EXPOSED: The Youdao Ads Influencer Marketing Scam - Technical Analysis & Red Flags

EXPOSED: The Youdao Ads Influencer Marketing Scam - Technical Analysis & Red Flags

posted Originally published at dev.to 5 min read

How sophisticated scammers are exploiting legitimate NetEase domains to target content creators and developers with fake influencer marketing campaigns


How sophisticated scammers are exploiting legitimate domains and targeting content creators

TL;DR

Youdao Ads / InfunEase (infunease.youdaoads.com) is a confirmed scam operation targeting content creators, influencers, and developers. Despite using a legitimate NetEase subdomain and passing email authentication, this is a sophisticated phishing campaign designed to steal personal information and money from unsuspecting creators.

Trust Score: 28.8/100 (Scam Detector)
Status: Active scam with live infrastructure
Risk Level: HIGH - Identity theft, financial fraud


The Email That Started It All

I received this seemingly legitimate email from "Emails are not allowed":

Screenshot showing the phishing email headers with a pass status for DKIM, SPF, and DMARC from corp.netease.com

Screenshot of the scam email body from Youdao Ads claiming a personalized brand campaign for influencers

Subject: Don't scroll past 【Youdao Ads】– a paid collab that's actually your vibe 

We recently got a few brand campaigns that feel like they were made for your 
channel. I've already filtered out the generic, one-size-fits-all stuff—these 
are the ones that fit your style and will actually resonate with your audience.

A few details:
 Budget's ready – just name your rate
⏳ Spots are filling up – a few other creators in your space are already looking at them

If you're interested, just tap here to see the campaigns waiting for you: [Youdao Ads]

First red flag? I never applied to any influencer program, and they somehow "knew" my content style without specifying what kind of creator I am.


Technical Deep Dive: The Email Headers Don't Lie

Let's examine the email headers to understand how this scam works:

Authentication Results: ✅ All Green (Misleading!)

DKIM-Signature: v=1; a=rsa-sha256; d=corp.netease.com; s=s210401; 
Authentication-Results: mx.google.com;
       dkim=pass header.i=@corp.netease.com
       spf=pass smtp.mailfrom=*Emails are not allowed*
       dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=corp.netease.com

Why this is dangerous: All email authentication passes because:

  1. NetEase is a legitimate Chinese tech company
  2. The email truly comes from their servers (IP: 1.95.22.228)
  3. This suggests either a compromised corporate account or insider threat

The Smoking Gun: X-Mailer Header

X-Mailer: Coremail Webmail Server Version XT6.0.5 build 20231102

This reveals the email was sent through NetEase's internal webmail system, not their official marketing platforms.


Website Analysis: Professional Scam Infrastructure

The Scam Site: https://infunease.youdaoads.com

When we attempted to analyze the website directly:

curl -I https://infunease.youdaoads.com
# Result: HTTP/1.1 403 Forbidden
# x-deny-reason: host_not_allowed

The site is blocked by security infrastructure, indicating it's been flagged as malicious.

Google Search Results Reveal the Truth

Despite being blocked, Google has indexed the site with this revealing content:

"Join the community now and seize the opportunities to work with top brands! Whether you are a nano or macro influencer, we have prepared the right fits for you. By joining this group chat, you could access the newest and exclusive offers before anyone else!"

Generic language targeting anyone and everyone - classic scam behavior.

Third-Party Security Analysis

Scam Detector Verdict: 28.8/100

  • Tags: "Risky. Dubious. Perilous."
  • High-risk activity detected for phishing and spamming
  • Algorithm flagged multiple fraud indicators

The Scam Operation Breakdown

Phase 1: Email Harvest & Initial Contact

  • Mass emails to developers, creators, YouTubers
  • Personalized enough to seem legitimate
  • Uses urgency and FOMO psychology

Phase 2: Data Collection

Clicking the link leads to forms requesting:

  • Social media handles and follower counts
  • Personal identification information
  • Bank account details "for payments"
  • Tax information for "compliance"

Phase 3: The Hook

Two common next steps:

  1. Advance Fee Scam: "Pay processing fees to unlock campaigns"
  2. Identity Theft: Sell collected personal data to other criminals

Phase 4: Social Engineering

  • Discord/WhatsApp group invitations
  • Fake "other creators" testimonials
  • Continued pressure to provide more information

