鲁大师被指“捉迷藏”式割韭菜:精准屏蔽北京IP,还怕用户找周鸿祎投诉

Core Viewpoint - The report by Huorong Security Lab reveals a large-scale promotion scheme involving multiple companies, including Chengdu Qilu Technology Co., Ltd. (operator of LuDaShi), which employs covert methods to hijack user traffic and silently install software while implementing targeted "anti-detection" strategies [1][3]. Group 1: Companies Involved - Chengdu Qilu Technology Co., Ltd. is identified as the operator of LuDaShi, which is part of a broader network of companies engaged in traffic hijacking [1][3]. - Other companies listed in the report include Chengdu Hechang Junwei Technology Co., Ltd., Shanghai JiuLie Network Technology Co., Ltd., and several others, each associated with specific software products [2]. Group 2: Promotion Tactics - The report details various promotional tactics used by these companies, such as browser pop-up ads for games, silent installation of third-party software without user consent, and manipulation of web links to earn commissions [3][5]. - A notable tactic includes the dynamic control of software promotion through cloud-based configuration commands, allowing for targeted advertising based on user location and behavior [3][5]. Group 3: Evasion Strategies - The software employs complex "hide-and-seek" strategies to evade detection, including geographic targeting based on user IP addresses and halting promotions if technical analysis tools are detected on the user's device [5][6]. - The report highlights specific detection logic within LuDaShi's promotion module that prevents advertising if the user has visited certain complaint-related websites or social media pages associated with 360's founder Zhou Hongyi [7][10]. Group 4: Response and Updates - On the same day the report was released, LuDaShi pushed two software updates, which vaguely mentioned "bug fixes" and "enhanced user experience," without addressing the allegations of traffic hijacking [10]. - As of the report's publication, LuDaShi has not publicly responded to the specific accusations made in the Huorong Security report [10].