Google Scholar 

  21. Beating Human Trafficking on the Dark Web (2021). https://cobwebs.com/beating-human-trafficking-on-the-dark%20web/

  22. Online Trade NULLED (2020). https://allwpworld.com/

  23. The Top 5 Dark Web Forums (2021). https://webhose.io/blog/dark%20web/the-top-5-dark%20web-forums/

  24. Yen, K.-C., Cheng, H.-P.: Economic policy uncertainty and cryptocurrency volatility. Finance Res. Lett. 38, 101428 (2021)

    Article  Google Scholar 

  25. Morton, D.T.: The future of cryptocurrency: an unregulated instrument in an increasingly regulated global economy. Loy. U. Chi. Int’l L. Rev. 16, 129 (2020)

    Google Scholar 

  26. Olsen, R.A.: Investment risk: the experts’ perspective. Financ. Anal. J. 53(2), 62–66 (1997)

    Article  Google Scholar 

  27. Lost Passwords Lock Millionaires Out of Their Bitcoin Fortune (2021). https://www.nytimes.com/2021/01/12/technology/

  28. Gronwald, M.: How explosive are cryptocurrency prices? Finance Res. Lett. 38, 101603 (2021)

    Article  Google Scholar 

  29. Liu, Y., Tsyvinski, A., Wu, X.: Common risk factors in cryptocurrency. Technical report, National Bureau of Economic Research (2019)

    Google Scholar 

  30. Kyle, A.S.: Continuous auctions and insider trading. Econometrica J. Econometric Soc. 53(6), 1315–1335 (1985)

    Article  Google Scholar 

  31. Bouchaud, J.P.: Price Impact. Encyclopedia of Quantitative Finance (2010)

    Google Scholar 

  32. Huberman, G., Stanzl, W.: Price manipulation and quasi-arbitrage. Econometrica 72(4), 1247–1275 (2004)

    Article  MathSciNet  Google Scholar 

  33. Rubinstein, M.: Markowitz’s “portfolio selection’’: a fifty-year retrospective. J. Finance 57(3), 1041–1045 (2002)

    Article  Google Scholar 

  34. Heston, S.L., Rouwenhorst, K.G.: Does industrial structure explain the benefits of international diversification? J. Financ. Econ. 36(1), 3–27 (1994)

    Article  Google Scholar 

  35. Bitcoin Inc.: Information (2021). https://bitcoin.inc/

  36. Monero Inc.: Information (2021). https://www.getmonero.org/

  37. Tether Limited. Information (2021). https://tether.to/

  38. Attorney General James Ends Virtual Currency Trading Platform Bitfinex’s Illegal Activities in New York (Bitfinex and Tether) (2021). https://ag.ny.gov/

  39. Ripple Labs Inc.: Information (2021). https://ripple.com/

  40. U.S. S.E.C. or EDGAR System (2021). https://sec.report/CIK/0001685012

  41. Tether LTD legal supports (2021). https://tether.to/legal/

  42. The global crypto market cap, a trustworthy platform for showing the price updates of cryptoassets (2021). https://coinmarketcap.com/

  43. Omane-Adjepong, M., Alagidede, I.P.: Multiresolution analysis and spillovers of major cryptocurrency markets. Res. Int. Bus. Finance 49, 191–206 (2019)

    Article  Google Scholar 

  44. Ethereum Inc.: Information (2021). https://ethereum.org/en/about/

  45. U.S. Department of Justice, Attorney General’s report (2020). https://www.justice.gov/archives/ag/page/file/1326061/download

  46. Hackers Have Stolen \$400 Million From ICOs (2017). https://fortune.com/2018/01/22/ico-2018-coin-bitcoin-hack/

  47. Security 101: The Impact of Cryptocurrency-Mining Malware (2017). https://www.trendmicro.com/

  48. Coinminers target vulnerable users as Bitcoin hits all-time high (2021). https://www.avira.com/en/

  49. Helping police worldwide understand and investigate digital crimes, Interpol Police (2021). https://www.interpol.int/en/How-we-work/Innovation/Darknet-and-Cryptocurrencies

  50. Cryptocurrency Crime and Anti-Money Laundering Report (2021). https://ciphertrace.com/

  51. crypto-criminals stole \$1.9B (2020). https://www.finaria.it/

  52. Bitcoins, Blockchains, and Botnets (2021). https://blogs.akamai.com/

  53. Systematic Approach to Analyzing Security and Vulnerabilities of Blockchain Systems, MIT Working Paper (2021). https://web.mit.edu/smadnick/www/wp/2019-05.pdf

Download references

Acknowledgment

This work was supported in part by the National Natural Science Fund of China (NSFC) research fund for International Young Scientists (Reference No. 6211101164).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Milad Taleby Ahvanooey or Mark Xuefang Zhu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Taleby Ahvanooey, M., Zhu, M.X., Mazurczyk, W., Kilger, M., Choo, KK.R. (2022). Do Dark Web and Cryptocurrencies Empower Cybercriminals?. In: Gladyshev, P., Goel, S., James, J., Markowsky, G., Johnson, D. (eds) Digital Forensics and Cyber Crime. ICDF2C 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 441. Springer, Cham. https://doi.org/10.1007/978-3-031-06365-7_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-06365-7_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-06364-0

  • Online ISBN: 978-3-031-06365-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics