• Resources
  • Blogs
  • Follow the Crypto Part 2: Tools and Techniques for Investigating Cryptocurrency Transactions

Follow the Crypto Part 2: Tools and Techniques for Investigating Cryptocurrency Transactions

Netacea logo
Threat Research Team
18/07/24
8 Minute read
Cryptocurrency fraud

Article Contents

    In part one of our “Follow the Crypto” series, we highlighted the growing need for cryptocurrency investigations in the fight against fraud. We discussed the hurdles that investigations face, from the anonymous nature of transactions to the complexity of analyzing blockchain data, but also noted some famous successful investigations.

    In this second and final part, we will delve into the ‘how’ of cryptocurrency investigations, walking through the practical aspects, and providing examples of tools, techniques, and resources that can be used for investigations.

    No matter whether you are a counter fraud professional or are simply looking to understand how cryptocurrency investigations can be conducted, this blog will give you some very real insights.

    Common Techniques Used by Investigators

    Let’s start by discussing the techniques that form the backbone of cryptocurrency investigations. These span from the most basic blockchain analysis to more advanced techniques.

    Transaction Tracing – ‘Following the Money’

    The foundation of any cryptocurrency investigation is to ‘follow the money’. This is the concept of tracking the movement of funds, which we apply to the blockchain through transaction tracing.

    Investigators can use blockchain explorers to start performing basic transaction tracing. These explorers provide near real-time logs, derived directly from the blockchain, for a given cryptocurrency address. By inputting a specific address or transaction hash (a unique identifier for a given transaction) into a blockchain explorer, investigators can:

    1. View all incoming and outgoing transactions for that address.
    2. Identify the amounts and timestamps of each transaction.
    3. Begin to track the path of funds across multiple addresses and transactions.
    4. Begin to spot patterns in transaction behaviour, such as frequent transactions with specific addresses.
    5. Begin to spot any further obfuscation techniques used by criminals, such as transaction peeling – where criminals split funds into smaller transactions, in the hope of avoiding detections.

    walletexplorer.com – one of many blockchain explorer services

    walletexplorer.com – one of many blockchain explorer services

    Now you may have picked up on the use of ‘begin to’ above. That’s because whilst these explorers provide the functionality to trace transactions, identifying any meaningful transaction flows or patterns using these explorers alone will be extremely time-consuming and sometimes impossible.

    Example output from walletexplorer.com

    Example output from walletexplorer.com

    This is where visualization tooling often comes into play. Tools like Breadcrumbs can help investigators visualize the flow of money as it interacts with known entities of interest on the blockchain, such as the crypto exchanges used for cashing out the proceeds.

    The example below is a sample Breadcrumbs investigation of cryptocurrency transactions related to the Hydra Dark Web Market. We can see that some of the cryptocurrency that passed through Hydra’s address was sent to localbitcoins.com, a peer-to-peer cryptocurrency exchange made famous by even allowing users to utilize in-person cash trades for cryptocurrency.

    Sample Breadcrumbs Investigation

    Sample Breadcrumbs Investigation

    Another tool that can be used to achieve this is Maltego. The example below is one from Maltego’s blog, showcasing the logical flow of an address and the Binance crypto exchange. Both examples could be used to reveal points where identification and/or some fund recovery would most likely be possible.

    Sample Maltego Investigation

    Example Maltego Investigation

    Ethereum Contract Impersonation

    For Ethereum addresses, a unique technique allows you to interact with decentralized applications (dApps) by impersonating a login from the address. This means you can spoof access to dApps as if logged in as the address owner, and while you can’t send or receive funds due to private keys, you can view the app from the address owners’ perspective. Tools like Impersonator enable this. For example, let’s impersonate Vitalik’s, founder of Ethereum’s connection on Uniswap.

    Vitalik.eth UniSwap Impersonation

    From this you can see everything the address owns, the recent activity, the non-fungible tokens (NFTs), along with any hidden tokens assigned to their address.

    Vitalik.eth NFTs

    Vitalik.eth NFTs

    Vitalik.eth recent activity

    Vitalik.eth recent activity

    This brings together key investigative data in a visual format, saving time compared to collating using blockchain explorers alone.

    Address Clustering

    Transaction tracing is crucial in the initial stages of an investigation and can sometimes obtain results on its own. However, if the criminal’s use of cryptocurrency is sophisticated, transaction tracing is often just a starting point. Next, investigators might start to use address clustering techniques to identify and group addresses likely to be controlled by the same entity. If individual criminals, or criminal groups are using multiple addresses to obscure their operations, clustering can help understand the full scope of their activities.

    Explaining the exact theory and methods behind this could be a whole blog on its own, but here’s a high-level overview:

    1. Behavioral Analysis: Any addresses that are seen to be exhibiting similar patterns in frequency, amounts, timing are grouped.
    2. Common Inputs: If multiple addresses send money in a single transaction, they may belong to the same individual or group.
    3. Multi-Signature Wallets: Addresses that are frequently used together in transactions that require multiple approvals before being sent, are likely related.

