Feeds

Hackers re-poison Google search results

Tainted results punt scareware

Top 5 reasons to deploy VMware with Tegile

Hackers have responded to a purge of malicious links within search results by Google with a fresh effort to subvert the search giant's page rank system.

As previously reported, miscreants recently set out to poison search results with links to malware infested sites. The tactic involved gaming search engines' ranking systems by automatically posting links to malign sites in blog and forum posts. Hackers automated this link spamming process using networks of compromised zombie PCs.

Google cleaned up its search index earlier this week, but the original hackers (along with a new group) have responded with a fresh assault, reports anti-spyware firm Sunbelt Software.

Once again, plugging innocuous terms into Google, such as "funny drunk quote", can lead to search results where at least some point to malware. The tactic goes hand in hand with establishing thousands of pages on compromised servers that mention targeted terms to obtain a relatively high search engine ranking score.

Two gangs are involved in the latest wave of attacks. Both are trying to direct surfers onto malicious webpages hosted in China. One group is using the tactic to push Spy-shredder, a rogue anti-spyware program. Sunbelt reckons this group is made up of the same group of individuals that launched the original attack.

A second group is using the tactic to divert traffic to targeted sites, thereby generating illicit income through pay-per-click affiliate programmes.

Sunbelt has dissected the attack in a blog posting here. ®

Remote control for virtualized desktops

More from The Register

next story
UK smart meters arrive in 2020. Hackers have ALREADY found a flaw
Energy summit bods warned of free energy bonanza
DRUPAL-OPCALYPSE! Devs say best assume your CMS is owned
SQLi hole was hit hard, fast, and before most admins knew it needed patching
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Mozilla releases geolocating WiFi sniffer for Android
As if the civilians who never change access point passwords will ever opt out of this one
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.