Analysis of the Cryptocurrency Marketplace

Creative Arts Solution
a non-governmental foundation

Analysis of the Cryptocurrency Marketplace

by Alex Heid
alex @ hackmiam i . org
Twitter: @ alexheid
Web: http :/ / www . HackMiam i . org

This paper will go over the technical, economic, and social impact of cryptocurrencies
such as Bitcoin and Litecoin. This document will go into a comprehensive level of detail
about cryptocurrency technologies and protocols, as this is required to familiarize the
reader with the principles behind the rapidly emerging open source economic
ecosystem. Furthermore, emerging attack vectors of cryptocurrencies will be discussed,
such as custom malware campaigns and targeted exploitation.

What is cryptocurrency?
At the time of writing, the concept of decentralized cryptocurrency is still in its infancy,
having been conceived in January 2009 by a pseudonymous researcher going by the
name Satoshi Nakamoto. The open source project known as Bitcoin was created on the
proof-of-concept principle that transactions can be securely processed on a
decentralized peer to peer network without the need for a central clearinghouse.
Centralized management has always been a part of other digital forms of payment, such
as credit cards or wire transfers. The nature of the open source cryptocurrency protocol
does not allow for traditional disadvantages such as chargebacks or double spending
due to the use of signed encryption keys, effectively removing fraud risk from the
The prominence and popularity of cryptocurrency technology has quickly spread
through the general public as means to store and transfer wealth, as well as engage in
secure e-commerce. As with any new technology that generates rapid global interest,
cryptocurrencies have been targeted by malicious actors seeking exploitation of the
experimental nature of the protocol. These attacks have come in the form of data
breaches, targeted attacks against end users, and state sponsored regulation.
Cryptocurrencies are physical precomputed files utilizing a public key / private key pairs
generated around a specific encryption algorithm. The key assigns ownership of each
key pair, or ‘coin,’ to the person who is in possession of the private key. These key pairs
are are stored in a file named ‘wallet.dat,’ which resides in a default hidden directory on
the owners hard drive. The private keys are sent to users using dynamic wallet
addresses generated by the users engaged in transactions. The destination payment
address is the public key of the cryptocurrency keypair. There is a finite amount of each
cryptocoin available on the network, and value of each unit is assigned based on supply
and demand, as well as the fluctuating difficulty levels required for mining each coin.
The wallet.dat file is the most important file of the cryptocurrency software architecture,
as that is where the physical cryptographic private key file is stored. Much like cash, if a
user loses their wallet.dat file, or has it stolen, the cryptocurrency is lost.
The decentralized nature of open source protocol ensures that the control of the
network remains in the hands of the users. Transactions are dependent on participants
in the network, and the user responsible for the security of their own finances and data,
without the need for reliance on third parties such as banking institutions.
Bitcoin operates as a p2p file sharing protocol, and therefore the concept is similar to
.torrent technology. The p2p network relies on user participation for successful trusted
data exchange. Each transaction is confirmed through key verification on multiple nodes
in the network before reaching its destination. This crowdsourced key verification
process guarantees the integrity of the data transfer.
The most popular cryptocurrency at the time of writing is Bitcoin, with alternatives such
as Litecoin rapidly gaining market traction. The source code for these programs, as well
as the code for other cryptocurrencies, are available on all major open source code

Types of Cryptocurrency

The first cryptocurrency to emerge was Bitcoin (BTC), based on the SHA-256
algorithm. This virtual commodity was conceptualized in a whitepaper written in
2009 by a pseudonymous author who went by the name Satoshi Nakamoto.
Over the course Bitcoin’s first four years, the market price of a single Bitcoin has
fluctuated from below $0.01USD to over $250USD. The highly volatile price has
made Bitcoin an attractive investment alternative for traders seeking to profit from
market speculation, while at the same time the market volatility has made long
term investors and daily users hesitant to participate for long periods of time.
A single Bitcoin can be spent in fractional increments that can be as small as
0.00000001 BTC per transaction. The smallest increment of a Bitcoin is known
as a Satoshi, named after the original whitepaper author. The protocol allows for
incremental transactions in the event the value of BTC to rises to the point where
micro transactions will become commonplace. The rise in the value of BTC is
anticipated because there is a limit to the total amount of Bitcoin will ever be
created. Once the Bitcoin blockchain is completed, users can only circulate the
coin that still exists on the network. As time goes on, Bitcoin will be lost and
destroyed through daily use. The principles of supply and demand economics will
come into play, increasing value of remaining Bitcoin.
Bitcoin is currently the most reputable of all cryptocurrency, as it is the oldest,
and has been the subject of mainstream media coverage due to rapid market
fluctuations and an innovative technical concept. At the time of writing, Bitcoin
can be interpreted as being the ‘gold standard’ of cryptocurrency because all
alternative cryptocurrency market prices are matched to the price of BTC.
Additional details about the history of Bitcoin can be found on the
website and the official Wikipedia entry. -

Figure 1.1 - 1.2 displays images of the Bitcoin GUI wallet. Bitcoin and other
cryptocurrencies are also able to run as a daemon in the background as a
headless server.

