Vulnerabilities / Threats
8/18/2010
12:21 PM
50%
50%

Scareware Using Bing Results To Expand Attack

Mass rogue antivirus campaign tricking search engines to return malicious links using results from Microsoft's search engine.




Slideshow: Cloud Security Pros And Cons
(click for larger image and for full photo gallery)
A new scareware attack serving rogue antivirus advertisements has been targeting Swiss and Dutch websites. Interestingly, the attack uses a novel technique to lure search engine users: it relies on Bing search results to stay relevant.

On Friday, Dancho Danchev, an independent security consultant based in the Netherlands, blogged that he'd been tracking "a blackhat SEO campaign that's persistently compromising legitimate sites within small ISPs in the Netherlands and Switzerland, for scareware-serving purposes."

He said, "Although this beneath-the-radar-targeting approach is nothing new, it once again emphasizes a well-proven mentality within the cybercrime ecosystem." Namely, target "hundreds of thousands of low-profile sites," using them to poison search engine results with fake links, and attackers can generate more traffic to those links than if they'd targeted more high-profile and better-secured websites.

Typically, these rogue antivirus -- or as Google calls it, fake AV -- campaigns infect numerous websites as fast possible, before the search engine operators catch on, and this attack was no exception. "In many cases we were looking at mass compromises where a server hosting hundreds of websites was compromised," blogged Bojan Zdrnja, at the SANS Internet Storm Center, on Tuesday.

He said the new attack resembles rogue AV campaigns seen this past June and July, in which attackers infected all PHP files on a targeted website. This attack, however, only places a single, master PHP script -- often dubbed "page.php" or "wp-page.php" -- which then "phones home" for further instructions and downloads additional PHP scripts as required.

Whenever a search engine crawler indexes an infected website, the master script takes the keyword sought by the crawler and requests the top 50 results for that keyword from Bing. The master script massages the Bing results, strips out any JavaScript, again phones home -- receiving 100 links to other compromised websites -- and uses the Bing results and links to create an index.html page, which it returns to the web crawler.

Interestingly, the master script also hides itself, refusing to display if accessed directly. Instead, it only responds to web crawler requests, or to referrers, meaning someone clicked on a rogue AV link in search engine results. At that point, "the browser is redirected to a third site -- and possibly fourth -- that displays the infamous RogueAV warnings," said Zdrnja.

He said this attack is an obvious improvement on prior versions. "Yesterday I checked Google and I was able to find thousands of poisoned results pointing to such compromised websites," he wrote on Tuesday. "While the search engine operators do a lot of work to prevent poisoning like this, it is clear that the bad guys are not resting either and that they are developing new poisoning techniques constantly."

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7437
Published: 2015-03-29
Multiple integer overflows in potrace 1.11 allow remote attackers to cause a denial of service (crash) via large dimensions in a BMP image, which triggers a buffer overflow.

CVE-2013-7438
Published: 2015-03-29
Multiple buffer overflows in pbm212030 allow remote attackers to cause a denial of service (crash) or possible execute arbitrary code via a crafted PBM image, related to (1) stream line data, which triggers a heap-based buffer overflow, or (2) vectors related to an "internal intermediate heap-based ...

CVE-2014-5427
Published: 2015-03-29
Johnson Controls Metasys 4.1 through 6.5, as used in Application and Data Server (ADS), Extended Application and Data Server (aka ADX), LonWorks Control Server 85 LCS8520, Network Automation Engine (NAE) 55xx-x, Network Integration Engine (NIE) 5xxx-x, and NxE8500, allows remote attackers to read pa...

CVE-2014-5428
Published: 2015-03-29
Unrestricted file upload vulnerability in unspecified web services in Johnson Controls Metasys 4.1 through 6.5, as used in Application and Data Server (ADS), Extended Application and Data Server (aka ADX), LonWorks Control Server 85 LCS8520, Network Automation Engine (NAE) 55xx-x, Network Integratio...

CVE-2014-9205
Published: 2015-03-29
Stack-based buffer overflow in the PmBase64Decode function in an unspecified demonstration application in MICROSYS PROMOTIC stable before 8.2.19 and PROMOTIC development before 8.3.2 allows remote attackers to execute arbitrary code by providing a large amount of data.

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.