Paper Summary
Paperzilla title
Tracing Stolen Crypto: From Tweet to CEX
This paper traces the flow of stolen cryptocurrency from a Twitter scam involving fake giveaways of Uniswap (UNI) tokens. The scammers used social media to lure victims into sending UNI to their addresses, then consolidated the funds and swapped them for ETH before depositing them into accounts on Binance and SimpleSwap, obfuscating the trail.
Possible Conflicts of Interest
None identified
Identified Weaknesses
The study focuses on a single case, making it difficult to generalize the findings to other cryptocurrency scams.
No analysis of scammer's identity
The paper doesn't delve into the identity or motivations of the scammers, which could provide valuable insights.
Reliance on public blockchain data
The analysis relies heavily on publicly available blockchain data, which may not capture the full picture of the scam's operations, especially off-chain activities or interactions with privacy coins.
Rating Explanation
The paper presents a detailed and interesting analysis of a cryptocurrency scam, using blockchain analysis to trace the flow of stolen funds. While limited to a single case, it provides valuable insights into the methods used by scammers and highlights the need for stricter measures by exchanges.
Good to know
This is our free standard analysis. Paperzilla Pro fact-checks every citation, researches author backgrounds and funding sources, and uses advanced AI reasoning for more thorough insights.
File Information
Original Title:
From Tweet to Theft: Tracing the Flow of Stolen Cryptocurrency
Uploaded:
September 11, 2025 at 08:51 PM
© 2025 Paperzilla. All rights reserved.