Soldiers bust massive click-farm that used 500k SIM cards, 100s of mobes to big up web tat

Cops pad up to Thai operation


A massive click-fraud farm has been raided in Thailand by police and army troops, who seized nearly half a million SIM cards and hundreds of iPhones used to promote products online.

The raid on two rented houses in Ban Mai Nong Sai in the Aranyaprathet District led to the arrest of three Chinese suspects: Wang Dong, 33, Niu Bang, 25, and Ni Wenjin, 32. Investigators found 474 5s, 5c and 4s iPhones and 347,200 SIM cards, as well as computers and electronic devices used to manage them. This led to a second raid that netted another 100,000 SIM cards in a local house.

Benjaphol Rodsawasdi, immigration chief of Sa Kaeo, told the Bangkok Post that the trio admitted they were being paid 150,000 baht (US$4,423/£3,473) a month by a company in China to promote products in the Middle Kingdom. They would, we're told, use the mobes to ramp up sellers' online ratings by giving them positive feedback on product listings. That would push their gear up search result rankings, boosting sales. The gang refused to name the business involved.

Police say that the men set up shop in Thailand because mobile charges are so low in the country, compared to China. They were hired to spam the Chinese social media platform WeChat with bogus page views, ratings, likes and shares.

Police are now investigating how the three managed to get hold of so many SIM cards undetected, when telcos are supposed to log each purchase to a specific individual. In the main haul they found 112,200 SIM cards from Advanced Info Service, 131,000 from True Move and 104,000 from Total Access Communication (DTAC) telco companies.

The three arrested suspects were charged with working illegally in the country and illegitimately importing the devices. Police are now questioning them to see if further click farms can be found.

This kind of internet fraud is becoming increasingly common, as unscrupulous vendors seek to game reputation rankings online in order to become top of the shopping list for buyers. Similar techniques are also used to pump out fake news and discredit people, and it seems tech biz is dragging its feet on fixing the problems. ®

Similar topics

Broader topics


Other stories you might like

  • Former chip research professor jailed for not disclosing Chinese patents
    This is how Beijing illegally accesses US tech, say Feds

    The former director of the University of Arkansas’ High Density Electronics Center, a research facility that specialises in electronic packaging and multichip technology, has been jailed for a year for failing to disclose Chinese patents for his inventions.

    Professor Simon Saw-Teong Ang was in 2020 indicted for wire fraud and passport fraud, with the charges arising from what the US Department of Justice described as a failure to disclose “ties to companies and institutions in China” to the University of Arkansas or to the US government agencies for which the High Density Electronics Center conducted research under contract.

    At the time of the indictment, then assistant attorney general for national security John C. Demers described Ang’s actions as “a hallmark of the China’s targeting of research and academic collaborations within the United States in order to obtain U.S. technology illegally.” The DoJ statement about the indictment said Ang’s actions had negatively impacted NASA and the US Air Force.

    Continue reading
  • TikTok US traffic defaults to Oracle Cloud, Beijing can (allegedly) still have a look
    Alibaba hinted the gig was worth millions each year

    The US arm of Chinese social video app TikTok has revealed that it has changed the default location used to store users' creations to Oracle Cloud's stateside operations – a day after being accused of allowing its Chinese parent company to access American users' personal data.

    "Today, 100 percent of US user traffic is being routed to Oracle Cloud Infrastructure," the company stated in a post dated June 18.

    "For more than a year, we've been working with Oracle on several measures as part of our commercial relationship to better safeguard our app, systems, and the security of US user data," the post continues. "We still use our US and Singapore datacenters for backup, but as we continue our work we expect to delete US users' private data from our own datacenters and fully pivot to Oracle cloud servers located in the US."

    Continue reading
  • Beijing-backed attackers use ransomware as a decoy while they conduct espionage
    They're not lying when they say 'We stole your data' – the lie is about which data they lifted

    A state-sponsored Chinese threat actor has used ransomware as a distraction to help it conduct electronic espionage, according to security software vendor Secureworks.

    The China-backed group, which Secureworks labels Bronze Starlight, has been active since mid-2021. It uses an HUI loader to install ransomware, such as LockFile, AtomSilo, Rook, Night Sky and Pandora. But cybersecurity firm Secureworks asserts that ransomware is probably just a distraction from the true intent: cyber espionage.

    "The ransomware could distract incident responders from identifying the threat actors' true intent and reduce the likelihood of attributing the malicious activity to a government-sponsored Chinese threat group," the company argues.

    Continue reading
  • Whatever hit the Moon in March, it left this weird double crater
    NASA probe reveals strange hole created by suspected Chinese junk

    Pic When space junk crashed into the Moon earlier this year, it made not one but two craters on the lunar surface, judging from images revealed by NASA on Friday.

    Astronomers predicted a mysterious object would hit the Moon on March 4 after tracking the debris for months. The object was large, and believed to be a spent rocket booster from the Chinese National Space Administration's Long March 3C vehicle that launched the Chang'e 5-T1 spacecraft in 2014.

    The details are fuzzy. Space agencies tend to monitor junk closer to home, and don't really keep an eye on what might be littering other planetary objects. It was difficult to confirm the nature of the crash; experts reckoned it would probably leave behind a crater. Now, NASA's Lunar Reconnaissance Orbiter (LRO) has spied telltale signs of an impact at the surface. Pictures taken by the probe reveal an odd hole shaped like a peanut shell on the surface of the Moon, presumably caused by the Chinese junk.

    Continue reading

Biting the hand that feeds IT © 1998–2022