So, what are the black industrial chains of Internet in China? Generally speaking, there are too many kinds to list. Here, I will introduce two common black industrial chains of netizens: traffic hijacking and Trojan virus.
Traffic hijacking black industrial chain
The so-called traffic hijacking refers to controlling users' online behavior through certain technical means, allowing you to open unwanted web pages and see unwanted advertisements, thus bringing a steady stream of income to hijackers.
Telecom operators, Internet companies, router manufacturers and hackers may all be the operators of traffic hijacking, with the purpose of advertising revenue, commercial competition (brushing click-through rate for websites) and collecting user information.
There are three ways for traffic hijackers to sell traffic: directly hijack traffic to the buyer's website, which is called "direct cooperation" in the industry; The second is to hijack the traffic to the domain name of your own website, and then jump to the buyer's website. For example, hijack the A website first, and then jump to the B website, which is called "jump cooperation" in the industry; The last one is to hijack the traffic to its own website domain name, instead of jumping to the buyer's website, but completely quoting the buyer's website content, and the buyer can also profit from it, which is called "framework cooperation" in the industry.
Collection agents buy traffic from traffic hijackers, and traffic buyers buy traffic from collection agents. The huge traffic of millions of IP every day can be easily mastered by several large traffic agents. On the surface, the companies they run seem to have normal business, but secretly they are engaged in some traffic hijacking and spam advertising business.
Trojan virus black industrial chain
Trojan horse producers are Trojan horse authors. They make online games, pilfer date trojan, remote control Trojans, Trojan downloaders and other Trojan products and hacking tools. Generally, it is sold to people who broadcast Trojans on monopoly terms (known as "Mabaoren" in the circle), and is responsible for after-sales maintenance and update, so that anti-virus software can be "free from killing" at any time. From the perspective of industry, the monthly income of Trojans is between 6.5438+0 million and 50 thousand yuan.
The "horse-wrapped man" is the core part of the entire Trojan industry. On the one hand, buy products from Trojan authors, on the other hand, buy network traffic from traffic trading links. After the implementation of "hanging horses", it began to steal all kinds of valuable information from merchants' computers, mainly online game accounts, QQ accounts and online banking accounts, and then sold the stolen goods to the "cash-out" link of virtual property.
The traffic transaction link includes the webmasters of many bad websites, such as pornographic websites and some personal websites, who sell visitors to "Mabaoren" and actively "hang up" their websites to make money; In addition, there are some hackers who are good at invading "taking the station". They are also employed by "Mabaoren" to attack various websites with high traffic and poor security, providing a platform for "Mabaoren" to hang up their horses.
Once users visit the page of hanging horses, they are immediately recruited and become "broilers". "Broilers" that can be used for a few days can be sold in 0.5 yuan to 1 yuan in China; If it can be used for more than half a month, it can be sold for tens of dollars. According to the calculation that an ordinary gray pigeon catches 65,438+10,000 "broilers" a month, it can easily earn at least 10,000 yuan a month, which does not include the transaction income of stealing QQ numbers, game coins and bank accounts on the "broilers" computer.
Broilers can be used for online extortion, mainly in the form of DDOS attacks. DDOS attacks are very common in the pharmaceutical industry and the game industry. Even the attacked enterprises can only be protected from attacks by paying "protection fees". Hacker groups attack small and medium-sized enterprises that have embarked on the road of informationization but have weak self-defense, which leads to the paralysis of enterprise websites, and some small and medium-sized enterprises have to pay "protection fees" to ensure the normal operation of the network.