Fig 1.1 - Bitcoin-qt splash screen

Fig 1.2 - Bitcoin-qt wallet GUI

Litecoin (LTC) can be considered the ‘silver standard’ of cryptocurrency, as it has
been the second most adopted cryptocurrency by both miners and exchanges.
Litecoin makes use of the Scrypt encryption algorithm, as opposed to SHA-256.
One of the goals of Litecoin was to have transactions confirm at a faster speed
than on the Bitcoin network, as well as make use of an algorithm that was
resistant to accelerated hardware mining technologies such as ASIC. At the time
of writing, the Scrypt algorithm is resistant to ASIC mining due to intense RAM
The total amount of Litecoin that is available for mining and circulation is four
times the amount of Bitcoin, meaning there will be quadruple the amount of
Litecoin available to Bitcoin. Additional details about the history of Litecoin can be
found on the official Litecoin website and the official Wikipedia entry. -

Figure 1.3 - 1.4 displays images of the Litecoin GUI wallet.
Fig 1.3 - Litecoin-qt GUI splash screen

Fig 1.4 - Litecoin-qt GUI wallet


‘Altcoin’ a is slang term for the dozens of project forks that have emerged within
the cryptocurrency software development community. Altcoins are ‘forks’ of either
Bitcoin or Litecoin, meaning they make use of SHA-256 or Scrypt encryption
algorithms and feature their own unique properties. Names of various altcoins
range from memorable to comical (Feathercoin, Terracoin, P2PCoin, BitBar,
ChinaCoin, BBQCoin). The profitability of mining and trading altcoin varies on a
daily basis. Some altcoins exceed the profitability of Bitcoin at times, while others
are less profitable.
It is believed by some cryptoeconomists that altcoins contribute to a diverse
cryptocommodities marketplace, which is a good thing as there is more
opportunity for speculative arbitrage and mining difficulty levels are spread over
many different networks. Other cryptoeconomists disagree about the beneficial
aspects of altcoins, citing overuse of the cryptocoin concept will dilute
widespread adoption and restrict the use of the technology to speculative trade
markets instead of daily commerce.
Figure 1.5 displays various logos for some prominent altcoins that are
exchanged on various trading platforms. The altcoin software all have similar GUI
interfaces to that of Bitcoin and Litecoin.

Fig 1.5 - A few examples of altcoin logos - PPCoin, Feathercoin, BBQCoin, IXcoin,
Mincoin, Terracoin, Freicoin


