Shumei Technology: How does the full-stack defense system escort game ROI growth

1. Problem scenarios in the game industry

 

First, any new Internet product must be launched through channels. For example, to buy new users, buy new registrations, and have a place to enter, there must be real traffic from high-quality channels, and fake traffic from low-quality channels. Fake traffic is mainly achieved by means of cloud phones, equipment farms, and point walls. Inferior channels provide false clicks and false users, which affects the ecology of normal game operations, wastes our operating budget, and often loses a lot.

In the next step, if the black product wants to register to the account in batches, it will install the WeChat APP to do batch registration, and especially for games like SLG that are resource-heavy, the gameplay and mode like drawing cards will have the way of reselling the initial number. A batch of accounts qualified to draw cards are sold in batches for a few cents per number. What impact will the initial number reselling have?

First of all, batch registration of accounts will cause operational losses. Originally, card draws are paid for players in subsequent games. The free draw of new accounts is for new users. This will not cultivate users’ good willingness to pay. In addition, registering a large number of accounts in batches caused a lot of consumption of our regional service resources, and the impact was also very large.

There are two sources of account maliciousness: malicious registration and account theft .

Hacking is a black industrial chain with a long history, including from delisting to crashing and washing. What is off the library? Some e-commerce platforms, logistics platforms, and community forums have experienced such things more or less, because the account password used by platform A may also be used by platform B, and the black industry will use the account password library of one platform to hit another For the platform, try to see if it also works.

After hitting the library, you need to wash the library. For example, how many of the 200 effective accounts are high-value accounts. You need to wash out and filter them out. For example, if you have a VIP, you can modify the game equipment. If you have better resources, the black product will It is reserved and even sold on a certain treasure or even a certain fish.

What should I do if the low value is left? Do some things that are cheaper or have lower cost requirements, such as sending spam messages and going to the street in nearby scenes. Scenes like this will be done hierarchically. There is also an account number. Many platforms will decide whether or not the number needs to be risk-controlled based on whether the login of this number is active or not. The black production will make the account active, posing a head, and not being blocked. The entire black production industry Chains are all built around account hacking.

The hacking has undoubtedly caused a very poor experience for deep players. It took time and money to work hard, and the accumulated equipment was looted by black production. This is something that players and platforms are unwilling to see.

At the ecological level, we need to maintain the health of the ecology. We like to use social chat content to attract players to the platform and increase stickiness on the platform. However, UGC itself has many possibilities for violations, such as illegal advertising, political sensitivity, and violence. Content that triggers regulatory risks, such as fear, is a great hidden danger in content regulation.

Since it is a resource, we are a resource-heavy game. The black production can naturally use external scripts to raise accounts. Use the script to sell the unsuccessful part to develop a resource account, which is more expensive than the initial account, because the initial account is not so. Many resources. In the upper left corner is the screenshot of daily brushing, and there will be sales on the right. Many corresponding brushing scripts and corresponding services are provided to the studio. Finally, they are packaged into a resource number and sold for hundreds of thousands of prices. The script is rich in functions and easy to use, just click to start the task.

This directly leads to the depreciation of game tokens and operating resources, affects the balance of the game, and brings huge damage to the mid-game.

In the final stage of realization, there will be such a trauma, which is the risk of gang charging. Help players charge up tokens. You spend 10 yuan to charge you 100 yuan of tokens. How is the black production done?

In fact, there is such an industry chain where players find a certain treasure's store, and the black product claims to be able to help the player make a proxy charge. There are two layers behind, one is the account holder and the other is the refund person.

The account holder is often the Apple ID. If this is the case, refunds will be hindered and risk control, and the account holder is responsible for making the equipment old. At the same time, it is also responsible for recharging. For example, if the player recharges 100 yuan, the account holder and the recharger really recharge 100 yuan, and the refunder will appeal afterwards. This is my child recharged by himself when I was not paying attention to the bath. , Now I want to refund, give some irrefutable reasons, say how bad your game is, you need a refund.

There is a dedicated group of refunders. The reason for the refund is very professional. The refund method, for example, the Taiwan credit card bound in the Apple store, imitates the Taiwanese dialect to call the customer service. The entire operation process is very professional. The payee knows everything about the refund process and every step is very clear. They are professional empty-glove white wolves, and only have the cost of raising an account and raising an apple ID.

 

Second, the game black production chain

 

The whole picture of the whole game black production is the initial number reselling, registration to login, and then top-up purchases, scripting tasks, scripting advertisements, etc., selling these leading WeChat accounts, the following is the industry chain of hacking that includes crashing and washing libraries and many more.

