After implementing a Maltego transform for exploring IPs and domains which is or has been used in the namesystem for Emercoin and Namecoin I will here show a few graphs where it has been used.
Prior research:
- Mapping Out Decentralized Namecoin and Emercoin Infrastructure By Kevin Perlow
- How the Rise of Cryptocurrencies Is Shaping the Cyber Crime Landscape: Blockchain Infrastructure Use
- Evolution of Malware - How do cybercrimes use blockchain to find C&C?
From the FireEye article, the carder domain buybest[.]bazar
is mentioned, lets have it as a starting point in our
exploration:
The observation of the IPs 83.217.11.80
, 92.63.101.2
and 188.227.18.89
shows how blockchain relations can uncover new relations which in best-case scenarios can act as new entry points during investigations where tracking and identification of actors plays a part. Another use-case is to add the uncovered indicators to be monitored for in targeted environments.
A large number of domains are also observed which might have similar use-case during investigations.
Taking another example, this time from Kevin Perlows paper, Fig 4, where healthshop[.]bit
is used as entry point:
Compared to the graph in the paper we are missing the correlation point of when the output Namecoin address is used as an input address to update the state of another domain. Adding support for it would be a valuable improvement.
Another carding websites relation, starting point cvvfresh[.]bazar
:
Both IPs are in close range to each other, same ISP, MivoCloud
, located in Moldovia, very likely that the same actor is behind all three domains.
Hopefully you as a reader has gotten an idea of the possibilities and limitations of this Maltego transform.