Mining Cryptocurrency
The term ‘mining’ is slang for the use of computational power to process transactions for
a cryptocurrency blockchain in order to receive a reward of cryptocurrency for the effort.
The computational power will come in the form of CPU processing or GPU processing.
Miners are rewarded for successful ‘shares,’ or completed computations, by receiving a
payment with fees that are collected along the way by the p2p network. At the time of
writing, the reward for a successfully completed Bitcoin block is 25 BTC and 50 LTC for
a Litecoin block, and diminishes as the blockchain grows.
The computational power requirements differ depending on the encryption algorithm
being used. SHA-256 mining rates are measured in GH/s, whereas Scrypt mining rates
are measured in KH/s.
Figure 1.6 displays a screenshot of mining software actively processing the Litecoin at
Fig 1.6 - CGMiner (2x GPU graphics cards @ ~625KH/s)
Solo Mining
Miners are able to use the computational power of their CPU or GPU to process
transactions for the cryptocurrency network on their own, as opposed to pooling
resources with other miners. The advantage of solo mining is that the miner
would receive a full payout for a completed blockchain. The disadvantage to solo
mining is that an increasing difficulty rate makes the chances of repeatedly
completing a block with a valid share submission minimal. Solo mining is
advantageous when cryptocurrencies are newly introduced, and becomes less
effective as more miners join the network.
Some unscrupulous developers have been known to ‘pre-mine’ coins on a
blockchain of a fork that they have developed in the hopes that they can corner
their own market and sell the coins at a later date, earning a significant profit.
The idea is that if the fork can be promoted enough to be adopted by an
exchange trading platform, and then the developers can unload pre-mined
cryptocurrency for a profit in a ‘pump and dump’ fashion.
However, the nature of the public blockchain makes the tactic of pre-mining
transparent to those curious enough to investigate. Once a cryptocurrency
community discovers the existence of pre-mined coins, exchanges may become
be hesitant to adopt the fork, miners may drop from the network, and the value
lowers as the supply and demand paradigm undergoes a shift.
Pooled Mining
Most miners make use of ‘mining pools’ in order to maximize the efficiency of
their computational efforts. A ‘pool’ is software hosted on a web server, usually a
VPS or dedicated server. Miners create accounts on the pool server and then
add pool authentication credentials to the configuration files of their mining client
software on local mining equipment. Once the mining client authenticates, it is
able to share resources in the distributed computing network that will allow for a
more efficient use of hardware.
The mining pool server will receive reward payments from the cryptocurrency
network, and distribute the payment to miners based the amount of the miners
computational effort accepted by the network. Most pools take a small
percentage of the rewards and payouts in order to cover operating costs. Miners
are aware of this, and generally have no issue with contributing in order to
maintain the project.
Stratum Protocol
For miners with multiple mining rigs, some mining pools support the use of the
‘Stratum’ protocol. Stratum is used to synchronize the computational effort of
multiple mining rigs to reduce the chances of duplicate share submission,
thereby maximizing efficiency of the miners combined resources.
Figures 1.7 - 1.8 displays examples of well known mining pools for Bitcoin and
Fig 1.7 - Popular Bitcoin Mining Pool -
Fig 1.8 - Popular Litecoin Mining Pool -
CPU Mining
Bitcoin and Litecoin could originally be mined with a CPU, however as difficulty
rates increased this no longer became a profitable method. As ASIC and GPU
accelerated processing is adopted for Bitcoin and Litecoin, new Altcoins
continually emerge that satisfy the marketplace demand to be able to make
efficient use of CPU processing power.
GPU Mining
At the time of writing, GPU accelerated mining is the most common method of
the majority of cryptocurrencies. A single GPU is able to process the approximate
equivalent of 44.64 CPUs (estimating 14KH/s or MH/s per CPU and 625KH/s or
M/Hs per GPU). Gamers, graphic designers, film editors, and password hash
analysts are all able to make use of their existing hardware to efficiently
participate in cryptocurrency mining.
A hardware efficiency comparison is available on the official Bitcoin wiki -
Figure 1.9 shows a sample of what mining traffic looks like as it traverses the
local network. The pool destination and cryptographic data is observable within
the traffic, and is generally not bandwidth intensive. It is simply a JSON formatted
POST request and GET request.
Fig 1.9 - Screenshot of cryptocurrency ‘pooled mining’ traffic.
ASIC Mining
Application Specific Integrated Circuits (ASIC) have been developed for Bitcoin.
Due to the customized and specific nature of ASIC technology, there is currently
only ASIC for Bitcoin. ASIC mining is advertised as having exponentially more
computational processing power using significantly less resources than GPU
mining, such as hardware and electricity.
It is hypothesized that as the popularity of ASIC accelerated hardware grows
among the Bitcoin mining community, GPU miners will begin switching to Litecoin
or other altcoins that are resistant to ASIC technologies. The benefits and
drawbacks of this type of diversification is currently a popular subject of debate
among the mining community.
Figure 1.10 displays an example of marketing material for a Bitcoin ASIC