    Address Tagging and Attribution

    An important part of clustering, and ‘following the money’ is having the ability to identify or tag addresses with known entities, particularly cryptocurrency exchanges. But you might be thinking, “how do sources and/or tools claim to identify exchange addresses with confidence?” This involves:

    1. Withdrawal/Deposit tracking: Investigators can make traceable deposits and withdrawals to build up a directory of known exchange wallets.
    2. Public Information and User Reports: Known exchange addresses may inadvertently be revealed by exchanges themselves or reported by their users.
    3. Fingerprinting Techniques: Using known addresses, some tools can fingerprint a transaction that may belong to a certain service. An example is if a certain exchange uses a very specific CoinJoin process to anonymize their Bitcoin for customers, this could give their transactions away.

    Cross-Chain Analysis: Following the Money across Blockchains

    As criminals increasingly move funds between different cryptocurrencies to further obscure transactions, cross-chain analysis becomes crucial for tracing funds and identifying conversion points between blockchains. This process builds on entity tagging and address clustering techniques, allowing investigators to link activities on different blockchains to the same entity. It involves monitoring exchange activity, analyzing cross-chain bridges, and applying inter-blockchain heuristics to connect transactions as they move across different blockchains.

    Open-Source Intelligence

    Now, whilst all the techniques we have discussed are important in analyzing blockchain data, Open-Source Intelligence (OSINT) can further enrich investigations. Let’s explore some of the key OSINT techniques using the well-documented Silk Road Marketplace address to provide examples:

    Silk Road Marketplace – 1HQ3Go3ggs8pFnXuHVHRytPCq5fGG8Hbhx

    Google Dorks

    Using advanced Google search operators to find specific information, some useful examples being:

    • Site:site.com  intext:“1HQ3Go3ggs8pFnXuHVHRytPCq5fGG8Hbhx” – reveal any mentions of this address on your specific search site.
    • (site:x.com OR site:facebook.com OR site:reddit.com OR site:pastebin.com) intext:” 1HQ3Go3ggs8pFnXuHVHRytPCq5fGG8Hbhx ” – reveal any mentions on common social media and discussion forum sites.
    • (site:telegramchannels.me OR site:tlgrm.eu OR site:combot.org OR site:teleteg.com) intext:” 1HQ3Go3ggs8pFnXuHVHRytPCq5fGG8Hbhx ” – query Telegram search aggregators to reveal any indexed results. You can also use the Telegogo custom Google search engine, but you cannot query this with a dork.
    • (site:github.com OR site:gitlab.com OR site:bitbucket.org OR site:sourceforge.net OR site:gitee.com OR site:code.google.com) intext:” 1HQ3Go3ggs8pFnXuHVHRytPCq5fGG8Hbhx ” – search any public code repositories for results.
    • (site:ahmia.fi OR site:onionland.io OR site:oniongate.com)  intext:” 1HQ3Go3ggs8pFnXuHVHRytPCq5fGG8Hbhx” – query  Dark web search engines to reveal any indexed results. There are other dark web search engines available, but use any and all of these with extreme care.

    Internet Archives

    For historical lookups, the Wayback Machine or Archive.today allows investigators to check archived versions of websites that might have mentioned an address but have since been removed. We can see the results for the Silk Road address below.

    Results from Archive.today

    Results from Archive.today

    Cryptocurrency Abuse Databases

    We can also check an address’s reputation to see whether it has been previously reported. For this, we can use sites like BitcoinWhosWho or Chainabuse.

    BitcoinWhosWhos Results

    BitcoinWhosWhos Results

    Bringing Everything to Life

    While understanding these more advanced cryptocurrency investigative techniques – clustering, tagging, cross-chain analysis and OSINT to supplement investigations are hugely important, applying these is where the real challenges lie.  

    Commercial Offerings

    To meet these needs, there are a range of solutions, both commercial and open source. The commercial market offers more feature-rich tooling designed for professional investigators. We aren’t here to review or recommend any specific tool, but some of the standouts are Chainanalysis, Elliptic, TRM Labs and Maltego CipherTrace.

    When deciding upon commercial or open-source solutions, there are some important considerations:

    1. Cost vs. need: Evaluate if the outlay to obtain these tools matches your investigation scope and complexity. Consider both current and potential future investigations.
    2. Free-tier options: Some of these tools may offer feature-limited, or time restricted trials to test the tools. Determine if this will meet your investigation requirements.
    3. Licensing models: Confirm that your intended use is permitted by any licensing or usage restrictions for the tool. This applies for both commercial and open-source tooling.
    4. Learning curve: Consider the time needed to learn and get the most out of these tools.

    Open-Source Offerings

    While powerful, some commercial tools may be overkill for certain cases. It’s important to carefully assess your requirements and resources (more on this later). The good news is that open-source alternatives can bring together sophisticated capabilities at no cost. One such tool being GraphSense – a cryptocurrency analytics platform that offers a dashboard for interactive investigations.

    GraphSense Maltego

    Now GraphSense is a great tool on its own, but what if we could combine the power of Maltego with GraphSense? Well… that’s exactly what led the Interpol Innovation Center to create a bridging feature capable of performing “simple queries on GraphSense data and tag-packs to obtain transaction graphs and attribution tags in Maltego”.

