Feeds

Swayze death exploited to serve up fake anti-virus

I've had the crime of my life

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

Miscreants have moved swiftly to establish malicious websites designed to rip off users searching for more information on the death of actor Patrick Swayze on Monday.

Black-hat search engine manipulation means that many sites that appear prominently in search engine results point to sites slinging fake anti-virus scanners. Surfers visiting these sites are warned of non-existent security problems in a bid to trick them into buying software of little or no utility. A video (below) from Sophos explains the particulars of the Swayze-themed attack.

Other trending topics including Serena Williams's US Open tennis semi-final outburst video (as explained here) and the anniversary of the 9/11 attacks have also been exploited as themes for scareware traps over recent days.

The mechanism of such attacks in general is growing in sophistication, as well as frequency. In many cases, sites already listed in Google's index for a search term of interest are hacked by the bad guys, with the intention of planting malicious scripts that redirect users onto the scareware payload sites.

Graham Cluley, senior technology consultant at Sophos, explained: "Sometimes the scareware guys create brand new webpages (new domains) and stuff them with keywords and the like to try and get them high on Google's search results."

"However, the sheer fact that they are newly registered domains makes them more suspicious than domains that have been around for some time, and so this can work against them."

"So, they're breaking into existing sites, creating webpages that are stuffed with relevant keywords in the hope that they will both get higher in search results *and* benefit from the fact that the domain has existed for some time," he added.

Malicious scripts on compromised sites are programmed to avoid forwarding unwitting surfers to the scareware download site unless Google is the referrer. The tactic is designed to help scams to say undetected for longer.

"The fact that the pages do nothing suspicious unless you visit them *via* Google (the referrer thing) is part of their cover," Cluley explained. "They're hoping that inquisitive sysadmins won't realise what's going on - if they do load up the page (without going through Google) they won't see anything suspicious." ®

Beginner's guide to SSL certificates

More from The Register

next story
Russian hackers exploit 'Sandworm' bug 'to spy on NATO, EU PCs'
Fix imminent from Microsoft for Vista, Server 2008, other stuff
FYI: OS X Yosemite's Spotlight tells Apple EVERYTHING you're looking for
It's on by default – didn't you read the small print?
Microsoft pulls another dodgy patch
Redmond makes a hash of hashing add-on
'LulzSec leader Aush0k' found to be naughty boy not worthy of jail
15 months home detention leaves egg on feds' faces as they grab for more power
Kill off SSL 3.0 NOW: HTTPS savaged by vicious POODLE
Pull it out ASAP, it is SWISS CHEESE
Facebook slurps 'paste sites' for STOLEN passwords, sprinkles on hash and salt
Zuck's ad empire DOESN'T see details in plain text. Phew!
Admins! Never mind POODLE, there're NEW OpenSSL bugs to splat
Four new patches for open-source crypto libraries
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.