manufacturer. The marketing material compares the hardware requirements of
GPU mining to ASIC mining to demonstrate superior efficiency.
Fig 1.10 - Marketing material for a Bitcoin ASIC manufacturer
Economics of Mining
It is hypothesized by miners that the price of cryptocurrencies will continue to rise
due to limitations of the supply and the finite caps on availability for mining.
Evolving technologies shape the profitability of mining methods on a regular
basis. Generally, miners who have consistently mined Bitcoin or Litecoin long
term have earned a return on hardware investment 6 months to one year. Miners
who switched to cryptocurrency mining with GPU accelerated hardware using
equipment that was already owned for applications such as password hash
cracking, 3D gaming, or film production had an advantage because they were
already in possession of efficient mining equipment and experienced lower out of
pocket investments.
The increase in difficulty and resulting increase in market price is beneficial for
miners that have been harvesting and saving for long periods of time. Long term
miners who have been saving their rewards will have a large reserve of
cryptocoin from when difficulty rates were low and payouts were high. The
resulting increases in cryptocoin market prices result in an increase in the value
of the miner’s overall portfolio.
Mining Profitability
Miners who get into a cryptocurrency fork after the difficulty has significantly
increased, such as latecomers or ‘pool jumpers,’ (miners who constantly switch
coin types based momentary profitability), are less likely to benefit from
cryptomarket fluctuations. Moreover, the miner may even suffer from the
fluctuations as it will take a longer period of time for the miner to match their
return on investment as they may not not have an established cryptocurrency
However, newcomers to cryptocurrency mining should not be discouraged by
increasing difficulty rates. The market price of the cryptocurrency goes up as a
result, and discipline and persistence of consistent mining will eventually be
profitable as with any hobby of passion.
Figure 1.11 displays an example of mining profitability calculations for various
Fig 1.11 - Mining Profitability Calculator Rates (per day)
Market Caps and Network Mining Limits
Each cryptocurrency has a finite amount of coins available to be mined for the
network. Bitcoin will only have 21 million coins mined, Litecoin will only have 84
million coins. At the time of writing, over eleven million Bitcoin have been mined
and the market value exceeds one billion dollars USD.
Figure 1.12 shows the market caps and circulating crypto coins available at the
time of writing.
Fig 1.12 - Cryptocurrency Market Capitalization
Whitehat Mining
The majority of the cryptocurrency mining community are legitimate enthusiasts
who are intrigued by a new technology and seeking to participate in an innovative
project, while at the same time earning a profit for their efforts.
Many early cryptocurrency miners were in possession of accelerated GPU
processing hardware due to other hobbies such as 3D gaming, graphic design,
or password hash analysis.
As the word of mining profitability spread, speculative investors began to
purchase GPU hardware specifically for the purposes of cryptocurrency mining.
For some, this involved significant initial out of pocket expenses with no
guarantee of return as the entire cryptocurrency concept is an experiment in
economic and cryptographic principles.
Depending on the saving discipline and investment skill of the individual running
the mining systems, hardware expenses can either quickly recouped or endlessly
The rapid rise of Bitcoin market prices following the economic crisis in Cyprus
created several millionaires of early cryptocurrency enthusiasts. The stories of
several individuals who rose to rapid wealth is detailed by the Huffington Post
article “Meet the Bitcoin Millionares.” -
The term “Bitcoin Baron” became slang that is used to describe individuals who
were early adopters of cryptocurrency and have significantly profited from
involvement with Bitcoin since the projects original inception. The term can be
observed as being used within the title of an underground hacking rap song
known as “Bitcoin Baron,” by former black hat hacker YT Cracker -
Figures 1.13 - 1.14 shows the interior and exterior of a typical professional GPU
accelerated computer assembled for the purposes of cryptocurrency mining.
The official Bitcoin Wiki contains an entry that compares the efficiency of various
brands of mining hardware.
Fig 1.13 - GPU Mining Computer Interior (3x GPU cards, 1050w power supply)
Fig 1.14 - GPU Mining Computer Exterior (3x GPU cards, 1050w power supply)
Blackhat Mining
As the market price of cryptocurrencies rise, there has been an increased interest by
botnet administrators in the use of their botnets for mining cryptocurrency. Several
Bitcoin and Litecoin mining trojans and crimeware kits have been leaked into the public
realm, which indicates that this concept has evolved beyond theory and is being put to
Some botnet administrators are disinclined to make use of their botnets for
cryptocurrency mining as it may cause a noticeable performance degradation in the
performance of their infected bot systems.
In an interesting parallel, in the physical world, it has been reported in mainstream
media that the profitability of illegal physical gold mining by rebel groups in Columbia
has replaced the drug trade as the primary profit driver for rebel activities. This shift
reveals a trend that transcends both the both physical world and online worlds, whereby