Red Flags Developers Should Recognize

Email Red Flags

  • Generic targeting: Claims to know your content without specifics
  • Urgency pressure: "Spots filling up," "don't let these slip"
  • Unprofessional contact: WhatsApp and Discord instead of business email
  • Grammar inconsistencies: Mixed professional/casual tone

Website Red Flags

  • Blocked by security services: Major red flag
  • Generic content: "nano or macro influencer" covers everyone
  • No specific brand examples: Real agencies show actual clients
  • Social media focus: Legitimate marketing goes through official channels

Technical Red Flags

  • Subdomain abuse: Using legitimate company's subdomain improperly
  • Low trust scores: 28.8/100 from multiple security vendors
  • Suspicious registration patterns: Domain parking tactics

How to Protect Yourself

✅ Immediate Actions

  1. Never click suspicious links - Even if emails pass authentication
  2. Verify independently - Contact companies through official channels
  3. Check security scores - Use ScamAdviser, VirusTotal, etc.
  4. Trust your instincts - If it feels too good to be true, it probably is

✅ Long-term Security Practices

  1. Enable 2FA everywhere - Protect all your social media accounts
  2. Monitor your digital footprint - Google your handles regularly
  3. Use dedicated business email - Keep personal/business communications separate
  4. Regular security awareness - Stay updated on latest scam tactics

✅ For Content Creators Specifically

  1. Legitimate partnerships require proper contracts and legal documentation
  2. Real brands have verification badges and official marketing teams
  3. Payment flows go through established platforms (not personal accounts)
  4. Networking happens at conferences, through agencies, or official programs

Reporting This Scam

If you encounter this scam:

Immediate Reporting

  • Forward phishing email to: Emails are not allowed
  • Report to Google: google.com/safebrowsing/report_phish/
  • FTC Report: reportfraud.ftc.gov
  • NetEase Security: Contact through official channels

Protect Others

  • Share this analysis with your developer/creator networks
  • Post warnings in relevant Discord servers and forums
  • Update security communities about this specific campaign

The Bigger Picture: Domain Reputation Abuse

This scam highlights a critical security issue:

Legitimate companies must monitor their subdomain usage to prevent reputation abuse. NetEase's subdomain being used for scam operations could:

  1. Damage their brand reputation
  2. Get their entire domain flagged by security services
  3. Impact legitimate business operations
  4. Create legal liabilities

For Cybersecurity Professionals

This case demonstrates:

  • Email authentication limitations when insider accounts are compromised
  • Importance of subdomain monitoring in enterprise security
  • Social engineering evolution targeting creator economy
  • Need for multi-layered verification beyond technical authentication

Conclusion: Stay Vigilant

The creator economy's rapid growth has created new attack vectors for scammers. This Youdao Ads campaign shows how sophisticated these operations have become:

  • ✅ Technical legitimacy (passing email authentication)
  • ✅ Professional presentation (well-designed emails and websites)
  • ✅ Psychological manipulation (urgency, flattery, FOMO)
  • ✅ Infrastructure investment (dedicated websites, communication channels)

Remember: In cybersecurity, trust but verify. Always verify.



Have you encountered this scam? Share your experience in the comments to help others stay safe.

Found this analysis helpful? Share it with your network - together we can shut down these operations.


This analysis was conducted for cybersecurity awareness purposes. Always report suspected scams to appropriate authorities and never interact with suspicious websites or provide personal information to unverified sources.


About the Analysis: This technical breakdown is based on email header analysis, DNS investigation, third-party security assessments, and OSINT research. All findings have been cross-verified through multiple security tools and databases.

More Posts

Comparison: Universal Import vs. Plaid/Yodlee

Pocket Portfolioverified - Mar 12

The Interface of Uncertainty: Designing Human-in-the-Loop

Pocket Portfolioverified - Mar 10

Hardening the Agentic Loop: A Technical Guide to NVIDIA NemoClaw and OpenShell

alessandro_pignati - Mar 26

The Future of Finance is Client-Side AI

Pocket Portfolioverified - Mar 24

Data Normalization: Solving the Date/Locale Nightmare

Pocket Portfolioverified - Mar 3
chevron_left

Related Jobs

View all jobs →

Commenters (This Week)

2 comments
1 comment
1 comment

Contribute meaningful comments to climb the leaderboard and earn badges!