1. Introduction
The advancement of technology has a significant influence not only on our daily lives, but also on the world around us. The increasing acceptance of blockchain-based cryptocurrencies such as Bitcoin and Ethereum and the Non-Fungible Tokens (NFTs) that accompany them has opened the way for the technology to be put into use in cases that were previously unimaginable. The third generation of the World Wide Web, known as Web3, includes features such as decentralized blockchain technology and token-based economics [
1]. According to the National Institute of Standards and Technology (NIST) [
2], most cryptocurrencies are built on the blockchain, which marks a paradigm shift in digital interactions and acts as the backbone of technology. Furthermore, in contrast to fiat currencies, the blockchain is a decentralized and tamper-resistant ledger that guarantees the accuracy of the information it stores [
2,
3], that is not controlled by the authority of monetary policymaking [
3,
4]. In [
3], the United States Department of Justice created an illustration (see
Figure 1) that highlights and gives a general anatomy for the transaction carried out with cryptocurrencies.
Furthermore, according to the 2021 Crypto Crime Report published by Chainalysis [
5], the total volume of transactions on the cryptocurrency market has increased more than ever and reached approximately
$15.5 trillion in 2021, with an increase of almost 560% in 2020. On the other hand, the Crypto Crime Report [
5] also highlighted that the total amount of illicit cryptocurrency-related criminal activity reached a new high of approximately
$14 billion in 2021 [
6]. Tracking and invisibility in the digital world have become more difficult due to innovative methods combined with the use of cryptocurrency. According to [
7], cryptocurrency has made it easy to carry out illicit and criminal activities (e.g., laundering large amounts of money) while remaining completely anonymous. Furthermore, cryptocurrencies are a well-established means of payment on the dark Web and can be used to trade illegal goods [
8,
9].
According to [
10], as of April 2022, more than 82.8 million
Blockchain.com wallet users are being used to hold and handle different cryptocurrencies around the world.
Figure 2 shows the dramatic increase in the number of wallets between 2012 and 2022. Furthermore, the
Blockchain.com (accessed on 21 May 2022) wallet has averaged around 266,000 transactions per day during the past year [
10]. On the other hand, the Web3 latest-generation wallets have recently been introduced to the market. Two of the most well-known wallets based on Web3 technologies are Metamask, which recently reached 30 million users in 2022 [
11,
12], and Trust Wallet, which is also used by more than 25 million users around the world [
13].
Digital personal identifiers (e.g., Personally Identifiable Information (PII)) of people are becoming increasingly important, as they are utilized by many technologies with which users interact digitally or physically [
15]. Therefore, it is also more than ever important to ensure that these identities are secure and well encrypted. In cryptocurrency, there are two essential digital personal identifiers, public and private keys, which can be stored in many forms, such as digitally and on paper [
3]. Cryptocurrency wallets can digitally store these and also allow users to move their funds across blockchains and track the value of their cryptocurrencies. Furthermore, the introduction of cryptocurrency wallet apps adds to the complexity of the existing challenges of new artifacts found in systems and applications (apps) that change rapidly with each new update [
16,
17].
Cryptocurrency wallets offer their users an environment that allows them to access and transact on blockchain networks. However, cryptocurrency wallet apps have not been studied as thoroughly as many other apps from a digital forensic perspective that also covers privacy and security concerns. This is particularly critical given the increasing number of these services and apps today for many platforms, including the leading mobile operating systems (i.e., iOS and Android). Furthermore, a lack of understanding of these technologies and their features could have contributed to the potential lack of research on them. Furthermore, any information that leads investigators to data that identify the person operating the wallet could be considered personally identifiable information, which is a significant issue that affects the outcome of many investigations.
The need to expand the existing body of knowledge in the area of mobile forensics when it comes to Web3 cryptocurrency wallets is emphasized extensively throughout our work. At the time of this research, no research was available that included the wallets investigated. Therefore, to help forensic investigators and contribute to the body of knowledge, the purpose of this research is to guide investigators to unlock the full potential of cryptocurrency wallets, understand what can be recovered, and look at areas where there are knowledge gaps. Therefore, in this paper, we use a wide variety of techniques that have all played roles in the development of mobile application forensics as it exists today. In addition, to ensure the reproducibility of the digital evidence that was collected, we conducted, validated, and verified the data utilizing two well-known tools. In this study, the use of Magnet Axiom [
18] is an example of an industry standard commercial tool that many practitioners use, compared to Autopsy [
19], which is a well-known open-source forensic tool.
The contributions of this research are as follows:
Digitally analyzed and forensically examined two mobile wallets, Trust Wallet [
13] and Metamask [
11], which are widely used for Web3 cryptocurrencies on Android and iOS devices.