organized underground groups break out of traditional revenue generation activities to
participate in illegal mining of commodities during times that the commodity is most
profitable. -
Figures 1.15 – 1.18 reveal several Bitcoin mining trojans that have been leaked into the
public realm.
Fig 1.15 - Login panel for BitBot botnet
McAfee Labs Analysis of BitBot -
Fig 1.16 - RSTMiner - Bitcoin mining trojan builder
Fig 1.17 - Chrome Miner - Bitcoin mining trojan builder
Fig 1.18 - TwMiner Builder - Bitcoin mining botnet that uses Twitter as C&C
Greyhat Mining
Javascript Mining
There has been much discussion surrounding the emergence of Javascript
bitcoin mining scripts being placed onto websites in order to use the CPU power
of the visitor to generate cryptocurrency for the individual who deployed the
script. JavaScript mining is speculated by some to be profitable in the event of
compromising a high traffic website, either through a persistent XSS vulnerability
or another vector of access.
In reality, JavaScript bitcoin mining is currently only effective as an interesting
proof of concept, and not really for making any significant profits. Visitors of
websites that have Bitcoin mining scripts in place will often notice the decrease in
computational performance and attribute the slowdown to the website in one way
or another, causing a decrease in repeat visits.
While not illegal if placed on a website with the consent of the owner, the person
deploying the script would be better served utilising more efficient methods.
If acquisition of cryptocoin is the goal, regular affiliate advertisements (PPC/CPA)
would be more effective and fiat profits could be traded for cryptocurrency.
Figure 1.19 contains the source code for a common JavaScript Bitcoin miner.
Fig 1.19 - Source code for Javascript Bitcoin Miner -
Trading Cryptocurrency
At the time of writing, exchange trading platforms such as BTC-e and Vircurex are
essentially the backbones of the cryptocurrency economy. These trading platforms
provide a place for miners and speculators a place to participate in arbitrage between
various cryptocoins and fiat currencies.
Figure 1.20 displays an image of BTC-e, a live cryptocurrency trading platform that
allows for the exchange of Bitcoin (BTC) into altcoins
(LTC/FTC/NMC/NVC/PPC/CNC/TRC) and fiat currencies (USD/EUR/RUR).
Fig 1.20 - Snapshot of Real Time Cryptocurrency Exchange Market -
Legitimate Economic Activity with Cryptocurrency
Cryptocurrencies have provided a way for businesses to engage in e-commerce
on an international level that was previously unprecedented. Services such as
PayPal have never had complete international reach for their services, as they
were centralized corporations.
Merchant Processing
Due to the nature of Bitcoin being an open source peer to peer protocol, the
potential for e-commerce has expanded into regions where e-commerce was
previously difficult, if not impossible, due to the high risks of fraud associated with
international credit card processing.
Merchant processing solutions such as BitPay have emerged to provide a
solution for merchants who wish to be able to convert their payments into USD
and withdraw to a bank account, while maintaining compliance with government
regulatory authorities.
Users are able to accept and withdraw Bitcoin anonymously, but must provide
appropriate identifiable documentation when converting Bitcoin into fiat currency.
Fig 1.21 - Bitpay - FINCEN compliant merchant solution for Bitcoin -
Gift Cards
Services such as Gyft provide a way for miners and traders to make use of their Bitcoin
by purchasing gift cards for major retail stores, restaurants, hotels, and many other
types of merchants. The gift cards are sold as electronic codes and are instantly
redeemable on cell phones or through print outs. The Gyft corporation also takes credit
cards, however they restrict credit card purchases to mobile devices that have been
preauthenticated through the Google or Apple stores.
The only method to purchase cards from the Gyft website is via Bitcoin. This serves as
an example of an e-commerce store making use of Bitcoin as a solution to eliminate
chargeback risks relating to credit card fraud.
Fig 1.22 - Gyft accepts Bitcoin for gift cards for IRL and online stores –
Underground Economic Activity with Cryptocurrency
Regional instability and civil unrest around the globe has traditionally
manifested into a renewed interest in metals markets, causing a significant
rise in metals prices as populations seek to hedge their wealth in gold and
silver to withstand any fiat currency collapses. The conversion into hard
metals has posed a problem for individuals seeking to flee turbulent areas,
as sizeable amounts of physical precious metals requires smuggling in
one form or another.
Individuals in countries with rapidly collapsing economies are quickly
realizing that cryptocurrency does not have the same logistical limitations
of precious metals when crossing a border. The fleeing monied
populations from various turbulent regions (Cyprus, Brazil, Iran,
Venezuela, Turkey) seem to be hedging in cryptocurrency for the short
term until they are able to relocate and convert back into fiat currencies or
metals. Bitcoin might be in a current bubble due to this, and might have
had a small impact on the recent deflated values of precious metals
markets to the point of price correction. Bitcoin emerged as an unexpected
alternative for investment diversification and the storage of wealth, and
global commodities market prices responded in kind.
It is also important to note that precious metals markets were inflated for a
time that is longer than the concept of cryptocurrency has existed.
