Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

8/14/2011
09:23 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

CMU Researcher Finds Web Hackers Profiting From Illegal Online Pharmacies

Carnegie Mellon University research team found evidence of substantial manipulation of search results to promote unauthorized pharmacies

PITTSBURGH, Aug. 11, 2011 /PRNewswire/ -- A growing number of illegal online pharmacies are flooding the Web trying to sell dangerous unauthorized prescriptions, according to a new report from cybersecurity experts at Carnegie Mellon University.

Report authors Nicolas Christin, associate director of the Information Networking Institute (INI) and a senior systems scientist at the INI and CyLab, Nektarios Leontiadis from the Department of Engineering and Public Policy (EPP), and Tyler Moore from Wellesley College, found that rogue websites were redirecting consumers to illicit pharmacies.

By researching the top search results for 218 drug-related queries over nine months in 2010 and 2011, Christin's research team found evidence of substantial manipulation of search results to promote unauthorized pharmacies.

"We have known for some time that unauthorized online pharmacies have been using email spam to tap the wallets of unwary online consumers, but that method did not blanket enough customers so now the online thieves are infecting websites to redirect unwary consumers to hundreds of illegal online pharmacies," Christin says.

Christin reports that his team found that one third of the collected search results were of 7,000 infected websites triggered to redirect to a few hundred pharmacy websites. One quarter of the top 10 search results were observed to actively redirect to illicit pharmacies, and another 15 percent of the top results were for sites that no longer redirected, but had previously been compromised.

Using estimates of the popularity of drug-related search terms and the payment-processing websites used by pharmacies, Carnegie Mellon researchers report that search engine manipulation is considerably more efficient than email spam.

"So, to those who aim to reduce unauthorized pharmaceutical sales, more emphasis needs to be made in combating transactions facilitated by Web search," Christin said.

Carnegie Mellon research is supported by a public health alert by the National Association of Boards of Pharmacy (NABP) warning Americans about the serious dangers associated with medicines purchased through fake online pharmacies. The NABP reports that 98 percent of illicit web pharmacy sites continue to operate out of compliance with U.S. pharmacy laws

About Carnegie Mellon University: Carnegie Mellon (www.cmu.edu) is a private, internationally ranked research university with programs in areas ranging from science, technology and business, to public policy, the humanities and the arts. More than 11,000 students in the university's seven schools and colleges benefit from a small student-to-faculty ratio and an education characterized by its focus on creating and implementing solutions for real problems, interdisciplinary collaboration and innovation. A global university, Carnegie Mellon's main campus in the United States is in Pittsburgh, Pa. It has campuses in California's Silicon Valley and Qatar, and programs in Asia, Australia, Europe and Mexico. The university is in the midst of a $1 billion fundraising campaign, titled "Inspire Innovation: The Campaign for Carnegie Mellon University," which aims to build its endowment, support faculty, students and innovative research, and enhance the physical campus with equipment and facility improvements.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/13/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-14300
PUBLISHED: 2020-07-13
The docker packages version docker-1.13.1-108.git4ef4b30.el7 as released for Red Hat Enterprise Linux 7 Extras via RHBA-2020:0053 (https://access.redhat.com/errata/RHBA-2020:0053) included an incorrect version of runc that was missing multiple bug and security fixes. One of the fixes regressed in th...
CVE-2020-14298
PUBLISHED: 2020-07-13
The version of docker as released for Red Hat Enterprise Linux 7 Extras via RHBA-2020:0053 advisory included an incorrect version of runc missing the fix for CVE-2019-5736, which was previously fixed via RHSA-2019:0304. This issue could allow a malicious or compromised container to compromise the co...
CVE-2020-15050
PUBLISHED: 2020-07-13
An issue was discovered in the Video Extension in Suprema BioStar 2 before 2.8.2. Remote attackers can read arbitrary files from the server via Directory Traversal.
CVE-2020-10987
PUBLISHED: 2020-07-13
The goform/setUsbUnload endpoint of Tenda AC15 AC1900 version 15.03.05.19 allows remote attackers to execute arbitrary system commands via the deviceName POST parameter.
CVE-2020-10988
PUBLISHED: 2020-07-13
A hard-coded telnet credential in the tenda_login binary of Tenda AC15 AC1900 version 15.03.05.19 allows unauthenticated remote attackers to start a telnetd service on the device.