Attribution Hijacking Click flooding, also known as the so-called big click. Illegal gangs use scripts to inject random data or target data from other sources to fake the exposure or click of advertisements. Under the principle of lastclick attribution, they are activated by crashing the device ID and fingerprint information. This method has the lowest cheating cost, but is concealed. Sex is bad. Clickjacking, small clicks that are the opposite of big clicks. Due to the existence of the android broadcast mechanism, the spy APP or malicious plug-in in the device will eavesdrop on the installation completion event, and try to report the click data of the same device, ID and fingerprint information to the server before the user opens it. According to the lastclick rule, it is easy to be classified. Because of this, and because there is no Android broadcast mechanism on the IOS side, the installation list cannot be obtained, and it is more difficult to achieve small clicks. However, with the Bulk SMS Service development of time and cheating technology, this technology is also slowly emerging. Installation hijacking refers to the hijacking of channel packages. It is also a headache for everyone to promote Android APPs. The application store or software will issue unsafe prompts to users and guide users to download from their corresponding addresses. As we all know, in different application markets or promotions The source of the channel package of the channel will be distinguished by the channel ID when it is packaged. The purpose of hijacking is to change the source of the channel package for the user without knowing it, so that the corresponding app store or channel can acquire new users. 2. Fake traffic Compared with the above three methods, fake traffic is more self-sufficient. Unconstrained by attribution rules and natural quantities, click activations are all forged; at the data request level, black production gangs often use some anonymous addresses to submit click and activation data. Using proxies, such as VPN proxy servers, data centers and other technologies, after anonymized data, the IP address will change, thereby changing the attribution results. This method is often used by black gangs in different places. Users can achieve targeted country, region or province activation, registration, and brush volume. The recently exposed cheating method of black card and black number registration in Southeast Asia, the forgery of the network environment is realized by illegal VPN and proxy services. The actual number of users of Android emulators and IOS jailbreak machines is limited, and large-scale abuse can basically be judged as cheating behaviors.
top of page

bottom of page