Data fraud black industry technical post: How to increase the traffic of WeChat public accounts, Weibo celebrities, and live broadcast influencers

Data fraud black industry technical post: How to increase the traffic of WeChat public accounts, Weibo celebrities, and live broadcast influencers

If you only look at the fraudulent behavior of WeChat public accounts , Weibo celebrities, and live broadcast celebrities, you can only see simple operations, such as public accounts increasing the number of readings and likes, and live broadcasts creating fake audiences through machines or water armies. On a deeper level, we need to start from the technical core of the data falsification black industry and trace back each link of the industrial chain, so that we can see through the surface how much impact and destructive power data falsification has brought to the Internet industry.

Data falsification not only occurs in the internet celebrity economy, but also runs rampant in areas such as gaming , e-commerce , and Internet finance . The means of falsification in each field are slightly different, but the foundation is the same.

The functions of most data falsification companies are nothing more than increasing the number of readings and likes on public accounts. Their systems can also imitate various manual operations, such as game logins and registrations and various gaming actions.

Company A is a typical data falsification company, and the technology they developed is one of the strongest on the market.

Its operating processes include technical systems, core resources and business systems. Among them, the business system is to connect with the business needs of customers.

The core capability of the technical system is to simulate thousands of real-looking mobile phones through one mobile phone, and then operate these simulated mobile phones to perform various order-brushing and volume-brushing tasks.

When you use an Android phone and click on the App in the phone, the App reads the underlying data of the Android operating system and transmits the phone identification data including IMEI number, brand, Wi-Fi, etc. back to the App server, informing that a phone is activating and using the App. The server responds and returns the application data.

This counterfeiting technology system is built by modifying the Android operating system, cutting off the data interface of the Android operating system, and connecting the data interface generated by itself to the system, thereby combining the IMEI number, SIM card number, and telephone number into one.

These data parameters include IMEI, ISI, Mac address, regional latitude and longitude coordinates, mobile phone serial number, Android ID number, mobile phone number, brand, signal, SSID, routing, Wi-Fi, and IP. The counterfeit technology system can freely control the unique identifier of the mobile phone, making every access to the App look like it comes from a real mobile phone.

Based on the successful transformation of the Android underlying system, the technical system is divided into execution unit, database module, application module and scheduling module.

Execution unit: Use one mobile phone to simulate hundreds of thousands to millions of mobile phones. According to Company A, using a Huawei Honor mobile phone, they can simulate 500,000 mobile phones that appear to be used by real people. They place hundreds of mobile phones in the office and use 100-megabit optical fiber to simulate a large number of mobile phones working together.

Database module: Generate the mobile phone parameters that need to be simulated through machine or obtain through resources, including IMEI number, Wi-Fi, IP and mobile phone number.

Application module: Operation scripts that command millions of simulated mobile phones to perform different operations on the target application, including logging in, liking, reading, and rewarding.

Scheduling module: In order to combat the anti-fraud systems of large platforms, the operation of simulated mobile phones must look close to the usage behavior of real users. Therefore, the timing of operations - when millions of mobile phones are turned on, when they log in, and which application they switch to - needs to be executed by the scheduling module. Programmers only need to simulate real-life usage behavior to draw a time curve, and the scheduling module can be executed automatically.

Through such a system, you can also generate a large number of WeChat accounts , and operate the WeChat accounts to increase the number of readings, which is easy.

Some time ago, Tencent took action to eliminate the practice of inflating traffic through a very simple method. Tencent has established data connection with the three major operators , which can see whether the mobile phone number is used by a real user. By identifying fake mobile phone numbers, the number of fake readings can be quickly reduced.

However, this crackdown has stimulated the growth of a black business in mobile phone markets like Huaqiangbei: using Trojans to obtain the real phone numbers of low-priced elderly phones. Therefore, this involves an important part of the data falsification company we mentioned earlier, namely, core resources. In this scenario, the core resource is the real mobile phone number.

The entire mobile Internet industry grows along with the CP business. In the black market circle, CP means profiteering practices such as hidden deductions (deducting traffic and fees through Trojans). However, the CP business was hit hard and has quieted down a lot.

The rise of new mobile platforms such as WeChat has provided new applications for the Trojan horse technologies previously accumulated by CP.

