Analyzing Target-Based Cryptocurrency Pump and Dump Schemes

As the number of cryptocurrencies has exploded in recent years, so too has the fraud. One popular strategy is when actors promote coordinated purchases of coins in hopes of temporarily driving up prices. Prior work investigating such pump and dump schemes has focused on the immediate impact to prices following pump signals, which were largely interpreted as following the same strategy. The reality, as with most cybercrimes, is that the operators of the schemes try out a much more heterogeneous mix of tactics. From a population of 12,252 pump signals observed between July 2017 and January 2019, we identify and examine 3,683 so-called target-based pump signals that announce promoted coins alongside buy and sell targets, but without a coordinated purchase time. We develop a strategy to measure the success of target pumps over longer time horizons. We find that around half of these pumps reach at least one of their sell targets, and that reaching their peak price often takes days, as opposed to the seconds or minutes required in pumps studied previously. We also examine the various groups promoting coins and present evidence that groups try a variety of distinct strategies and experience varying success. We find that the most successful groups promote many coins and issue many pumps, but not for the same coins. As decentralized finance becomes more popular, a deeper understanding of price manipulation techniques like target pumps is needed to combat fraud.

[1]  Neil Gandal,et al.  Price Manipulation in the Bitcoin Ecosystem , 2017 .

[2]  Benjamin Livshits,et al.  The Anatomy of a Cryptocurrency Pump-and-Dump Scheme , 2018, USENIX Security Symposium.

[3]  J. Kamps,et al.  To the moon: defining and detecting cryptocurrency pump-and-dumps , 2018, Crime Science.

[4]  Tyler Moore,et al.  Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk , 2013, Financial Cryptography.

[5]  Nicolas Christin,et al.  Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem , 2015, USENIX Security Symposium.

[6]  J. Griffin,et al.  Is Bitcoin Really Untethered? , 2020 .

[7]  Guy-Vincent Jourdan,et al.  An Automatic Detection and Analysis of the Bitcoin Generator Scam , 2020, 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).

[8]  Tyler Moore,et al.  There's No Free Lunch, Even Using Bitcoin: Tracking the Popularity and Profits of Virtual Currency Scams , 2015, Financial Cryptography.

[9]  Neil Gandal,et al.  The Economics of Cryptocurrency Pump and Dump Schemes , 2018 .

[10]  Maurizio Tesconi,et al.  Charting the Landscape of Online Cryptocurrency Manipulation , 2020, IEEE Access.

[11]  Fred Morstatter,et al.  Identifying and Analyzing Cryptocurrency Manipulations in Social Media , 2019, IEEE Transactions on Computational Social Systems.

[12]  Wei Wu,et al.  IcoRating: A Deep-Learning System for Scam ICO Identification , 2018, ArXiv.

[13]  Tyler Moore,et al.  An Examination of the Cryptocurrency Pump and Dump Ecosystem , 2018 .