The cover

QQ drainage caused by the gray area industry

Maybe it was because I exposed my QQ id in the blog or inadvertently. Before, I often received some friend requests from QQ, all of which were attractive profile pictures. Once, out of curiosity, I added a friend, and then she kept sending me advertisements and attractive links. And often in the space to see her hair advertising content.

There is a university friend’s QQ stolen, sent to me to ask to borrow money information.

As far as I know, there are many things about stealing Q number. What kind of interests drive the occurrence of these situations?

It is said that if you master the traffic, you master the Internet. Compared with Baidu, which focuses on traffic distribution, QQ does not focus on traffic entry. However, QQ’s profit is mainly through its social nature and traffic into the game product. To a certain extent, many enterprises and individuals activate their products or make money through QQ drainage.

QQ has such a huge user base, that is to say, it itself is a product drainage entrance, even can say that the QQ product itself any place can be exposed, will be a product drainage opportunity.

Also because have these QQ drainage opportunity, so can produce a series of gray area industry.

Strange friends keep sending seductive messages

Many times, users will use the online search function to add friends, add groups, and even public accounts. Think about it, basically every user will use the function ah, plus the huge number of QQ users, so this must be an excellent drainage entrance.

First, I tried to search the keyword “beauty”, and the results are as follows:

Search results represent groups, friends and public accounts.

QQ to find

You can see here a lot of temptation profile pictures, careful observation can also find that some of the profile pictures there on the relevant advertising, such as url, related instructions and so on.

Take it a step further, and when you add friends and groups, you’ll find a lot of enticing stuff coming out. Of course, it’s not convenient to map here. But the essence is still drainage, are promoting the website, App.

But you can do this, so why don’t we try it? In fact, many organizations, products will build the corresponding group, and set the corresponding profile picture, through the QQ search module drainage and maintenance of some users.

QQ search

A lot of users, will try to search the name of their idol on QQ, so some people will use this user psychology, register a large number of stars named numbers, so as to obtain traffic, this is also a way, but feel this means in now has been out of date, may be better in the past.

Of course, there will be some other entrance, such as add group, group chat, through technical means to get the other party group members all the numbers, directional open temporary dialogue window, take the initiative to add each other friends, and so on.

Although these methods seem simple, we may not believe that this can get traffic, but the fact that traffic can be obtained all the time. Because I tried to join relevant groups and found that the administrators of the groups often sent some attractive websites to promote various apps.

However, Tencent and the Cyberspace Administration of China (CAC) recently introduced regulations that “whoever builds a group is in charge and whoever manages it is in charge.” To some extent, they can manage these situations effectively.

QQ number stealing and fence stolen goods

I believe you have heard, read, and even experienced QQ number theft. If it’s something that’s seen and heard frequently, which means it’s a lot of it, it’s a lot of it, it’s a lot of it, it’s a lot of it, it’s a lot of it, it’s a lot of it, it’s a lot of it, it’s a lot of it. It also got us thinking, why would they go to so much trouble to steal QQ? Would they do that if there was no demand for profit?

The following is a screenshot of my friend who said that his QQ was stolen and kept borrowing money from his friend:

QQ number stolen

After checking relevant information and consulting, I found the word “envelope number”.

So what’s the envelope number?

The stolen QQ is called “envelope number”. As mentioned above, QQ because of its social, drainage in the case of no large number of friends, the effect is very limited, can only use some functional entrance. But suppose, we can master some stolen QQ number, thus master a large number of social relations, and trust, access to traffic, is completely different. And the results will be better than average.

The following terms to understand the whole process from stealing QQ number to selling stolen goods:

Obtaining letters: A group of QQ user names and passwords is called a “letter”, and an envelope is 10,000 (or 1,000) stolen QQ numbers and passwords. Steal QQ number and password through various means, save into information text by 10,000 units. Getting this information is called “getting the letter.”

Letter washing: Through some tools, the letter inside the valuable information (QQ coins, valuable game virtual equipment, QQ beautiful number, etc.) screening out the process is called “letter washing”.

First hand letter: after stealing the letter without any cleaning is called a first hand letter, the first hand letter washing is mainly three steps: the first step to wash Q coins, the envelope inside the Q coins are transferred out, and then sold; The second is the game virtual equipment, Tencent’s main income is from the game, and stolen QQ number contained in the virtual wealth of the game must not be poor, so the next will be the game equipment, game points, game account and game currency can be converted into money and other game property transfer, into a fixed account. The third step is the QQ account, pick the QQ number (five digits, six digits, or seven digits short number, or some numbers containing lucky numbers)

Second-hand letter: After the first letter has been baptized, it is called second-hand letter. The common usage of second-hand letter mainly has the following types: used to send messages to every friend of the stolen number, the general message is specific advertising, such as a variety of web games, specific forums, and so on, and even to promote the APP; To send some fraudulent messages to friends, usually in need of money or something happened, such as the example of stolen friends mentioned above

Old letter: finally be squeezed net of QQ number still can sell to hacker to use to write password dictionary, or mail group send person group send advertisement. Stolen QQ numbers are the best material hackers can use to calculate users’ password habits. They compile, analyze and compare them to crack payment tools such as online banking or Alipay. Mass emailers, on the other hand, don’t care if users get their passwords back. They just send out ads based on specific information. Old letters have other specific uses. This is also reminiscent of a real event: a friend found an iPhone, but it was locked and could not be opened. Finally, he managed to unlock it through Taobao. It’s not a hard solution, it’s software. Just give him the information, and he’ll solve it for you. Of course, it depends on the success rate. I guess, the solution is not related to the theft of these information, because to soft solution must pass the email authentication, which needs to get the authentication information, must get the email account password ah. So MY guess is, they might have tricked the password through phone calls, emails, whatever, and then cracked it. But this is purely personal speculation.

It is because [envelope number] can produce so much value that so many virus Trojan steal QQ number. However, with Tencent’s big efforts to crack down, this theft will be relatively reduced.

conclusion

In the end, I just want you to be rational about this kind of thing. When this happens, do not be deceived, and do not use this to deceive others. Also hope through this, can deepen everyone to Internet understanding.