DEV Community

Cover image for EXPOSED: The Youdao Ads Influencer Marketing Scam - Technical Analysis & Red Flags
freerave
freerave

Posted on

EXPOSED: The Youdao Ads Influencer Marketing Scam - Technical Analysis & Red Flags

How sophisticated scammers are exploiting legitimate NetEase domains to target content creators and developers with fake influencer marketing campaigns


How sophisticated scammers are exploiting legitimate domains and targeting content creators

TL;DR

Youdao Ads / InfunEase (infunease.youdaoads.com) is a confirmed scam operation targeting content creators, influencers, and developers. Despite using a legitimate NetEase subdomain and passing email authentication, this is a sophisticated phishing campaign designed to steal personal information and money from unsuspecting creators.

πŸ”΄ Trust Score: 28.8/100 (Scam Detector)

πŸ”΄ Status: Active scam with live infrastructure

πŸ”΄ Risk Level: HIGH - Identity theft, financial fraud


The Email That Started It All

I received this seemingly legitimate email from "anjiaqi06@corp.netease.com":

Screenshot showing the phishing email headers with a pass status for DKIM, SPF, and DMARC from corp.netease.com

Screenshot of the scam email body from Youdao Ads claiming a personalized brand campaign for influencers

Enter fullscreen mode Exit fullscreen mode

First red flag? I never applied to any influencer program, and they somehow "knew" my content style without specifying what kind of creator I am.


Technical Deep Dive: The Email Headers Don't Lie

Let's examine the email headers to understand how this scam works:

Authentication Results: βœ… All Green (Misleading!)

Enter fullscreen mode Exit fullscreen mode

Why this is dangerous: All email authentication passes because:

  1. NetEase is a legitimate Chinese tech company
  2. The email truly comes from their servers (IP: 1.95.22.228)
  3. This suggests either a compromised corporate account or insider threat

The Smoking Gun: X-Mailer Header

X-Mailer: Coremail Webmail Server Version XT6.0.5 build 20231102
Enter fullscreen mode Exit fullscreen mode

This reveals the email was sent through NetEase's internal webmail system, not their official marketing platforms.


Website Analysis: Professional Scam Infrastructure

The Scam Site: https://infunease.youdaoads.com

When we attempted to analyze the website directly:

curl -I https://infunease.youdaoads.com
# Result: HTTP/1.1 403 Forbidden
# x-deny-reason: host_not_allowed
Enter fullscreen mode Exit fullscreen mode

The site is blocked by security infrastructure, indicating it's been flagged as malicious.

Google Search Results Reveal the Truth

Despite being blocked, Google has indexed the site with this revealing content:

"Join the community now and seize the opportunities to work with top brands! Whether you are a nano or macro influencer, we have prepared the right fits for you. By joining this group chat, you could access the newest and exclusive offers before anyone else!"

Generic language targeting anyone and everyone - classic scam behavior.

Third-Party Security Analysis

Scam Detector Verdict: 28.8/100

  • Tags: "Risky. Dubious. Perilous."
  • High-risk activity detected for phishing and spamming
  • Algorithm flagged multiple fraud indicators

The Scam Operation Breakdown

Phase 1: Email Harvest & Initial Contact

  • Mass emails to developers, creators, YouTubers
  • Personalized enough to seem legitimate
  • Uses urgency and FOMO psychology

Phase 2: Data Collection

Clicking the link leads to forms requesting:

  • Social media handles and follower counts
  • Personal identification information
  • Bank account details "for payments"
  • Tax information for "compliance"

Phase 3: The Hook

Two common next steps:

  1. Advance Fee Scam: "Pay processing fees to unlock campaigns"
  2. Identity Theft: Sell collected personal data to other criminals

Phase 4: Social Engineering

  • Discord/WhatsApp group invitations
  • Fake "other creators" testimonials
  • Continued pressure to provide more information

Red Flags Developers Should Recognize

🚩 Email Red Flags

  • Generic targeting: Claims to know your content without specifics
  • Urgency pressure: "Spots filling up," "don't let these slip"
  • Unprofessional contact: WhatsApp and Discord instead of business email
  • Grammar inconsistencies: Mixed professional/casual tone

🚩 Website Red Flags

  • Blocked by security services: Major red flag
  • Generic content: "nano or macro influencer" covers everyone
  • No specific brand examples: Real agencies show actual clients
  • Social media focus: Legitimate marketing goes through official channels

🚩 Technical Red Flags

  • Subdomain abuse: Using legitimate company's subdomain improperly
  • Low trust scores: 28.8/100 from multiple security vendors
  • Suspicious registration patterns: Domain parking tactics

How to Protect Yourself

βœ… Immediate Actions

  1. Never click suspicious links - Even if emails pass authentication
  2. Verify independently - Contact companies through official channels
  3. Check security scores - Use ScamAdviser, VirusTotal, etc.
  4. Trust your instincts - If it feels too good to be true, it probably is

βœ… Long-term Security Practices

  1. Enable 2FA everywhere - Protect all your social media accounts
  2. Monitor your digital footprint - Google your handles regularly
  3. Use dedicated business email - Keep personal/business communications separate
  4. Regular security awareness - Stay updated on latest scam tactics

βœ… For Content Creators Specifically

  1. Legitimate partnerships require proper contracts and legal documentation
  2. Real brands have verification badges and official marketing teams
  3. Payment flows go through established platforms (not personal accounts)
  4. Networking happens at conferences, through agencies, or official programs

Reporting This Scam

If you encounter this scam:

πŸ”΄ Immediate Reporting

  • Forward phishing email to: reportphishing@apwg.org
  • Report to Google: google.com/safebrowsing/report_phish/
  • FTC Report: reportfraud.ftc.gov
  • NetEase Security: Contact through official channels

πŸ”΄ Protect Others

  • Share this analysis with your developer/creator networks
  • Post warnings in relevant Discord servers and forums
  • Update security communities about this specific campaign

The Bigger Picture: Domain Reputation Abuse

This scam highlights a critical security issue:

Legitimate companies must monitor their subdomain usage to prevent reputation abuse. NetEase's subdomain being used for scam operations could:

  1. Damage their brand reputation
  2. Get their entire domain flagged by security services
  3. Impact legitimate business operations
  4. Create legal liabilities

For Cybersecurity Professionals

This case demonstrates:

  • Email authentication limitations when insider accounts are compromised
  • Importance of subdomain monitoring in enterprise security
  • Social engineering evolution targeting creator economy
  • Need for multi-layered verification beyond technical authentication

Conclusion: Stay Vigilant

The creator economy's rapid growth has created new attack vectors for scammers. This Youdao Ads campaign shows how sophisticated these operations have become:

  • βœ… Technical legitimacy (passing email authentication)
  • βœ… Professional presentation (well-designed emails and websites)
  • βœ… Psychological manipulation (urgency, flattery, FOMO)
  • βœ… Infrastructure investment (dedicated websites, communication channels)

Remember: In cybersecurity, trust but verify. Always verify.


Resources & Links


Have you encountered this scam? Share your experience in the comments to help others stay safe.

Found this analysis helpful? Share it with your network - together we can shut down these operations.


This analysis was conducted for cybersecurity awareness purposes. Always report suspected scams to appropriate authorities and never interact with suspicious websites or provide personal information to unverified sources.


About the Analysis: This technical breakdown is based on email header analysis, DNS investigation, third-party security assessments, and OSINT research. All findings have been cross-verified through multiple security tools and databases.

Top comments (0)