Mainstream media has done a thorough job sensationalizing the use of
and the potentials for illegal activity. The illegal activities described by
mainstream media often include the mention of drug sales or illegal
weapons sales, however these illegal activities are also made possible
through fiat cash, and is even more anonymous than the use of
cryptocurrencies such as Bitcoin. Furthermore, the availability of gift cards
for large retail stores has essentially eliminated the market for illegal
weapons trading, as people are now able to make completely legal
weapons purchases with Bitcoin through the use of legitimate federally
licensed firearms vendors.
Due to the recent shutdown of centralized e-currency Liberty Reserve,
many digital crime groups have moved to Perfect Money and Bitcoin as an
alternative to store their ill gotten gains. Perfect Money is a centralized ecurrency
solution similar to Liberty Reserve.
Traditionally, malicious actors have been apprehensive about adopting
Bitcoin due to the market volatility making it risky for long term storage of
finances. However, Bitcoin as gained some resistant traction out of
necessity after it became apparent that governments are able to
decapitate centralized e-currency issuers even when the currency issuer
exists beyond jurisdictional borders, such as with Liberty Reserve.
The adoption of Bitcoin by malicious actors will end up as both an asset
and a liability to the criminal underworld. If used improperly, the anonymity
that is assumed by the user can be made nonexistent. The public
blockchain ensures that every transaction on the Bitcoin network is visible
and documented. As a result, if an individual ever correlates a Bitcoin
payment address to identifiable information, that payment and possession
of the cryptocoin can be successfully attributed to an individual. Unskilled
criminals who do not fully understand the technology will end up being
burned by improper use of anonymization features, while more
sophisticated criminals will use the properties of anonymity to their
advantage, while still bearing the risk of market fluctuations.
Common Attacks against Cryptocurrency
As with any organized criminal, the target will be the location of money. In the case of
cryptocurrencies, the locations of value are in the form of mining pool servers, trading
platforms, third party wallet services, and end user computers.
Over the short history of cryptocurrency, each value location has experienced multiple
forms of attack that resulted in the direct theft of coins.
Data Breaches of Mining Pools/Trading Platforms/Third Party Wallet Storage
Many cryptocurrency web applications are often based on experimental concepts that
may have undisclosed vulnerabilities. Furthermore, many also rely on the end user to
set a secure password. As with any security control, it is only as strong as it’s weakest
link. Malicious actors have been known to attack web applications that manage
cryptocurrency wallets, as well as attack users who have reused breached passwords
and/or experienced compromised e-mail accounts and password resets.
Major mining pools and exchanges have implemented PIN solutions, two factor
authentication, and CAPTCHAs to prevent such activity. However many smaller mining
pools are still experiencing the growing pains associated with the implementation of new
technologies, such as APIs, and are victim to pool heists. As e-commerce merchants
start accepting Bitcoin, they will also be targets of such attacks and should prepare
through proper web application vulnerability analysis and end user education.
Fig 1.23 – Forum Discussion of Breached Exchanges
Fig 1.24 - BTC-e warns users to change passwords after Vircurex breach
Attacks Against the End User
Client Side Attacks - Since Bitcoin and other cryptocurrency resides in the
wallet.dat file, a goal of malicious actors in a cryptocurrency attack campaign is
the exfiltration of that file. This can be achieved through physical access, but is
most often attributed to malware.
Both whitehat and blackhat tools exist for the theft of Bitcoin wallets. Figure 1.25
shows an image of a post exploitation plugin for the Metasploit attack framework
that steals wallet.dat files from compromised machines. The tool was developed
and released by hacker iLLwiLL of the hacking group iLLmoB. The Bitcoin wallet
stealer Metasploit post exploitation module was released shortly after Bitcoin’s
first surge of popularity in 2011.
Fig 1.25 - Bitcoin wallet stealer for Metasploit by iLLwiLL -
Figure 1.26 reveals a snippet of source code from Pastebin that makes use of the FTP
protocol for Windows bitcoin wallet theft. This emerged in 2011, after Bitcoin’s initial
surge in popularity.
Fig 1.26 - Source code of a Bitcoin wallet stealer that uses FTP - http :/ / cur . lv /1 dpeq
More recently, additional wallet.dat theft tools for various cryptocurrencies have been
leaked and circulated, as indicated in Figure 1.27. Most of the tools appear to be written
for use with Windows, and target Windows users. The malware continues to be
unsophisticated, still relying on the use of the unencrypted FTP protocol for data
Fig 1.27 - Screenshot of GUI wallet stealing tool
Physical robbery - The first documented incident of a physical robbery during and in
person exchange took place on the forums. The robbery incident is
documented in Figure 1.28, and is translated into English from German in Figure 1.29.
Figure 1.30 documents cryptocurrency media coverage of the incident.
Fig 1.28 - Screenshot of victim claim of physical robbery [German] -
Fig 1.29 - Translated text of robbery claim [German to English via Google
