Feeds

Google sends warnings to machines with infected search

Alerts are genuine - until scareware scum get on board

Beginner's guide to SSL certificates

Google is issuing warnings to people whose computers are infected with a type of malware that manipulates search requests.

A strain of rogue anti-virus software also includes a search hijacker component. The hijacker is designed to further enrich scammers by redirecting users of compromised machines through various dodgy pay-per-click affiliate sites instead of genuine search engines.

Instead of going straight to Google, surfers on compromised machines are sent via proxies. The traffic generated from malware-infected machines has an unique signature that has allowed Google to return warnings to victims using these machines.

The malware is programmed to ping a specific Google internet address from compromised machines. Google came across this when it took a server associated with this address offline during routine maintenance.

Legitimate search traffic was redirected, but the IP address still received thousands of requests per second, tipping Google off that something was amiss. Google security engineer Damian Menscher investigated the odd behaviour and discovered that it had been caused by a network of more than a million malware-infected machines, security blogger Brian Krebs reports.

Google is using the information it obtained to provide prominent warnings to potentially infected surfers that their PCs "appears to be infected", as illustrated by a blog entry here.

The warnings are something of a departure for Google, and may well help alert infected users that their machines are infected with a nasty cocktail of scareware and web-redirection malware. Unfortunately, it is probably only a matter of time before scareware scammers use fake templates from this new type of warning in attempts to peddle fake anti-virus software. Surfers are best advised to only purchase security software from recognised outlets and, in particular, to be suspicious of any warning that points you towards one particular product.

If in doubt, consumers ought to use a freebie scanner from the likes of Avast, AVG or Microsoft itself, at least as a first point of call. ®

Internet Security Threat Report 2014

More from The Register

next story
Webcam hacker pervs in MASS HOME INVASION
You thought you were all alone? Nope – change your password, says ICO
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Meet OneRNG: a fully-open entropy generator for a paranoid age
Kiwis to seek random investors for crowd-funded randomiser
USB coding anarchy: Consider all sticks licked
Thumb drive design ruled by almighty buck
Attack reveals 81 percent of Tor users but admins call for calm
Cisco Netflow a handy tool for cheapskate attackers
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.