← Back to papers

From Tweet to Theft: Tracing the Flow of Stolen Cryptocurrency

★ ★ ★ ★ ☆

Paper Summary

Paperzilla title
Tracing Stolen Crypto: From Tweet to CEX

This paper traces the flow of stolen cryptocurrency from a Twitter scam involving fake giveaways of Uniswap (UNI) tokens. The scammers used social media to lure victims into sending UNI to their addresses, then consolidated the funds and swapped them for ETH before depositing them into accounts on Binance and SimpleSwap, obfuscating the trail.

Explain Like I'm Five

Scammers tricked people on Twitter into sending them cryptocurrency, then used sneaky ways to hide the stolen money on big exchanges, making it hard to trace.

Possible Conflicts of Interest

None identified

Identified Limitations

Limited generalizability
The study focuses on a single case, making it difficult to generalize the findings to other cryptocurrency scams.
No analysis of scammer's identity
The paper doesn't delve into the identity or motivations of the scammers, which could provide valuable insights.
Reliance on public blockchain data
The analysis relies heavily on publicly available blockchain data, which may not capture the full picture of the scam's operations, especially off-chain activities or interactions with privacy coins.

Rating Explanation

The paper presents a detailed and interesting analysis of a cryptocurrency scam, using blockchain analysis to trace the flow of stolen funds. While limited to a single case, it provides valuable insights into the methods used by scammers and highlights the need for stricter measures by exchanges.

Good to know

This is the Starter analysis. Paperzilla Pro fact-checks every citation, researches author backgrounds and funding sources, and uses advanced AI reasoning for more thorough insights.

Explore Pro →

Topic Hierarchy

Domain: Social Sciences
Subfield: Finance

File Information

Original Title: From Tweet to Theft: Tracing the Flow of Stolen Cryptocurrency
Uploaded: September 11, 2025 at 08:51 PM
Privacy: Public