LECTURE 11 Blockchain Forensics Notes

Blockchain Technology in the Context of Cryptocurrency

  • Blockchain relies on Distributed Ledger Technology (DLT).

  • DLT records transactions, these transactions are validated by a 'consensus pool' or committee of nodes

  • Once a threshold of nodes agree, the transaction is committed to a block.

Distributed Ledgers

  • DLT depends on an immutable (unchangeable) series (chain) of blocks.

  • Blocks represents a log of transactions.

  • Immutability (unchangeable or unable to be altered) is crucial feature of DLT

  • The large number of independent participants make the creation of blocks a trustless process. (no single entity is in authority/just trust in the system)

  • Every participating Full nodes keeps a copy of the ledger.

    Cryptocurrency

  • Not all blockchains impliment cyptocurrencies

  • Cryptocurrencies can be exchanged for fiat currency.

  • Their value can be unperdictable

  • Short-term stability allows money movement while retaining value, decoupled from banks, but lacks on-chain oversight.

Cyber Criminal Uses of Blockchain

'Rug Pull' scams

A rug pull is a type of cryptocurrency scam where the developers of a crypto project — often a new token, NFT collection, or DeFi platform — suddenly abandon the project and run away with investors’ funds, leaving the token worthless.

  • 'Rug Pull' scams involves

    (1) dumping: only limited supply is sold to victims; scammers hold the

    majority and dump once a target price is reached

    (2) liquidity pulls on decentralized exchanges (Dexes). Tokens are listed

    on a dex, paired with a currency such as Ethereum. Scammers steal ‘legitimate’ currency from liquidity pools.

    A less common scam is to Sell order limits

  • This involve coding restrictions into the blockchain/token contracts to limit sell off for victims.

  • Both types of scam rely on Hype and social media interaction

Ransomware

  • Ransomware uses cryptocurrency (Bitcoin) for ransom payments.

  • Bitcoin's transparency risks attacker identification SO criminals mitigate this by using “tumblers” and other money laundering methods

Limits of Anonymity in Cypto

  • Wallet addresses are unique but not explicitly linked to real-world identities.

  • Ransomware MUST share addresses for payment collection.

  • Scammers use social media, sometimes sharing addresses.

  • Cyptocurrency Exchanges increasingly require identity information and a linked bank account.

    Important Forensic Features

  • Transparency: Most blockchain projects don't obfuscate transactions; wallet addresses are unique identifiers.

  • Immutability: ‘Minted’ blocks cannot be changed; minting fake blocks requires control of a majority of nodes.

  • Ease of obtaining records

  • Non-fungibility: Transactions are linked to sender and receiver.

OSINT-based Forensic Techniques for Blockchains

: Challenges

1. We must identify the flow of money through one or more distributed ledgers

2. We must understand how smart contracts/minting functions work

3. Where possible, we must link virtual to real identities

4. We must verify our findings

Tracing Money Flow in Blockchain

  • Blockchain features aid tracing: transparency, immutability, non-fungibility.

  • Transparency allows easy observation.

  • Immutability ensures historical data is trusted.we can trust

    historical data hasn’t been modified

    Non-fungibility: most blockchain projects allow pairwise linking of

    transactions – tokens have history

Data Acquisition Blockchain Explorers

  • Block Explorers are websites that allow ledger data to be viewed and exported

    • Blockchain data is pre-processed and usually highly visual

    • Rich data for analysing historic trends

    • Not usually optimised for building transaction chains

    Blockchain APIs    

  • Block explorers may also provide interfaces for code to interact with their services directly

  • Application Programming Interfaces (APIs) can

    speed searches:

    – Highly parallel queries to web services

    – Automated data gathering

    – Allows the use of Python and C++ to develop

    complex series of queries and in-depth search

    Crawling Local Data    

  • All public ledgers can also be downloaded and locally processed

  • Some tools, such as BlockSci [6] and BitIodine [7], provide tools to parse locally stored blockchain data

  • Like Blockchain APIs, these tools allow us to code specific queries and visualise data

  • The Bitcoin blockchain is currently 637.26 GB in size

    (18/02/2025)

    Building Transactions    

  • Transaction chains are likely to be longer than 3 ‘links’

    – Ransomware transaction chains have at least 2 non-exchange wallets

    – Shortest possible legitimate transaction chain is:

    Entry EXCH -> OBSERVED WALLET -> Exit EXCH

  • Transaction chains can be very long even when money flow is organic/legitimate

    s

Graphing Transactions

  • Trends can be visualized -addresses can be visualised as nodes & Vertices represent unidirectional money flow.

  • Complex transaction trees can complicate processing and visualisation

  • Bitcoin tumblers complicate processing BY mixing legitimate and illegitimate funds in a complex series of transactions

    Tracking Currency Conversion

  • Exchanges represent a special challenge

  • We need to know how money enters (or more usually) leaves blockchain

  • We need to know if opaque (private) chains such as Monero are used to confuse tracing

  • This could be crucial for identifying criminals or beneficiaries of crime

  • The goal of most cyber criminals is to convert cryptocurrency into fiat currency

Linking Money Flow to Identities

  • 'Rug Pulls' may rely on reputation.

  • Proof of participation and purchase- Promoters may share proof of buy-in to incentivise victims

    Transaction tracking can determine complicity or innocence

  • Social media crawlers and OSINT are crucial; Spiderfoot searches for 'wallet-like strings' in social media posts

    Complications

  • (1) Limited transactions per wallet policy

    – Users can maintain privacy across many transactions by splitting them over many wallets

  • (2) Fully decoupling cryptocurrency from real-life identity

    – By avoiding discussion of wallets and activities on social media, identity cannot be linked to wallet addresses

    – This may be difficult for scams relying on reputation

  • (3) Barter or Contribution-in-kind

    Avoiding exchanges to prevent linking of identity and wallets

Ongoing Challenges include:

  • 1. Anonymity in attacks not relying on reputation.

  • 2. Inability to track 'side-channel' transactions.

  • 3. Difficulty predicting transactions/behavior.

  • 4. Specialist knowledge required for smart contracts and backend code review.

    Actual vs ‘Total’ Money Flow Example: This legitimate transaction is ‘worth’ 2.7billion. However, only 92.55 is finalized for receiver.