Shumei Technology | "Double Eleven" whole network carnival, it is urgent to prevent "black production"

It has been more than ten years since Taobao first launched the "Double Eleven" in 2009. This annual shopping spree has given the national "hands-hands party" a reason that has been irresistible for many years-"price history is low" ! Coupons, red envelopes, points, more relentless profits, greater discounts, more stocking, and various promotions are dazzling.

You know, Double Eleven is also the "carnival season" of black production. At this time, various "marketing activities fraud" will also be staged intensively, including: reselling coupon resources, scalping and reselling to make a difference, brushing orders to obtain platform preferential subsidies, etc., all directly refer to the "benefits."

Insert picture description here
Based on the long-term collection of black industry information, the mining and monitoring of black industry gangs, and the research of various fraud methods, SUMEI Technology Black Industry Research Institute has recently discovered a large number of new developments in black industry, almost all of which clearly point to the upcoming " Double Eleven’s annual e-commerce promotion.

1. Card dealers actively prepare new cards

Recently, in the card merchant docking group, the demand for registered cards on the leading e-commerce platforms has increased significantly, and a large number of black producers are seeking cooperation from relevant card merchants to run cards.

In daily hours, in order to avoid risks, card merchants generally declare that they will not do projects on these large e-commerce platforms: on the one hand, such cards are relatively scarce, on the other hand, in order to avoid legal risks (the public security agency may intervene). However, at the point of Double Eleven, a large number of card dealers still ventured out to take orders, which is enough to show that the demand is large and the profit margin is considerable.

Insert picture description here
Account registration requires a large number of mobile phone numbers to receive verification codes. To meet this demand, code-receiving platforms and card vendors have emerged.

The code receiving platform is essentially composed of many card vendors. The card vendors have many mobile phone cards that can be used to receive SMS or voice verification codes. The card vendors insert the mobile phone card into the card pool, and communicate with the base station through the cat pool to send and receive verification codes. Upload the SMS record to the server of the code receiving platform through specific software, so as to realize the complete function of a code receiving platform.

2. Centralized stocking of e-commerce accounts

On major card issuing platforms, various e-commerce and payment accounts are sold in large numbers, including small accounts, real-name accounts, and old accounts. The trumpet account can be used to complete all kinds of invitations to facilitate interaction, the real-name account can be used for payment scenarios such as raising account number and stolen goods, and the old account can be used to swipe orders. In the early days of Double Eleven, black producers can raise a large number of accounts in advance, receive a large number of coupons, and place orders directly on Double Eleven.

Insert picture description here
Account numbers are the basis of black production operations. Black production uses the code-receiving platform to obtain a large number of mobile phone numbers to register on the e-commerce platform, connect to the coding platform to bypass verification code verification, and use the proxy IP to replace the IP to achieve the purpose of batch registration.

After successful registration, you can also perform real-name registration, log in regularly to increase account activity, and you can also tie card shopping to increase the account level, etc., and then sell a certain level of account.

Three, script tools take turns in battle

In the double eleven warm-up event, major e-commerce platforms have launched various red envelopes/perks/gold coins and other preferential activities and game rules. Normal users must complete designated tasks every day to get them, but manually complete all platform tasks every day almost impossible.

In response to this situation, black production has launched a large number of auxiliary scripts that use simulated click tools to complete tasks, including pure JS scripts executed in browser debugging mode, Auto.js based on accessibility services, and trigger scripts. Just run the script. Complete operations such as visiting shops, visiting conference venues, visiting products, and signing in.

Insert picture description here
The use of scripts is one of the main characteristics that distinguish the black production from the ordinary wool party. Script hackers and script studios are one of the upstream roles in the entire black production chain. They use tools to integrate the platform’s business logic with related black production resources (coding platform, equipment, proxy IP, coding platform) to make black Production operations can be batched and replicated to maximize input and output in a short time.

Four, merchants intensively brush orders

Double Eleven is not only the peak of annual sales, but also a period of high issuance of illegal orders. Swiping orders before Double Eleven can effectively increase the exposure of the store, and increase the customer source and sales of the store during the Double Eleven period; during the Double Eleven period, due to the high order flow, high-frequency ordering in a short period of time is not easy to be electric The risk control system of the merchant platform recognizes, therefore, the transaction has become one of the important "businesses" of the black industry.

It is worth noting that the card merchants/script hackers/number merchants/proxy IP vendors have constituted a complete industrial chain of black production. The most upstream supplier-the card merchant provides verification code sending and receiving services, and the hacker is responsible for writing script software. Provide finished accounts, and IP vendors provide dynamic IP switching services.

Insert picture description here
The upstream industry chain has the resources and elements needed to carry out any black production project. Next, it only needs to find a profitable platform, combine specific business logic and loopholes, generate a new black production project, and start spreading.

In fact, the power of the Wool Party is much stronger than we imagined. Take an e-commerce platform as an example. It launched an activity to invite 5 new users to send a 60 yuan phone bill. In less than a day, the 600w phone bill was wiped out. . A certain sports party used batch software to help others brush, and the commission for brushing was as high as 2,000 yuan in just half a day.

Insert picture description here
According to the observation by the dean of the Black Industry Research Institute of Digital America Technology , a profit-making forum has become an important channel for most wool parties to share and collect “wool” information. According to real-time online data, its peak appeared on Double Eleven last year, which is enough to explain The importance of Double Eleven to the wool party. This year's Double Eleven, whether this number will be refreshed, I believe time will give us the answer.

The Dean of the Black Industry Research Institute of Shumei Technology also revealed that as of now, for this year's Double Eleven, all the upstream roles of the black industry have been prepared and are eager to try. Major e-commerce platforms may face sudden threats of risk control. To effectively prevent fraud in various marketing activities and avoid the loss of marketing expenses, you must make the following preparations:

(1) Carefully review the activity rules to avoid rule loopholes and be exploited by hacked assets.
(2) Strengthen
risk control rules and tighten strategies to avoid slipping through the net. (3) Establish real-time risk monitoring and early warning mechanisms to avoid emergencies Event
(4) Timely access to third-party risk control services

Guess you like

Origin blog.csdn.net/SHUMEITECH/article/details/108475054