Hello, I have been thinking a long time ago if I'll let you know what happened.
I come to the conclusion that I now post it publicly.
Yesterday I had a meeting with a member of Bitcointalk ( https :/ / bitcointalk . org / index . php
? topic = 229450.0 ), it is out of the conversation is a deal been reached, with the
proposed € 75 per Bitcoin, as the price was at around the € 78-80, I was ready for a
Public Meeting resolved.
BTC 60 against 4.5 Cash.
arrived on time, a foreign person was made at the meeting point of a normal
He wanted to see the money, which I showed him.
now he had suggested we go to his car, and he from his laptop to me the BTC sends
and I give him the money.
Naive as I am, I went with him.
There were about 10 min walk, where I then asked where the car is now, he said,
we're almost there.
We then proceeded until I found a heavy blow, no, I thought. There were two people
who have followed us, which I really was not've taken.
From then on, I only punches and kicks get in until I no longer resisted.
then I was taken off my clock, cash, smartphone.
then you have let go of me where you had what you wanted, and I was still cheerful
about my.
The whole is certainly interest you Humanly not but the coins.
I have a block chain mail address created for Bitcoins, so that if the seller of 60
Bitcoins comes too late, because he can not find address or whatever.
, I can pay for the order directly on my phone, so the payment is received before 16
clock and the purchase has been completed and I do not have to drive extra home.
, the problem is about the whole thing, that the block chain side was opened in Safari,
in addition, the account data was stored in my notes.
I mean who expects to pass the stuff middle of the day.
using pain plagued homecoming towards that process events .
home came violently to ponder whether Bitcoins are still on our wallet.
now I went to an internet cafe to see if the Bitcoins are still there.
then a relief they are still there.
direct in my email logged account, block chain Email open and found, that there is
only the link to the wallet, but not the random-generated 15-digit password.
now on the block chain side, looking for a solution to come into our wallet.
since I had at the time the password that never goes to the block chain server, I
thought now you've really fucked up. Everything clicked through, had no success.
now I have seen opportunities over 1 hour for possible password and deliberate.
since all this did not help, I've been thinking how the whole confession, these are the
bitcoins in a wallet where I no longer ran come.
Again open the block chain mail address, I realized that was made a bank transfer,
you can send me believe my heart has never been so fast tapped as the time. I would
like to not display as scammers, as this not at all fit my personality, let then I can sleep
peacefully. Hektek I have no written pushy, send to instantly Bitcoins. Bitdaniel that
you accuse me as a scammer, is really the hammer, think about the chat history of
entertainment after I had received from 2weiX easily the 50 BTC within minutes. You
know 2weiX I would have done like problems to, as he has done to you. Besides, I
have you can ask for more BTC have been wanting to complete the purchase.
Respectively like you wanted to buy the whole Jupiter alone , which I declined since
even users are entered. Sowas would not make an scammers to or Bitcoins to get
MORE money. I can you ever say so much I want to be no longer part of the
community. never but never I had in a Bitcoin Forum expects that such Criminal pack
hangs out yourself. Solving the problem would be in my eyes, I will refund a reminder
to you as involved (name and address I needed) and hope that the perpetrators can
be prosecuted criminally .
Fig 1.30 - Screenshot of cryptocommunity media coverage of robbery -
http :/ / cur . lv /1 dph 7
Government Seizure as Contraband
The first documented seizure of Bitcoin took place in June 2013. The United States
Drug Enforcement Administration (DEA) seized approximately 11 Bitcoins from a
suspect that was accused of illegal activities using an underground e-commerce
marketplace. -
The seizure and the physical robbery indicates that cryptocurrencies have solidified
themselves as a valuable commodity to both common thieves and law enforcement
agencies, demonstrating that Bitcoin and the cryptocurrency concept has longevity and
will continue to gain traction with the general population.
Limits of Cryptocurrency
Like any emerging technology, cryptocurrency still has a way to go before it is refined
and perfected as a commodity suitable for daily commercial use by the average person.
Blockchain Size
Large public blockchain makes for slow setup of Bitcoin wallets and requires
large storage space. As of the time of writing, the Bitcoin blockchain is over 8GB
in size. This blockchain size can be problematic with mobile devices, and as the
blockchain grows 3rd party storage solutions may become only option. The
reliance on a third party storage solution would defeats the purpose of the
principles of being in control of commodity, and subject users to the regulations
and terms of service of the solution provider.
The public blockchain of cryptocurrencies documents payment address, IP
address, and all incoming/outgoing transactions to that address. If anonymity
practices are not followed, such as the use of a VPN or the Tor network, then the
transaction is attributable in a way that is more public and verifiable than a credit
card or cash. This attribution is made even easier if at some point in time the end
user has documented their real name along with a Bitcoin payment address.
