Feeds

Black hats poison Google video search

Game for a hack

5 things you didn’t know about cloud backup

Miscreants have poisoned Google Video search results in a bid to trick the unwary into getting infected with malware.

Instead of video clips, researchers at Trend Micro discovered that around 400,000 queries returning malicious results that lead to a single redirection point, which leads onto an array of maliciously constructed websites designed to load malware onto vulnerable Windows PCs. The strain of malware spread using the attack - named as AQPlay-A by Trend Micro - poses as a Abode Flash Player update that's supposedly needed to view video content.

Running the software on unprotected PCs leads to infection. The malware is also programmed to spread via removable and network drives.

Hackers behind the attack have been careful to camouflage the assault. Trend Micro reckons the VXers organising the assault are maintaining a large number of domains, each full of keywords, so that these pages appear at the high in search results when users enter targeted search queries.

The approach is typical of one type of search engine optimisation malfeasance, but the Google Video attack takes things one step further, by incorporating detection-evasion technique. Only users who are redirected from Google Video are prompted to download the booby-trapped Flash Player executable, Trend Micro warns.

The attack is unrelated to a snafu in Google search on Sunday that briefly resulted in the search giant labelling every site on the internet as infected with malware. Google blames the cock-up on human error. ®

Next gen security for virtualised datacentres

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.