Skip to main content

Unearthing malicious campaigns and actors from the blockchain DNS ecosystem.

Casino, F., Lykousas, N., Katos, V. and Patsakis, C., 2021. Unearthing malicious campaigns and actors from the blockchain DNS ecosystem. Computer Communications, 179 (November), 217 - 230.

Full text available as:

malware_on_distributed_platforms(1).pdf - Accepted Version
Available under License Creative Commons Attribution Non-commercial No Derivatives.


DOI: 10.1016/j.comcom.2021.08.023


Blockchain DNS has emerged as an alternative solution to traditional DNS to address many of its inherent drawbacks. In this regard, a blockchain DNS approach is decentralised, resilient, provides high availability, and prevents censorship. Unfortunately, despite these desirable features, the major blockchain DNS solutions to date, Namecoin and Emercoin have been repeatedly reported for malicious abuse, ranging from malware distribution to phishing. In this work, we perform a longitudinal analysis of both these chains trying to identify and quantify the penetration of malicious actors in their ecosystems. To this end, we apply a haircut blacklisting policy and the intelligence collected from various engines to perform a taint analysis on the metadata existing in these blockchains, aiming to identify malicious acts through the merge of identifying information. Our analysis provides an automated validation methodology that supports the various reports about the wide-scale abuse of these solutions showing that malicious actors have already obtained an alarming and extensive share of these platforms.

Item Type:Article
Uncontrolled Keywords:Blockchain; Blockchain Forensics; Cybercrime; DNS; Malware; Decentralised DNS
Group:Faculty of Science & Technology
ID Code:36303
Deposited By: Symplectic RT2
Deposited On:29 Nov 2021 10:39
Last Modified:03 Sep 2022 01:08


Downloads per month over past year

More statistics for this item...
Repository Staff Only -