Investigated the possibility that those two wallets kept unencrypted data that might have posed a security risk to the user’s privacy.
Highlighted Personal Identifiable Information (PII) that can be used as evidence.
Recovered and reconstructed wallets and transactions, as well as NFTs that are owned by the wallet owner.
Reviewed the digital evidence that has been collected and discussed the implications of the forensic tools that were used.
Developed an artifact extension for the iOS Logs, Events, And Plists Parser (iLEAPP) [
20] tool to automatically recover information about wallet addresses and transactions as a proof of concept.
The remainder of this paper is structured as follows.
Section 2 discusses the literature review and other related work that has been conducted.
Section 3 explains our research methodology and our experiment design. Detailed findings can be found in
Section 4, while
Section 5 provides an overview of the tool that we created as a proof of concept and as an outcome of this research. A more in-depth assessment of the analysis and the developed plugin and its significance can be found in
Section 6. Finally,
Section 7 concludes our research and gives future research directions. Note that
Table 1 lists all the abbreviations used in the article.
5. Proposed Tool
According to the authors in [
72], it is difficult to obtain a complete picture of what happened over a long period of time in digital investigations without event reconstruction, which may be one of the most significant components to examine in forensic investigations. However, due to the lack of automatic recovery of these transactions when it comes to digital wallets utilizing the used digital forensics software (i.e. Magnet AXIOM, and Autopsy), investigators are left with a large amount of files that they have to cross-examine manually. Therefore, we developed a tool that can help investigators get a picture of the transaction events that occurred on the phone.
The solution focuses on recovering transaction events to provide a complete picture of the transaction using metadata and information extracted from the iOS and Android app files, as well as the use of blockchain technology and data analytics.
As we discussed earlier in the paper, digital forensics tools do not have an automated way to extract mobile crypto wallet-related information. To automate this step, we created an artifact plugin for iLEAPP [
20] as a proof of concept. With this artifact plugin, one can automatically extract public wallet addresses and other artifacts that we discussed in the paper.
Figure 37 shows the result of the tool to recover information from the Metamask app. Furthermore,
Table 8 provides samples of API request parameters that can be used to recover information.
The extension is a proof of concept that employs Open Source Intelligence (OSINT), which is another method of unlocking the full potential of cryptocurrencies. The tool uses data that are publicly stored on the blockchain to compare and verify transactions that occurred on the phone. This allows investigators to differentiate between transactions that involve the investigated device and transactions of the same wallet that occurred using other apps or devices.
Since the blockchain has a public ledger, you can get more detailed information about the wallets, including the other wallets to which the target wallet sent coins. This artifact plugin can be extended to recover more information about the transactions made from the recovered device by using HTTPS caches.
6. Discussion
Digital forensic analysts, researchers, and investigators must employ an innovative approach to analyze, report, and display their findings while conducting cyberforensic investigations that include cryptocurrency wallets and transactions. To improve the reporting approach and provide assistance to expert witnesses and law enforcement, the forensic procedures followed in the investigation of the mobile applications studied here have been presented in detail. In addition, we have made a great effort to select the necessary software, hardware, and other tools for this study so that they are straightforward to replicate.
Furthermore, our research examines devices using validated methods for the preservation and examination of evidence and the tried-and-true techniques provided in
Section 3. Therefore, other researchers in the law enforcement, private sector, and tool developers may benefit from the contribution to the validation technique used in this work.
6.1. Forensics Artifacts
According to our research, although we know that databases can store crucial data and information about user activity, our investigation directly led to the discovery that due to the fact that Metamask and Trust Wallet apps use HTTPS requests, these apps cache and store valuable information in the logs. Therefore, inspecting logs and web cached files by the apps is critical and may lead to great findings. We noted that Transfer/Swapping has two requests related to the transaction, where buy only has one HTTPS request related to that transaction.
Moreover, even after deleting apps, it is possible to recover the wallet addresses that were created or imported into the device using the DeviceID in the proper API request, as discussed in this paper. In addition, we were able to recover some transactions in the unallocated space of the phones using a combination of DeviceIDs and other unique words (e.g., io.metamask, Metamasp.app, Trustapp, and Trust.app) as keywords to search the entire image byte-by-byte (i.e., carving).
The increased popularity of cryptocurrency coins led some companies and stores to accept cryptocurrency coins as a payment method. Furthermore, the popularity in mobile wallets creates new challenges for mobile forensic investigators, and accepting cryptocurrencies as a payment method will also challenge forensic accountants. Especially in the United States, cryptocurrency regulations are strict. To buy cryptocurrency, cryptocurrency money services require identity verification. Therefore, these services will send the user a confirmation email about their purchases. Artifacts, such as emails, can also reveal information related to the time, type of payment, and origin of the cryptocurrency to the investigator. It is significant to tie different artifacts to each other; therefore, we argue that investigators should search for and connect the information found on the devices.
