skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


This content will become publicly available on November 4, 2025

Title: Give and Take: An End-To-End Investigation of Giveaway Scam Conversion Rates
The Internet's combination of low communication cost, global reach, and functional anonymity has allowed fraudulent scam volumes to reach new heights. Designing effective interventions requires first understanding the context: how scammers reach potential victims, the earnings they make, and any potential bottlenecks for durable interventions. In this short paper, we focus on these questions in the context of cryptocurrency giveaway scams, where victims are tricked into irreversibly transferring funds to scammers under the pretense of even greater returns. Combining data from Twitter (also known as X), YouTube and Twitch livestreams, landing pages, and cryptocurrency blockchains, we measure how giveaway scams operate at scale. We find that 1 in 1000 scam tweets, and 4 in 100,000 livestream views, net a victim, and that scammers managed to extract nearly $4.62 million from just hundreds of victims during our measurement window.  more » « less
Award ID(s):
2152644
PAR ID:
10594318
Author(s) / Creator(s):
; ; ; ; ; ; ; ;
Publisher / Repository:
Proceedings of the 2024 ACM Internet Measurement Conference
Date Published:
ISBN:
9798400705922
Page Range / eLocation ID:
704 to 712
Format(s):
Medium: X
Location:
Madrid Spain
Sponsoring Org:
National Science Foundation
More Like this
  1. Gross, Thomas; Vigano, Luca (Ed.)
    We present the results of a research study in which participants were subjected to social engineering attacks via telephone, telephone scams, in order to determine the features of scams which peopleare most susceptible to. The study has involved 186 university participants who were attacked with one of 27 different attack scripts which span different independent variables including the pretext used and the method of elicitation. In order to ensure informed consent, each participant was warned that they would receive a scam phone call within 3 months. One independent variable used is the time between the warning and launching the scam. In spite of this warning, a large fraction of participants were still deceived by the scam. A limitation to research in the study of telephone scams is the lack of a dataset of real phone scams for examination. Each phone call in our study was recorded and we present the dataset of these recordings, and their transcripts. To our knowledge, there is no similar publicly-available dataset or phone scams. We hope that our dataset will support future research in phone scams and their detection. 
    more » « less
  2. Good jobs that allow remote work have enabled white-collar professionals to stay home during COVID-19, but for precarious workers, online advertisements for work-from-home employment are often scams. In this article, based on in-depth interviews conducted between April and July 2020 with nearly 200 precarious workers, we find that precarious workers regularly encountered fraudulent job advertisements via digital media. Drawing on Swidler’s concepts of the cultural tool kit and cultural logic, we find that in this time of uncertainty, workers defaulted to the focus on personal responsibility that is inherent in insecurity culture. Following the cultural logic of personal responsibility, job seekers did not place blame on job search websites for allowing the scams to be posted, but normalized the situation, deploying a scam detection repertoire in response. In addition, the discovery that advertised “good jobs” are often scams affecting workers’ desire to continue job hunting and perceptions of potential future success. 
    more » « less
  3. null (Ed.)
    Email remains one of the most widely used methods of communication globally. However, successful phishing email attacks and subsequent costs remain unreasonably high despite technical advances in defenses that limit phishing scams. In this paper, we examine human detection of phishing. We found that non-experts go through four different sensemaking processes to determine if an email is a phishing message; they use different knowledge and skills to become suspicious differently in each process. Additionally, non-experts rely on their social connections as an investigative tool to determine if an email is a phishing scam. We discuss the impact of our findings on phishing training and technology. 
    more » « less
  4. The increasing use of computer technologies to perform everyday activities simplifies living, but brings the underlying cybersecurity concern to the fore. Due to the accessibility of smartphones, many teenagers are “online” for significant hours in a day. Many middle and high school students have been victims of a cybercrime through online activities. Additionally, various incidents of Internet fraud have been reported where teenagers are persuaded to buy games, music, and videos without realizing they are falling for a scam or disclosing their credit card information. Studies have shown that implementing a successful security awareness camp is crucial in boosting cybersecurity and attracting talent to this domain. This paper discusses our efforts on creating smartphone apps in the context of cyber-security to encourage safe use of apps and raise awareness among teenagers. The strategy used is to develop apps with the intention of closing security gaps. By doing this, teenagers gain a wealth of information about cybersecurity. This work aims to develop students' problem-solving skills and create a cybersecurity mindset for dealing with real-world cybersecurity-related problems such as malware or phishing assaults and to promote interest in cybersecurity careers among high school students utilizing smartphone-based interactive learning modules. We also examine gender-specific patterns and evaluate whether students' cybersecurity problem-solving skills have improved due to this novel intervention. 
    more » « less
  5. Abstract Though much is known about children's sexual abuse disclosure, less attention has been directed towards disclosure in other types of youthful victims, especially those who may be reluctant to tell due to either normative development or victims' specific experiences. Trafficked youth, particularly those who are adolescents, represent one such group. Understanding how suspected youth trafficking victims are questioned by authorities, especially with respect to establishing rapport and trust, is important for informing professionals how to effectively question this unique population of victims to overcome their reluctance. We examined transcripts of interviews conducted by federal interviewers (n = 12,653 question‐answer turns across 33 interviews) and police (n = 4,972 question‐answer turns across 14 interviews) with trafficked youth between the ages of 12 and 18. Interviews were reliably coded for the length of pre‐substantive questioning, provision of instructions and ground rules, and use of rapport building and supportive strategies. Federal interviewers used pre‐substantive instructions and built rapport with potential victims more often than police did. Also, and although infrequently used overall, supportive interviewing strategies were evident more often by federal interviewers than police. Results provide much‐needed knowledge about how law enforcement investigators interview and elicit disclosures from vulnerable populations of adolescent victims. 
    more » « less