Black Hat SEO through Hacking

Hacking for having Black Hat SEO
One vulnerable site can help many cyber criminals


Security researchers have found that a single vulnerable website may be used by a number of cybercriminal organizations, each one altering the site to serve its own purposes.

In many cases, websites are compromised and altered to lead visitors to domains that push fake antivirus programs, which lately have become a great way for cybercrooks to earn a hefty profit.


Zscaler expert explained that once they overtake the site, the attackers rely on Blackhat SEO techniques to increase traffic towards their malicious plots.

In order to do this, they set up two different pages on the compromised domain. First, they create a spam page that search engines, security scanners and blacklisting mechanisms see as harmless. This page doesn’t contain any obfuscated code and performs the redirect via a PHP or .htaccess file.

The second page is the one that contains the redirect to a site that is in charge of performing the attack on users.

More recently, researchers have identified a number of overtaken websites that were designed to send users to Fake AVs, but were also infected with a malevolent piece of JavaScript which held an IFRAME injection that pointed to locations such as fbyvdtydyth.myfw.us/?go=2, or tds46.lookin.at/stds/go.php?sid=1.

Fortunately for internauts, this JavaScript, which is in most cases obfuscated, is flagged by search engines as being malicious fairly fast. That’s because the script is present on all the webpages and it’s placed before the original HTML code.

While in most cases users can protect themselves against such attacks by utilizing a lot of common sense and a reliable security solutions, website administrators and owners should also act responsibly and check their websites as often as they can for any type of misuse. 

There are a number of pieces of software offered by security firms that can perform automated audits to check if a domain is clean or not.

Obfuscated Code placed on a site




Regards,
Hardeep Singh

Comments

Popular posts from this blog

How to hack your xbox 360 completely

Autonomous mobile additive manufacturing robot runs circles around traditional 3D printers

The power of Bluetooth 4.0