Feeds

Virus peddlers set up shop on Google code project

Skin-flick codec scams follow MSN Spaces abuse

Next gen security for virtualised datacentres

Internet scoundrels have begun abusing Google code hosting projects to distribute malware and promote smut. The assault follows a bout of the same kind of abuse against Microsoft's comparable MSN Spaces beta site dating back a year, net security firm McAfee reports.

Misuse of Google code is much more recent and something that intensified over the festive season, McAfee researcher Chris Barton writes. In a blog posting on Wednesday, Barton explains how "new projects" on Google code offering illicit thrills redirect users to fake codec download sites and mucky video havens.

"The difference between this and the MSN Spaces abuse that now about a year old is that Google appears to automatically index code projects," Barton explains.

Barton, who points to an incident of continued abuse on MSN Spaces beta (specially a rogue "project" that links to a penis pill site), hopes Google is more proactive in cleaning up its act. He offers a few preliminary suggestions on how the problem might be nipped in the bud, or at least mitigated against.

"I trust Google would like to appear less evil and will take more decisive action. I’d suggest mashing code and safe browsing together but it appears not to find anything wrong with the clickable links, though it did catch on after some redirection took place." ®

The essential guide to IT transformation

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
KER-CHING! CryptoWall ransomware scam rakes in $1 MEEELLION
Anatomy of the net's most destructive ransomware threat
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.