In this research, we analyze donation-based abuses across five social media platforms: X (formerly known as Twitter), Instagram, Telegram, Facebook, and YouTube. This documentation includes the code and data generated to identify fraudulent donation solicitations. The system apparatus requires private API keys, an in-house MongoDB database installation, and several other dependencies listed below. Although, it is not a plug-and-play solution, we aim that our data and code foster future science.
We have two main component as part of the artifacts summary. Below we provide further details.
The first component collects data from various social platforms to identify fraudulent donation solicitations using multiple third-party services. These fraudulent social media profiles are then analyzed based on their profile metadata, such as URLs, phone numbers, and email addresses associated with fraud. The code implementation is available in the code/
directory. Below, we provide key implementations with references to sections of our paper.
Implementation | Paper Section Reference | Code Reference |
---|---|---|
Donation Keywords | Section 2.1 | link |
Data Collection | Section 2.1 | link |
Scam Filtration | Section 2.2 | link |
Post/Image Clustering | Section 4, Appendix E and F | link |
Scam Data Analysis Analysis | Section 5 | link |
Fraud Email, Phone Numbers, and URLs Analysis |
Section 6 | link, link |
The second component evaluates the raw data collected, delving into the scammer's profile data, fraudulent communication channels (emails, phone numbers, and URLs), and cryptocurrency addresses. In data/
directory we provide the data related to each analysis. Below, we provide key findings with references to sections of our paper.
Findings | Paper Section Reference | Results Reference |
---|---|---|
Scam Overview, Profile Creation and Engagement Overview | Section 3, Appendix C | link |
Scammer's Posts Clustering | Section 5.3 | link |
Evaluation of Fraud Communication Channels | Section 4 | link, link, link |
Financial Validation and Payment Tracking | Section 6 | link |
Evaluation of Scammer Profile Image | Appendix F | link |
@inproceedings{acharya_pirates_of_charity_2025,
author = {Acharya, Bhupendra and Lazzaro, Dario and Emanuele Cinà, Antonio and Holz, Thorsten},
title = {{Pirates of Charity: Exploring Donation-based Abuses in Social Media Platforms}},
booktitle="ACM World Wide Web Conference (WWW)",
year={2025}
}
We welcome any questions or discussions to further explore similar attacks on social media. Please feel free to reach out via [email protected]
or reach out via personal website.
We release our code and data as per MIT License. The copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. See License text for more information.