Hidden online platforms, using concealed means to induce netizens to take the bait, and provide precise "customers" for criminal groups such as fraud and gambling

How does illegal drainage "water" black and gray products?

  Our reporter Chen Xi, "Workers' Daily" (September 23, 2021, version 04)

  Entering the group to swipe orders to receive rewards, all the savings are "floating"; following the live broadcast to learn to cook, but becoming the "guests" of overseas casinos...

  Some criminals use methods such as tampering with webpages to plant dark links, soliciting customers on live and short video platforms, forming fan groups and sending red envelopes, etc., to guide or create traffic to hunt for "customers" for gambling, pornography, and fraud groups.

  What kind of black and gray industrial chain is behind these illegal drainage?

A reporter from the Workers’ Daily conducted an investigation.

  Black traffic leads the way for crime

  During the past two years of the Ministry of Public Security’s "Net Net" special operation, a large number of corporate websites were found to have embedded dark links, and visitors would jump to pornographic and gambling websites after clicking.

  According to informed sources, criminals have stolen the management authority of high-powered websites, tampered with their important pages, and added illegal link codes.

There are roughly four ways to hide from the dark link: placing the link outside the visible range of the page, setting the color to be the same as the background color, flashing the link quickly in the form of a marquee, and using the redirection mechanism to achieve quick jumps.

  The live broadcast room is also the hardest-hit area for illegal drainage.

In March of this year, the Tinghu Branch of the Public Security Bureau of Yancheng City, Jiangsu Province detected a gambling case involving a live broadcast platform. Some sports anchors on platforms such as "Octopus" and "Secret Fan" self-packaged as "gamblers", boasting "high accuracy in predicting match results." ", WeChat that attracts viewers to add gambling platform agents.

The gambling gang rewards the anchors they manipulate to improve the rankings in the station and speed up the drainage speed.

  In recent years, illegal drainage has also targeted online job seekers.

In a case notified by the Daqing police in Heilongjiang Province, the suspect developed two special softwares for crimes, "Oka" and "Hello", registered accounts in batches on the recruitment website and posted false recruitment information to "easy", "high salaries" and "days". The "knot" is a bait to obtain more than 15 million pieces of personal information, causing a large number of job seekers to become precise targets for fraudulent transactions and overseas gambling gangs.

  Liu Xiaochun, executive director of the Internet Rule of Law Research Center of the University of Chinese Academy of Social Sciences, said that criminals spread the Internet through public spaces and direct public domain traffic to private domains. Then, according to the characteristics of users, they can be diverted to them through operations such as adding friends and pulling groups. Different areas of black and gray production are realized through gambling, pornography or fraud.

  Hidden crimes are not easy to supervise

  Judging from the cases investigated and dealt with in various places, the suspect's modus operandi has become more refined, which has made it increasingly difficult to manage.

  Take a “false recruitment” case announced by the Public Security Bureau of Daqing City, Heilongjiang Province as an example. First, the account company used the registration machine to register website accounts in batches. After authentication, these accounts can be sold for 8-10 yuan each.

Buyers purchase an account and use the posting machine to post recruitment posts. Usually, they can defraud thousands of job applicants in one hour, and the resume extractor sorts them by age, region, and gender.

Then, the information was sold at a price of 1.8 ~ 2.2 yuan each. The buyer team pretended to be an adult human resources company, hired telephone operators to add victims as friends, and introduced them to bill-swiping and online gambling practitioners, each introducing one person Victims, criminal gangs will give a reward of 35-40 yuan.

At this point, the drainage is complete and the fraud begins.

  "Upstream is the card merchants reselling mobile phone cards, providing technical supporters of communication equipment and information transmission equipment, the midstream is the black intermediary that packs and sells black and gray resources, and the downstream is the merchants that implement specific promotion and drainage based on the needs of black traffic buyers. "Informed sources said.

  Liu Xiaochun believes that, in order to prevent traceability and evade review, illegal drainage through cross-border and cross-regional cooperation, continuous decomposition of operating procedures, layer-by-layer disguise of identity, which increases the difficulty of supervision.

  Unearth illegal drainage associations in massive data

  Regarding illegal drainage, Hao Xudong, a partner of Beijing Xingzhu Law Firm, stated that according to the Criminal Law, knowing that others use the information network to commit crimes, provide technical support for their crimes such as Internet access, server hosting, network storage, communication transmission, or provide advertising promotion If the circumstances are serious, they shall be sentenced to fixed-term imprisonment of not more than three years or criminal detention, together with a fine or a fine.

  From the Ministry of Public Security’s in-depth promotion of the “net-net” special action to the Central Cyberspace Administration’s efforts to strengthen cyber technology countermeasures, from the Ministry of Industry and Information Technology’s “Card Broken 2.0” special action to the People’s Bank of Significant results have been achieved in eradicating the breeding ground of black flow.

  “The question of where the victim’s information was targeted by the scammers and which account was used to contact the scammers was a mystery at the beginning. Cyberspace is not like a real crime scene. There are no obvious traces, only a large number of them. , Various types of data, our job is to dig out the correlation from the massive data.” said Wang Binbin, deputy squadron leader of the police support squadron of the Tongzhou Branch of the Beijing Municipal Public Security Bureau.

  Liu Xiaochun said that considering that criminals will use one identity to register multiple platforms to cheat, it is necessary to establish a shared database of high-risk mobile phone numbers. When a suspicious account is identified, the entire network can promptly blacklist it.

  Hao Xudong suggested that the account of frequent remote login or replacement of equipment should be strictly reviewed, and the technical screening methods should be further upgraded to maximize the compression of the living space of black and gray products.