Feeds

Rogue pharmacy poses as Google

Fake meds rampant

High performance access to file storage

The newest addition to the Google family has just hit the web - the search giant's very own accredited pharmacy, selling pills at rock bottom prices.

Google celebrated the launch with a brand-spanking, stylised logo - the double 'O' replaced with two blue Viagra pills.

The rogue Google pharmaceutical siteThe mail promoting the new site told us: "We've just launched a pharmaceutical interfaces for Google, as well as several new features for the people buying pills and using pharmaceutical interfaces".

Pharmaceutical interfaces, we love it. However, since we weren't entirely sure what they were, we decided to have a look.

We landed at a familiar site: but, surprise, surprise, it wasn't Google, but rogue pharmaceutical site ED Choice. ED Choice pretends to sell generic Viagra, generic Levitra, generic Cialis and other generic products that can't possibly exist, as the patents on these products have yet to expire.

Which explains why ED Choice is hiring spammers to sell its products, and why it constantly changes its server address or URL to avoid a sudden meltdown by angry hosting providers.

Rogue sites selling fake medicines are rampant these days, as NBC's Inside Dateline showed last weekend. The news show posed as an online pharmaceutical company called The Hansen Group and started trolling the web looking for suppliers of counterfeit medicines. Within weeks, companies all over the world were offering them pills of every description - from fake Viagra to Tamiflu.

Most offers were from China, which isn't surprising, as most drugs with the Viagra label sold in China are counterfeit. A Hong Kong contact even agreed to ship thousands of fake Viagra tablets every week to the Hansen Group, a deal with an estimated value of $10m.

The good news is that the people behind the operation were put behind bars before the documentary was aired.

More importantly, a ruling in a Beijing court this week could put halt to the burgeoning industry. The court overturned a 2004 decision by China's patent review board, which would have allowed local drug makers to sell legal generic versions of Viagra in China. The decision could dent the widespread availability of potentially lethal or harmful fake medicines on the net, experts say. ®

High performance access to file storage

More from The Register

next story
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Experian subsidiary faces MEGA-PROBE for 'selling consumer data to fraudster'
US attorneys general roll up sleeves, snap on gloves
Bad PUPPY: Undead Windows XP deposits fresh scamware on lawn
Installing random interwebs shiz will bork your zombie box
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.