The bosses of Huaqiangbei installed Trojans in the bottom system of elderly phones that cost only one or two hundred yuan, and users cannot see them. After the mobile phone is sold, the mobile phone number can be collected by operating the Trojan horse to send text messages to the phone. You can apply for a WeChat account by using your real mobile phone number, and one WeChat account can be sold for more than 100 yuan. The shipment volume of such mobile phones in Huaqiangbei has reached hundreds of millions.

According to a boss in Huaqiangbei, the monthly shipment volume is 2 million units, one-third of which are shipped domestically, and the rest are shipped overseas, such as in India and Southeast Asia. In other words, the business of inflating sales has also begun to turn to overseas markets. It is precisely because the WeChat account applied for with a real mobile phone is so valuable that the mobile phone can be sold so cheaply.

Tencent’s mechanism has no way of blocking the inflated traffic of these WeChat accounts. Therefore, it can be predicted that in the near future, the public account inflated traffic will become popular again.

In addition to inflating the number of followers, these WeChat accounts can also do everything that real people do. Some companies collected these WeChat accounts, added a large number of model girls as friends, copied the account content of these girls, created a large number of fake model girl WeChat accounts, and then kept adding strangers and collecting red envelopes.

The fraud we see in the internet celebrity economy is just the tip of the iceberg of the numerous fraud industries.

Data falsification involves numerous chains. The entire falsification industry has been highly industrialized, with a clear and precise division of labor. Moreover, the head of the chain leads to listed companies and various bigwigs in the Internet circle.

We thought that the players were just some companies that inflate the traffic or bosses from Huaqiangbei, but that was just a superficial illusion. The above-mentioned Huaqiangbei boss can earn hundreds of millions of yuan a year simply from producing fake WeChat accounts.

Behind the revenue and profits of the counterfeiting industry are various big players in the entire Chinese economy.

Take e-commerce and financial fraud as examples.

Among data falsification, payment-related falsification is particularly resource-intensive. Through fake accounts, such as beautiful girl accounts and pornographic videos, users are eventually lured into making payments. When they find out they have been cheated after making the payment, they will make a large number of complaints to the platform and payment companies.

In the black market, the payment interface’s “anti-complaint” capability is a core capability. Ordinary players do not have this ability and need support from big players behind the scenes.

Among the e-commerce fake order methods, one method is to use TV boxes and home routers to fake orders. When installing boxes and routers, they install Trojans to obtain users' various e-commerce accounts, and then operate these e-commerce accounts to help various e-commerce companies to brush orders. However, it is not something that an ordinary order-brushing company can do to perform these actions.

Therefore, the shrinking data of WeChat public accounts has little impact on the internet celebrity economy and the counterfeiting industry. The data falsification industry is the shadow of China's Internet economy, reflecting the underwater desires of various players.

In the primary market, VCs invest in Internet companies and enter a game of passing the parcel. VCs "encourage" data falsification so that companies can get the next round of money faster and pass the money in rounds until they go public.

In the secondary market, a large number of traditional companies are transforming and undergoing Internet+ transformation. But transformation is so difficult. How many Internet companies are going bankrupt, let alone traditional listed companies? Therefore, listed companies participate in data falsification, incorporate the income generated by the falsification into the company's revenue as "Internet +", and drive up stock prices.

These are the real driving forces behind data falsification. Similarly, these forces and desires are also the real driving force behind the internet celebrity economy. The so-called bursting of the internet celebrity economy bubble is a superficial understanding.

Mobile application product promotion service: APP promotion service Qinggua Media information flow

The author of this article @虎嗅网超症状 is compiled and published by (APP Top Promotion). Please indicate the author information and source when reprinting!

<<:  How much does it cost to attract investment for the Hohhot snack mini program?

>>:  How do web game ads achieve conversions?

Recommend

How to write Double Eleven copy to encourage users to place orders?

When it comes to copywriting , the first thing pe...

Make money by operating Tik Tok, here are the detailed methods!

Yesterday I introduced to you a money-making proj...

up to date! Data rankings of 60 information flow advertising platforms!

Today I bring you the latest traffic rankings of ...

APP promotion tips: What do we do before the APP goes online?

Nowadays, people tend to divide product operation...

Common activity forms and user attraction logic

There are often some popular event cases on the m...

SEO Consulting Services

With the rapid development of the Internet, onlin...

How does Tik Tok create a new traffic empire?

This explosive traffic platform, with its huge ce...

Zhihu brand promotion strategy!

Brand marketing on the Internet has always been a...

The secret of Coca-Cola brand marketing!

In brand marketing , we not only need to promote ...