1. Brush the bill
Advertising companies pay people to pretend to be customers and increase the sales of products in a false way to attract customers. It is divided into machine brush and human brush. Machine brush sheet refers to the use of group control and other equipment to unify a large number of brush sheets, while real brush sheets are part-time jobs for college students.
The picture shows the group control equipment, which was originally developed for the centralized management of enterprise hardware and marketing. "Equipment" has two sides.
2. Activity arbitrage
Commonly known as bonus hunter. 20 14 Guangzhou newly established an internet finance company. In order to attract consumers to buy their own wealth management products, the company issued various coupons worth 200 million yuan, which was taken away by a 5,000-person "wool party" team. In less than half a year, the company declared bankruptcy. For example, before mobike and others enjoyed the activity of giving red envelopes by car, all kinds of virtual positioning software were opened, and mobike cried. PS: Virtual positioning software is really an artifact to treat nailing and punching. I don't know. Everyone is a conscientious employee.
Encourage cheating
(1) Display cheating: The media put multiple display advertisements in the same advertising space, and overcharged advertisers for the display of multiple advertisements;
(2) Click cheating: simulate real users through scripts or computer programs, or hire and encourage users to click to generate a large number of useless advertising clicks, thus eating the CPC advertising budget;
③ Cheating in installation/activation: simulating download through a tester or simulator, modifying equipment information manually or technically through a mobile phone, cracking the SDK to send virtual information, simulating download activation, etc.
(4) In-app cheating: the typical means is purchase fraud, that is, users or players get content or products without paying, resulting in high income data in the control panel and report;
⑤ False traffic cheating: including non-artificial traffic, massive injected incentive traffic and hijacking;
6 Cheating on traffic attribution: The advertising platform did not accompany the advertiser's budget to the redirected advertisement according to the last click mode, and many users have almost converted, resulting in a waste of budget.
4. False activation
Common means include simulating download through a tester or simulator consistent with clicking, modifying device information manually or technically by moving, cracking SDK to send virtual information, simulating download activation and so on.
5. Account theft ... Numbers
The server websites of major enterprises are often attacked by hackers, such as Qunar.com and Home Inns. It will not only cause the leakage of customer information, but also reduce the user experience and loyalty, which will bring immeasurable losses to the enterprise.
6. Malicious registration
Registered robots register a large number of accounts, and many "junk" accounts appear on the website. As a result, the water army, * * and advertisements appeared in the comment area of the website, and the popular content released illegal information.
7. Library collision attack
Hackers collect leaked user and password information on the Internet, based on a large number of users. The corresponding dictionary table is generated, and a series of users can log in after trying to log in to other websites in batches by using the same registration habits of users. User information of JD.COM and 12306 websites has also been obtained by criminals through library collision attacks.
8. Malicious seat occupation
Malicious seat occupation is a common risk problem faced by airlines, ticketing companies and other companies. There are loopholes in the self-owned platform and test website, the third-party interface of the agency company and the whole business process. Practitioners in the online black industry can instantly grab official low-priced tickets and sell them to passengers at higher prices in order to seek violence.
9. Malicious code
Malicious code is a program that embeds code into another program without being detected, thus destroying infected computer data, running invasive or destructive programs, and undermining the security and integrity of infected computer data. Last year, the value of bitcoin skyrocketed. A small boss bought a second-hand cold wallet (hardware) and was implanted with malicious code by his family. All bitcoins were ruthlessly * *.
10. Competing malicious reptiles
1. The core text is crawled: The core text of a website may be crawled by a malicious crawler and copied to other websites silently within hours or even minutes. Copying core content will greatly affect the ranking of websites and web pages in search engines, and low ranking will lead to a vicious circle of decreased visits, sales and advertising revenue.
2 Commodity prices are rising: For example, before an APP launches a new car rental service, it will grab model details and pricing strategies from all competing apps to establish the price advantage of the new service. When e-commerce products go online or make explosions, capture the price and volume information of competing products and specify the price strategy in a targeted manner.
③ Data leakage: As of 2065438+June 2007, there were 2227 data leakage incidents in the world, from which hackers stole 6 billion pieces of data. Data leakage has caused extensive losses to world-renowned companies such as Target Company of the United States and Sony Company of Japan. Whether an enterprise can protect its own business information determines its survival and development.
1 1. Transaction fraud
Financial account holders take advantage of loopholes in the system or account card to commit illegal acts such as money laundering and cash withdrawal, so as to realize economic benefits.
12. Card theft payment
Criminals use various channels to steal credit card information and forge cards to commit crimes. A small payment suddenly occurred in the silent payment account, and several equal payments were made after success. This kind of behavior is often high-risk. The fraudster activates the card for the first time after stealing it successfully, and then transfers the funds in batches after the small test is successful.
13. Cat pond attack
The chamber of commerce puts some cards on the equipment of the cat pool (virtual mobile phone), and can insert more cards. When the device is connected to a computer, it can directly read and send short messages, thus realizing bonus hunter's behavior.
14. Malicious call
After some new functional modules of the enterprise go online, the short message interface is called by malicious access, which increases the short message service fee of the enterprise and affects the bandwidth and normal request of the enterprise server.
Ending:
The above release is only a small part of the secrets revealed by the gray production circle survey. We still have a long way to go and a lot to explore. Please follow our footsteps and explore the unknown world of the Internet together.