Technical Barriers
It’s hard enough helping the average person navigate simple IT issues. In
addition to standard computer navigation, the end user has to understand the
concepts of public key private key encryption, peer to peer protocols, mining
share submissions, blockchains, and market fluctuations due to supply/demand
commodity trading economics. Once those concepts are clear to the end user,
only then will they feel totally confident buying and selling on the internet using
Government Regulations
US government regulations and Financial Crimes Enforcement Network
(FINCEN) requirements are making the widespread adoption of Bitcoin and
cryptocurrencies difficult. As of March 2012, FINCEN regulations were amended
to redefine the definition of a ‘stored value monetary instrument’ to include virtual
currencies such as Bitcoin. This reclassification of stored value monetary
instruments made it a requirement for any business engaged in the activity of
exchanging Bitcoin to US fiat currency register as a money transfer business,
and be subject to the regulatory requirements thereof.
Many US based exchangers and merchant service providers are making strides
in meeting and maintaining regulatory compliance standards. The desire to meet
the requirements government regulation and compliance is rarely seen within the
cryptoanarchist community. However, since Bitcoin has evolved beyond an
argorist experiment into a global commodity, this desire is being sought as many
legitimate businesses seek to make use of the benefits of an emerging
Interest in Bitcoin and other cryptocurrencies will continuing to grow. As the mining
difficulty rates rise, the value of individual coins will increase. Litecoin will be an
interesting cryptocommodity to continue to watch, as the market price has not yet
matched the market cap spread. It is possible to see a significant increase in the value
of Litecoin in the near future, or perhaps the rise to prominence of another altcoin that is
based on an alternative encryption algorithm.
Government regulations will continue to stifle and stonewall the growth of Bitcoin and
cryptocurrencies within the United States, but the technology will continue to grow in
popularity on an international level. The current government attacks against
cryptocurrency can be interpreted as similar to the government actions against mp3
technology, or the ongoing assault against .torrent technologies. In the end, the
technology will prevail if it is adopted by enough people and the government actions will
be interpreted as futile and oppressive.
Bitcoin Vocabulary - Official Bitcoin Vocabulary - - Official Bitcoin Website -
Bitcoin Wiki - Official Bitcoin Wiki - - Official Litecoin Website -
Litecoin Wiki - Official Litecoin Wiki - - Official Bitcoin Forum –
CoinURL - Bitcoin based ad service - http :/ / www . coinur l . com / index . php ? ref = hackmiam i - Mining profitability calculator – - Cryptocurrency market prices – - Cryptocurrency market caps – - Public record of BTC blockchain –
Altcoin - Alternative cryptocurrency such as Litecoin, Terracoin, PPCoin, or BBQCoin
Bitcoin - Original cryptocurrency that emerged in 2009, considered gold standard of
Bitcoin Baron - Individual who has significantly profited from Bitcoin due to early
Blockchain - Public transaction record of cryptocurrency
Confirmation - Transaction on the cryptocurrency network
Cryptocurrency - File exchange based on decentralized p2p protocol. Value based on
Difficulty - Computational effort required to complete a block on a cryptocurrency
FinCEN - Financial Crimes Enforcement Network - US financial regulatory authority
Fork - A ‘spin-off’ of an open source project, i.e. Feathercoin is a fork of Litecoin.
Litecoin - Altcoin that emerged after Bitcoin, considered silver standard of
Mining - The use of computational power to process transactions for a cryptocurrency
blockchain in order to receive a reward of cryptocurrency for the effort.
Mining Pool - A centralized server where miners ‘pool’ resources for more efficient
transaction processing.
Miner - An individual engaged in mining.
Pre-mining - When cryptocoin developers create coins for themselves before the
official release.
SHA-256 - Encryption algorithm used by Bitcoin
Scrypt - Encryption algorithm used by Litecoin
Stored Value Monetary Instrument - Term by FinCEN referring to regulated business
Solo-mining - The use of individual computational power to process transactions
without the use of a mining pool.
About the Author
Alexander Heid is co-founder and President of HackMiami.
His specialties include digital crime intelligence analysis, application security auditing,
digital network vulnerability analysis, penetration testing, and malware reversal. Much of
the research he has participated in has been featured at national industry conferences
and global mainstream media.
About HackMiami
HackMiami is the premier resource in South Florida for highly skilled hackers that
specialize in vulnerability analysis, penetration testing, digital forensics, and all manner
of information technology and security.
HackMiami seeks to develop and harness the participation of the information security
community through regular events, presentations, labs and competitions.
These events allow the hacker community a forum to present their research, develop
new techniques and methodologies, and at the same time provides valuable a
networking resource for contracting opportunities.
Visit the official HackMiami website at http :/ / www . hackmia
m i . org


Popular posts from this blog

How to Convert Your Airtime Credit To Real Cash, Directly To Your Bank Account

Bisi Fakeye (1942 – 2017)