Vulnerabilities / Threats
8/18/2010
12:21 PM
50%
50%

Scareware Using Bing Results To Expand Attack

Mass rogue antivirus campaign tricking search engines to return malicious links using results from Microsoft's search engine.




Slideshow: Cloud Security Pros And Cons
(click for larger image and for full photo gallery)
A new scareware attack serving rogue antivirus advertisements has been targeting Swiss and Dutch websites. Interestingly, the attack uses a novel technique to lure search engine users: it relies on Bing search results to stay relevant.

On Friday, Dancho Danchev, an independent security consultant based in the Netherlands, blogged that he'd been tracking "a blackhat SEO campaign that's persistently compromising legitimate sites within small ISPs in the Netherlands and Switzerland, for scareware-serving purposes."

He said, "Although this beneath-the-radar-targeting approach is nothing new, it once again emphasizes a well-proven mentality within the cybercrime ecosystem." Namely, target "hundreds of thousands of low-profile sites," using them to poison search engine results with fake links, and attackers can generate more traffic to those links than if they'd targeted more high-profile and better-secured websites.

Typically, these rogue antivirus -- or as Google calls it, fake AV -- campaigns infect numerous websites as fast possible, before the search engine operators catch on, and this attack was no exception. "In many cases we were looking at mass compromises where a server hosting hundreds of websites was compromised," blogged Bojan Zdrnja, at the SANS Internet Storm Center, on Tuesday.

He said the new attack resembles rogue AV campaigns seen this past June and July, in which attackers infected all PHP files on a targeted website. This attack, however, only places a single, master PHP script -- often dubbed "page.php" or "wp-page.php" -- which then "phones home" for further instructions and downloads additional PHP scripts as required.

Whenever a search engine crawler indexes an infected website, the master script takes the keyword sought by the crawler and requests the top 50 results for that keyword from Bing. The master script massages the Bing results, strips out any JavaScript, again phones home -- receiving 100 links to other compromised websites -- and uses the Bing results and links to create an index.html page, which it returns to the web crawler.

Interestingly, the master script also hides itself, refusing to display if accessed directly. Instead, it only responds to web crawler requests, or to referrers, meaning someone clicked on a rogue AV link in search engine results. At that point, "the browser is redirected to a third site -- and possibly fourth -- that displays the infamous RogueAV warnings," said Zdrnja.

He said this attack is an obvious improvement on prior versions. "Yesterday I checked Google and I was able to find thousands of poisoned results pointing to such compromised websites," he wrote on Tuesday. "While the search engine operators do a lot of work to prevent poisoning like this, it is clear that the bad guys are not resting either and that they are developing new poisoning techniques constantly."

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8802
Published: 2015-01-23
The Pie Register plugin before 2.0.14 for WordPress does not properly restrict access to certain functions in pie-register.php, which allows remote attackers to (1) add a user by uploading a crafted CSV file or (2) activate a user account via a verifyit action.

CVE-2014-9623
Published: 2015-01-23
OpenStack Glance 2014.2.x through 2014.2.1, 2014.1.3, and earlier allows remote authenticated users to bypass the storage quote and cause a denial of service (disk consumption) by deleting an image in the saving state.

CVE-2014-9638
Published: 2015-01-23
oggenc in vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (divide-by-zero error and crash) via a WAV file with the number of channels set to zero.

CVE-2014-9639
Published: 2015-01-23
Integer overflow in oggenc in vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (crash) via a crafted number of channels in a WAV file, which triggers an out-of-bounds memory access.

CVE-2014-9640
Published: 2015-01-23
oggenc/oggenc.c in vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted raw file.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.