    This allows investigators to maximize the potential of Maltego for building a strong profile of the investigative case, inclusive of various entities, data points, blockchain-related data, and adversary data if known, whilst being able to easily perform cryptocurrency wallet attribution and clustering through GraphSense.

    Below is an example of the types of investigations you can begin to undertake using this.

    Interpol GraphSense Maltego plugin example investigation

    Interpol GraphSense Maltego plugin example investigation

    Setting up a Cryptocurrency Investigation

    It would be irresponsible to discuss this topic without first addressing the essential processes that fraud teams should have in place to initiate investigations. We have compiled this checklist to help you get started.

    Before Investigations Start

    Gain a foundational understanding of cryptocurrency:

    • Understand the basics of blockchain technology and cryptocurrencies.  
    • Understand the key concepts such as wallets, addresses, exchanges, transactions. 
    • Understand the different types of wallets (hot and cold), public/private keys. 
    • Familiarize yourself with different types of cryptocurrencies and their unique features.  
    • Familiarize yourself with investigation techniques discussed in this blog. 

    Understand the legal, regulatory and compliance landscape:

    • Consult with your legal counsel to understand the legal and regulatory implications of cryptocurrency investigations. 
    • Understand AML/KYC requirements and how these apply to cryptocurrency transactions. 
    • Understand evidentiary collection and maintaining procedures such as the Chain of Custody.  
    • Consider designating a responsible individual to review ongoing regulation and report back on any major relevant regulation changes.

    Develop policies and procedures:

    • Create internal policies for conducting cryptocurrency investigations in a manner that complies with all relevant laws and regulations. 
    • Establish Standard Operating Procedures (SOPs) for handling cryptocurrency investigations. These must include guidelines on data collection, evidence handling, and reporting points out to relevant agencies.  

    Before Each Investigation

    Define investigation objectives:

    • Clarify the specific goals of the investigation (e.g., identifying fraudsters, disrupting their activities, recovery of funds, preventing future fraud etc.). 
    • Determine what the success criteria of the investigation would be. This might also include key performance indicators (KPIs) for the investigation. 

    Define the investigation scope and identify resource requirements:

    • Identify the scope, for example: Is it a single actor, or part of a larger fraud scheme? 
    • Identify necessary resources (personnel, tools, timing) 
    • Set boundaries so that the investigation is run efficiently and focused. 

    Risk assessments and internal approval:  

    • Conduct a risk assessment based on the investigation’s objectives, scope and resource requirements.  
    • Obtain necessary approvals from senior management and legal departments if investigation is determined to be high risk or deviates from the agreed SOPs. 

    Further Reading and Resources

    Lastly, the community of individuals conducting cryptocurrency investigations are very collaborative and maintain a wealth of resources that will be helpful in enhancing your capabilities. Here’s some useful resources that should set you on your way.

    1. Law Enforcement Crypto Field Guide: a guide created by Chainanlysis, which provides some of the useful must-know elements to understand cryptocurrencies.
    2. Awesome On-Chain Investigations Handbook 2.0: a list of resources that can be used for various elements within an investigation, this is maintained by OfficerCia.
    3. Blockchain Dark Forest Self-Guard Handbook: which provides the context of Operational Security in cryptocurrency, this is maintained by the SlowMist Team.
    4. Crypto OpSec Self-Guard RoadMap: Collection and discussion about the best DeFi, Blockchain and crypto-related OpSec research, this project again is upheld by OfficerCia.
    5. Awesome OSINT Blockchain Analysis: a list of useful resources for OSINT investigations on cryptocurrency. This project is maintained by aaarghh on Github.

    Block Bots Effortlessly with Netacea

    Book a demo and see how Netacea autonomously prevents sophisticated automated attacks.
    Book

    Related Blogs

    Knight chess piece
    Blog
    Threat Research Team
    |
    17/10/24

    Evolution of Scalper Bots Part 4: New Bot Tactics vs. Anti-Bot Tools and Legislation

    Uncover the tactics and technologies behind scalper bots from 2015 to 2017. Learn how retailers tried to counter their impact in this era.
    Hand holding magazine
    Blog
    Threat Research Team
    |
    10/10/24

    Combating Content Theft: Maximize Revenue by Securing Your Content

    Discover the impact of content theft and web scraping on your business. Find out how to handle this growing issue and protect your digital assets.
    Fingerprint
    Blog
    Threat Research Team
    |
    24/09/24

    The Truth About Why Server-Side Bot Management Beats Client-Side

    Learn why server-side bot management outperforms client-side detection. Discover how Netacea’s server-side solution enhances security, reduces risks, and scales efficiently.

    Block Bots Effortlessly with Netacea

    Demo Netacea and see how our bot protection software autonomously prevents the most sophisticated and dynamic automated attacks across websites, apps and APIs.
    • Agentless, self managing spots up to 33x more threats
    • Automated, trusted defensive AI. Real-time detection and response
    • Invisible to attackers. Operates at the edge, deters persistent threats

    Book a Demo

    Address(Required)
    Privacy Policy(Required)