6.2. Security and Privacy Concerns
Blockchain technology has the potential to become a powerful tool that can improve information security and privacy as a result of its immutability, decentralization, and encryption at its core. These characteristics give blockchain technology its promise. In this research, we look at technology from a different perspective. Although the main objective of this study is to improve mobile forensics methods and investigations for new Web3 wallets, we also wanted to draw attention to privacy and security issues with the mobile apps we examined.
The investigation (i.e., analysis and examination) revealed potential privacy and security threats due to the many artifacts kept in plaintext that were not encrypted. We were able to retrieve significant information from http-get requests issued by the apps due to WebKit insufficient encryption implementation, which raises several questions about the security and privacy of these wallets’ users. However, keywords (i.e., secret recovery phrase) and private keys for wallets were encrypted in both apps tested in the study for both phones. Although we were able to find information about the transactions and their decentralized application history, crucial information such as keywords was encrypted. An additional feature that the Trust Wallet provides in its applications is that the user cannot take a screenshot of the screen when it is on the screen with the secret recovery phrase, which is not provided in the Metamask app. It is always a good practice to search the phone for saved or stored secret phrases in other apps such as notes.
In addition, the realm databases were found to contain valuable information for the wallets and actions that were performed on the device. However, in our investigation, we opened the realm databases with an open-source app named Realm Studio because the digital forensic tools that we used, Autopsy and Axiom, were unable to open and process these database files.
As a result of using Realm Studio, we found that most of the realm databases on the Android device were not encrypted, while on the iOS device, all the realm databases are encrypted. In investigations, any evidence, such as that found in the Android realm database, can help investigators in their decision making.
The growing wave of NFT is making NFT platforms increasingly popular. These platforms allow their users to personalize their pages, including usernames and social media accounts, etc. Although crypto wallet addresses are difficult to remember and anonymous, NFT platforms can help law enforcement recover PIIs and link wallets to online personalities. In the Metamask app on iOS, we were able to recover all of the NFT history (i.e., transactions) of purchases, along with the previous owner information and wallet addresses.
As essential as recovering the transactions, it is important to recover the visited services that the user used in the app. According to [
73],
WebKitWebsiteData is a folder that stores information that a certain website has transmitted to the client’s device. This technology has its weaknesses and strengths, and in this research, we were able to recover a lot of information from the WebKit.
Although HSTS is used to help prevent attacks on websites by implementing a policy technique; however, it still left some traces that helped recover the websites/services used in the app. In addition, cookies are similar to HSTS and have provided information along with timestamps for the services visited.
6.3. Automatic Reconstruction
Manual event reconstruction takes a significant amount of time that investigators could instead spend examining/analyzing the evidence. Thus, the tool created as an outcome of this research has the ability to reconstruct transactions stored on the user’s mobile phone and present them. Event reconstruction is necessary to track related transactions and can facilitate relationships between transactions executed by the user.
6.4. Limitations
This research has some limitations. First, we did not include network traffic in the study design. This is needed to investigate security and privacy concerns introduced to app users as a result of their use. Second, analyzing HTTPS caches could cause discrepancies in the automated tool if the applications change their APIs or the way they store the caches, which means that any tool will require maintenance.
7. Conclusions and Future Work
This research can be a great resource for future work on cyber forensics on blockchain apps (e.g., Web3 crypto wallets). Blockchain technologies have found their way into many fields and will continue to grow in a diverse selection of sectors. This drastically increased the number of users who use blockchain technologies. Moreover, the increased popularity of blockchain technologies has attracted the attention of many investors as well as criminal organizations. Although everything seems transparent, techniques such as tumbling of cryptocurrencies can make it difficult to find the origin of the assets.
The findings of this research provide researchers, practitioners, and law enforcement with a roadmap for forensically analyzing and examining Web3 crypto wallets on mobile devices. Furthermore, the investigation enables a deeper understanding of the Web3 crypto wallet artifacts, which can be considered when recovered as significant sources of evidence in many cases. Therefore, they can be used in conjunction with other relevant artifacts to track cyber-financial activities of users.
As discussed earlier, the digital forensic tools used in this study do not automatically target and extract Web3 wallet apps. Therefore, it is crucial to improve known digital forensic tools and strengthen their ability to extract artifacts from Web3 applications. Furthermore, our goal in the future is to extend the plugin by adding more features and implement it in the Android version of the open source tool aLEAPP [
74].