Smart Technology Innovations: ASU Researchers Unlock Keys & Clues in Crypto Development

2 min read

Keys, clues and crypto: How ASU researchers are building smarter tech

The anonymity offered by cryptocurrency has made it an appealing option for cybercriminals seeking to maneuver vast sums of money without detection. For those aiming to elude authorities, cryptocurrency serves not merely as an intriguing asset but as an ideal escape vehicle: swift, discreet, and confidential.

Cybersecurity Expert Tackles Crypto-Fueled Crime

Gail-Joon Ahn, a distinguished professor of computer science and engineering at Arizona State University’s School of Computing and Augmented Intelligence, is recognized for his contributions to enhancing computer security systems. He is now focusing his considerable expertise on a significant issue in cybersecurity: disrupting the operations of cybercriminals who exploit cryptocurrency.

Cryptocurrency functions as a form of digital currency that operates independently of traditional banking systems and governmental oversight. It utilizes blockchain technology, which is a decentralized digital ledger that records all transactions across a network of computers. When cryptocurrency is transferred, the transaction is verified by network participants and subsequently recorded on the blockchain. This process does not require personal identifiers, allowing for seamless and often anonymous financial exchanges. “Users with legitimate intentions are drawn to cryptocurrency for its irreversible nature, security, and efficiency,” Ahn explains. “Regrettably, these same characteristics also attract those intent on perpetrating financial fraud.”

Investigating the Financial Trail of Cybercrime

Ahn’s interest in the intersection of cryptocurrency and cybercrime was piqued by the infamous CryptoLocker attack in 2014. CryptoLocker was a type of ransomware that typically infiltrated systems through harmful email attachments. Once activated, the malware would encrypt users’ files using highly secure cryptographic techniques, demanding a ransom in bitcoin within a strict time limit, usually 72 hours, or risk permanent loss of access to their data. The encryption was particularly perilous as it was nearly impossible to decrypt without the private key held by the attackers.

Ahn postulated that cybersecurity experts could trace and identify payments made to the perpetrators of this malware. By scrutinizing blockchain data, including timestamps and payment trends, his team uncovered 795 ransom transactions amounting to 1,128.40 bitcoin, valued at approximately $310,472 during that period. Their findings revealed that bitcoin transactions were not entirely anonymous, and meticulous analysis of blockchain information could yield unexpected connections and insights.

To demonstrate that blockchain data could facilitate digital detective work, Ahn’s team delved deeper. They discovered that the CryptoLocker hackers not only collected ransom payments but also laundered the funds to obscure their financial trails. The researchers charted the movement of cryptocurrency from victims to various central wallets where the funds were aggregated. One striking discovery was a potential connection to the Sheep Marketplace scam, which resulted in the theft of roughly 96,000 bitcoin, worth over $100 million at the time. Although direct links between the two crimes were not established, the movement of funds identified by the ASU researchers indicated possible collaboration among different criminal entities.

Innovative Solutions for Cybercrime Prevention

While tracking down threats is important, Ahn’s primary objective is to preempt cybercrime. As their research progressed, the team shifted focus towards developing new strategies to safeguard cryptocurrency transactions. In 2023, Ahn and his colleagues secured a patent for their innovation titled “Systems and Methods for Blockchain-Based Automatic Key Generation.”

This new method generates secure digital keys utilizing data already present on the blockchain. Instead of depending on a centralized server, Ahn’s approach randomly selects a visible piece of data that remains unpredictable. This data acts as a seed for creating a unique security key. Since the seed is derived from publicly accessible blockchain records, users can generate matching keys without exchanging sensitive information online. The seeds are frequently updated, enhancing security while preventing delays or vulnerabilities associated with single points of failure.

Ahn and his team are also seeking partnerships with local and state law enforcement agencies to explore how their patented technology can be utilized to monitor and identify malicious activities within blockchain transactions. Such proactive measures would greatly contribute to fostering more secure and resilient digital communities.

Addressing Cyber Threats with Innovative Research

Nadya Bliss, the executive director of the ASU Global Security Initiative, where the CTF’s research is primarily conducted, emphasizes the significance of both understanding threats and creating effective countermeasures. “Cyber defense often resembles a game of catch-up, where malicious actors frequently hold the upper hand. Researchers like Gail are striving to change that dynamic,” Bliss states. “This type of research, which yields innovative tools with practical applications, is precisely what is necessary.”

Ahn aspires that the methodologies developed by his team will assist in future investigations. As the landscape of cybercrime continues to evolve, it is imperative that our tools for analyzing and combating these threats advance in tandem. “It’s somewhat of a cat-and-mouse game,” Ahn reflects. “However, it is crucial for us to track down the mouse.”