Data URL:
https://hdanny.org/ransomware-public-data/cerber-locky-addresses.csv.txt
The CSV file above contains wallet addresses to which potential
victims paid ransom for the Cerber and Locky ransomware.
We obtained the data by making micropayments (Section IV-B) to seed
ransom wallet addresses of synthetic victims (Section III-B). Here are
a few examples of the micropayments we made:
* Cerber: 12W8BykzkuRiKVkp64D3iZKSQYQ1cBBhyZ - 0.001 BTC
* Locky: 175mBiaNSSHAhoCbpv25y1rJYK4A7d7d1b - 0.002 BTC
Using the methodology in Section IV, we produce the table in
"cerber-locky-addresses.csv.txt". Here is what each column means:
* family - Ransomware family, either Cerber or Locky
* txn_hash - The transaction in which a potential victim paid ransom
* output_index - The index in the transaction output that corresponds
to the potential ransom wallet address
* potential_ransom_wallet_addr - The ransom wallet address to which a
potential victim paid the ransom
* potential_ransom_btc/usd - The output amount to the address above
* unix_ts - The unix timestamp of the block that contains the
transaction