Blockchain Forensics - Unmasking Anonymity in Dark Web Transactions
DOI:
https://doi.org/10.6000/1929-4409.2025.14.07Keywords:
Blockchain forensics, cryptocurrency tracing, dark web, money laundering, cybercrimeAbstract
This paper analyzes the impact of blockchain forensic techniques on combating cybercrime in the dark web. Although cryptocurrencies were originally celebrated for their decentralized and anonymous characteristics, advancements in blockchain analytics have allowed law enforcement agencies to track unlawful transactions with greater precision. This paper investigates forensic techniques including clustering, heuristic analysis, and address tagging to identify offenders involved in money laundering, drug trafficking, and ransomware transactions. This paper examines real-world case studies, including as the dismantling of Silk Road and Chainalysis's involvement in tracing illicit wallets, to illustrate the dynamic adversarial relationship between cybercriminals and law enforcement agencies. It also addresses the legal and ethical dilemmas associated with blockchain surveillance. The findings indicate that although blockchain forensics has markedly advanced cybercrime investigations, the emergence of privacy-enhancing technologies presents new challenges necessitating policy adjustments.
References
A. Zohar, “Bitcoin: Under the Hood,” Communications of the ACM, vol. 58, no. 9, pp. 104–113, 2015. DOI: https://doi.org/10.1145/2701411
B. Smith, “FBI Recovers Colonial Pipeline Ransom Payment,” BBC News. (Online). Available: https://www.bbc.com/news/ technology-57399493.
“Bitfinex Hack Money Launderers Plead Guilty,” Chainalysis. (Online). Available: https://www.chainalysis.com/blog/bitfinex-hack-plea-july-2023.
“Colonial Pipeline Ransomware Attack: What Happened?” CISA. (Online). Available: https://www.cisa.gov/news-events/ cybersecurity/colonial-pipeline-ransomware-attack.
“Cracking the Silk Road & Capturing Darknet's DPR,” Forensics Colleges. (Online). Available: https://www.forensicscolleges. com/blog/forensics-casefile/silk-road.
F. Reid and M. Harrigan, “An Analysis of Anonymity in the Bitcoin System,” in Security and Privacy in Social Networks, Springer, 2013, pp. 197–223. DOI: https://doi.org/10.1007/978-1-4614-4139-7_10
G. Gai, C. Jiang, S. Guo, and Y. Qian, “Blockchain and Smart Contract for IoT-Based Applications: A Survey,” IEEE Internet of Things Journal, vol. 8, no. 2, pp. 1371–1392, 2021. DOI: https://doi.org/10.1109/JIOT.2020.3036705
J. Möser, R. Böhme, and D. Breuker, “An Inquiry into Money Laundering Tools in the Bitcoin Ecosystem,” APWG eCrime Researchers Summit, 2013. DOI: https://doi.org/10.1109/eCRS.2013.6805780
J. Osterrieder, S. Lokhov, and T. Shams, “Detecting Anomalies and Frauds in Blockchain Networks,” arXiv preprint arXiv:2402.11231, 2024. (Online). Available: https://arxiv.org/abs/2402.11231.
J. W. Creswell, Research Design: Qualitative, Quantitative, and Mixed Methods Approaches, 4th ed., SAGE Publications, 2014.
“Lessons Learned from the Silk Road Investigation,” Belkasoft. (Online). Available: https://belkasoft.com/silk-road-investigation-lessons-learned.
M. Atlam and G. Wills, “Blockchain Forensics: A Systematic Literature Review,” Electronics, vol. 13, no. 17, 2023. DOI: https://doi.org/10.3390/electronics13173568
M. Conti, S. Kumar, C. Lal, and S. Ruj, “A Survey on Security and Privacy Issues of Bitcoin,” IEEE Communications Surveys & Tutorials, vol. 20, no. 4, pp. 3416–3452, 2018. DOI: https://doi.org/10.1109/COMST.2018.2842460
M. Möser, K. Soska, E. Heilman, K. Lee, H. Narula, and N. Christin, “An Empirical Analysis of Traceability in the Monero Blockchain,” Privacy Enhancing Technologies Symposium, vol. 2018, no. 3, pp. 143–163. DOI: https://doi.org/10.1515/popets-2018-0025
P. Campisi and C. Celeste, “Cryptocurrency Mixing Services: Analysis and Detection,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2089–2102, 2021.
P. Dasaklis, N. Casino, and C. Patsakis, “Blockchain-based digital forensic tools: A classification and research outlook,” arXiv preprint arXiv:2005.12640, 2020. (Online). Available: https://arxiv.org/abs/2005.12640.
R. K. Yin, Case Study Research and Applications: Design and Methods, 6th ed., SAGE Publications, 2018.
S. Bonomi, R. Di Pietro, and F. Martinelli, “B-CoC: A Blockchain-Based Chain of Custody for Digital Forensics,” arXiv preprint arXiv:1807.10359, 2018. (Online). Available: https://arxiv.org/abs/1807.10359.
S. Foley, J. R. Karlsen, and T. J. Putniņš, “Sex, Drugs, and Bitcoin: How Much Illegal Activity is Financed Through Cryptocurrencies?,” Review of Financial Studies, vol. 32, no. 5, pp. 1798–1853, 2019. DOI: https://doi.org/10.1093/rfs/hhz015
S. Meiklejohn, M. Pomarole, G. Jordan, et al., “A Fistful of Bitcoins: Characterizing Payments Among Men with No Names,” Proc. ACM Internet Meas. Conf., 2013, pp. 127–140. DOI: https://doi.org/10.1145/2504730.2504747
T. Y. K. Huang and P. Saxena, “A Closer Look at Bitcoin Mining Pools: Security and Privacy Implications,” Proc. IEEE Symposium on Security and Privacy Workshops (SPW), 2019, pp. 451–466.
“The US$4.5 Billion Bitfinex Hack – Five Things You Should Know,” Hogan Lovells. (Online). Available: https://www.hoganlovells. com/en/publications/the-us45-billion-bitfinex-hack-five-things-you-should-know.
V. Filipov and V. Bilić, “A Modern Approach to Investigating Financial Crimes Using Blockchain Forensics,” ResearchGate, 2023. (Online). Available: https://www.researchgate.net/publication/ 368910848_Blockchain_Forensics.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Policy for Journals/Articles with Open Access
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are permitted and encouraged to post links to their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
Policy for Journals / Manuscript with Paid Access
Authors who publish with this journal agree to the following terms:
- Publisher retain copyright .
- Authors are permitted and encouraged to post links to their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work .