Speaking of accounts, each account needs to be bound to a mobile phone number. I wonder if you have seen this device. The picture on the left is a typical cat pool and card pool. What is this? Can send and receive text messages automatically, so, is this illegal? In fact, it is not. Many mobile operators will also use Maochi. He has to return to TD to unsubscribe. This is made by a machine. This is the buyer of Maochi. This is a serious device, but it is illegal. It's just in use.

This is a 16-port 4G cat pool. It communicates with the base station. The 16-port can insert 16 CIM cards. Someone wants to insert and remove the card, what should I do? Just connect with this card pool, provide the card source for the cat pool, and use the probe to connect to the card source of the cat pool. The green light is the card pool, which is 8×32, or 256 ports. This picture can support SMS of 512 mobile phone cards at the same time. This is a black-produced equipment and very advanced.

The development of hardware and the development of 5G support the optimization of the game system. If players use cloud phones to play games, they don't have to purchase their own phones or PC devices of very good quality and configuration. In fact, black and gray products have long been using cloud phones.

In this picture, the left side is a simulated click that the user can operate on the PC. The 8 mobile phones on the right are instances of 8 cloud phones on the cloud. When operating on the left, the 8 cloud phones on the right can also be operated together. Record the screen and replay the operation on the left to realize automatic operation. At the same time, by adding a timing task mechanism, you can do tasks every day, which is a relatively low-level operation method.

The advanced operation has a functional interface, you can write scripts, the scripts can be random, how long and how long, and there is even text recognition. It is recognized that the four words of the start task are indeed in each area coordinate and click again. There is interaction, not only Screen recording is very powerful. We have our own black industry research institute and have been doing black industry research.

The cloud mobile phone greatly facilitates 1.5 million black-produced employees. The latest cloud mobile phone, Antutu, is said to exceed 100,000 points and has high performance. IP has never been a problem. Let’s take a brief look. Ten million IP pools and a variety of lease cycles. There is always one suitable for you.

This is a coding platform gang that was attacked offline when Tencent, the photos taken on the spot, wearing blue vests are the technology, they are the coding platform, they contract 60% of the QQ login code, and the annual profit exceeds It was 3kw yuan. On the right is their machine, very professional.

Our point is to say that the black production chain is very complete and the division of labor is clear. There are four steps: the first is the mining of black production intelligence, the second is the discovery of loopholes, the preparation of core resources and basic tools on the Internet, and the third is to do evil. Write some tools, and finally monetize. Some can be monetized, and some can sell numbers. The overall number of employees is 1.5 million, and the market size is hundreds of billions.

 

3. How to effectively deal with illegal game production?

 

From the start of the device to the registration of the game, and the login to the business events in the game, we bury all points, including daily business, recharge, modification of avatars, comments, etc., combined with the framework of the integrated solution of Sumei technology, tell everyone this Is it a good person doing it, or a black product doing it.

At the same time, we will also tailor-made the scenes of some special games. For example, many accelerators are used in foreign countries. We do not intercept. A single user virtual machine may act as an anchor. We will not intercept other problems, including local tyrants being drained. , We also have a corresponding plan.

Our characteristic is the real-time deployment and control of the entire path. From startup, registration, login, and business behavior, every point can help you solve problems, including our very big advantages. We believe that safety is the focus of operations, and it is cost confrontation. We continue to close the loop to upgrade operations. We understand the characteristics of this black product and design the strategy. We know the rules, do R&D, verify after R&D, and then go online after verification. After going online, we need to manage it. There is an operational stage. Go back to the case. If there is still no way to penetrate this If the black industry is doing evil scenes, we will do research again. This is our proud advantage.

This is Sumei's global anti-fraud service. It has 7 global service clusters and protects 2 billion users worldwide. The daily interception risk is 50 million.

This case encountered the problem of channel activation. 15% of the channel volume was fake and we identified it. This is another mobile game company. In the registration, 40 of the 100 registrations are problematic registrations, spam registrations, and false numbers. After accessing us, there are almost no accounts in the new server. It is sold outside, and the proportion of external players in the mission scene is very low.

Time is limited. BTOB's booth C202 is the booth of Shumei Technology. The staff will introduce you to the detailed plan. I hope everyone will move. We are waiting for you there, thank you.

Guess you like

Origin blog.csdn.net/SHUMEITECH/article/details/107768638