Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Friday, 31 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Hackers Exploit Thousands of Websites to Promote Online Pharmacies and Adult Sites

by The Gurus
June 9, 2016
in Editor's News
Share on FacebookShare on Twitter

Imperva, Inc. (NYSE: IMPV), committed to protecting business-critical data and applications in the cloud and on-premises, today released its new Hacker Intelligence Initiative (HII) Report entitled: “Black Hat SEO: A Detailed Analysis of Illegal SEO Tactics.” The report details how researchers at the Imperva Defense Center (IDC) discovered a long-running and still active illegal attack that has been exploiting vulnerabilities in thousands of legitimate websites to increase the SEO results for illicit websites.
One of the largest influencers of SEO page rank is how many other sites contain links back to the page, and how highly the referring sites themselves are ranked. There is significant monetary and brand value in having as many respectable and popular sites link to the promoted page as possible. In the campaign studied in the HII Report, the attackers compromise websites or take over computers in order to create unauthorized links that point back to their clients’ websites. IDC researchers found the attackers compromise the content management systems of vulnerable websites to create fake blogs with links pointing back to online pharmacies in order to increase the SEO rankings of the online pharmacies. The illegal SEO attack campaign identified by Imperva is persistent, lasts over many months and promotes dozens of websites – presumably those of the paying customers of the attacker – most of which are online pharmaceutical retailers or adult websites.
The attackers use botnets to amplify the number of websites they compromise. Botnets are networks of remote-controlled computers and devices, or “bots,” that are infected with malware. Attackers can create their own botnets or even hire or rent botnets as a service. Cybercriminals remotely control the botnets for their own purposes, unbeknownst to the devices’ owners. The botnets launch SQL injection (SQLi), HTML link injection and comment spam attacks that exploit vulnerabilities in reputable websites and content management systems. The attackers use these vulnerabilities to create links from the compromised sites back to the promoted, illicit pages. This boosts the search engine rankings of the illicit pages. Over 700 hosts (IP addresses) were used by the botnet during the period studied in the HII Report to launch these SQLi and HTML link injection attacks.
“Automatic attack tools, known as malicious bots, are deployed every second to achieve widespread attacks on websites, and more sophisticated attackers use a distributed network of bots to launch attacks,” said Amichai Shulman, Co-founder and CTO of Imperva. “While it is common to see many variations on the same attack vector comprise these campaigns – such as comment spam used to improve rankings of promoted sites – it is unusual to identify a multi-faceted, long-term campaign run with coordination from the same botnet in the wild.”
“This kind of attack has the potential to impact a legitimate website’s customer experience and brand value, and it could even break the functionality on some website applications,” Shulman explained. “These SQLi attacks are typically referred to as “gateway” attacks and can test the water for more serious attacks to come. Websites can be thought of as the highway to business-critical data, so owners of those that have been targeted should be particularly worried as often SQLi attacks are used to steal data. This definitely serves as a reminder of how relentless cybercriminals are, and the need to bolster website security.“
The full report can be downloaded here and the infographic here.

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Microsoft's BITS file transfer tool fooled into malware distribution

Next Post

Stockpiling bitcoin to pay hacking ransoms is a highly dangerous game to play

Recent News

Data Privacy Day: Securing your data with a password manager

For Cybersecurity, the Tricks Come More Than Once a Year

March 31, 2023
cybersecurity training

Only 10% of workers remember all their cyber security training

March 30, 2023
Pie Chart, Purple

New API Report Shows 400% Increase in Attackers

March 29, 2023
Cato Networks delivers first CASB for instant visibility and control of cloud application data risk

Cato Networks Recognised as Leader in Single-Vendor SASE Quadrant Analysis

March 29, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information