RSS

Tag Archives: Malware

Google Now Detecting Viruses, For At Least One Form Of Malware

Google has just announced something pretty interesting, that it is using its own data to detect viruses and will as of today be using Google Search results pages to warn users if their computers are infected with a specific form of malware. Users infected with the virus, which is apparently rerouting traffic to Google and other sites through a proxy, will see the below warning.

From the Google blog post mysteriously titled “Using data to protect people from malware”:

“Recently, we found some unusual search traffic while performing routine maintenance on one of our data centers. After collaborating with security engineers at several companies that were sending this modified traffic, we determined that the computers exhibiting this behavior were infected with a particular strain of malicious software, or “malware.” As a result of this discovery, today some people will see a prominent notification at the top of their Google web search results.”

Google’s Matt Cutts offers more details about the virus on his Twitter account, apparently it only affects Windows computers and hijacks Google results. “That’s how we learned about it,” Cutts says about the “results hacking” thing, without offering many more details. Google is recommending you follow the advice in its Help Center if you do receive the notification.

This is the first time major search engine turns its results pages into what is ostensibly a malware alarm. Of course this is in the company’s best interests; if proxies are intercepting communications they could also potentially access Google accounts, thus creating more headaches for Google.

beast image

 
1 Comment

Posted by on July 20, 2011 in Uncategorized

 

Tags: , , , , , , , , , , , , , ,

Attackers Using Google Image Search to Distribute Malware

Attackers are now using Google’s image search to distributed malware, security experts say. Thousands of sites have reportedly been compromised by code injection–the malicious code redirects users to fake antivirus applications.

Internet Storm Center researcher Bojan Zdrnja writes that the attackers are mostly targeting WordPress sites, and are injecting PHP code that generates pages with images based on highly-searched content. Google then indexes these pages, and the images show up on Google’s image search.

Image hack is widespread and effective

Image searchers can be redirected to these fake antivirus sites, thanks to Google displays images when clicked, Zdrnja wrote in a blog post this week. At least 5,000 sites have been compromised, and Google could be serving as many as 15 million hits a month to these malicious pages.

Russian security researcher Denis Sinegubko said that, in about 90 percent of the compromised image searches, results from malicious websites appear on the first page.

“The main problem is not that cybercrooks managed to seriously poison Google Image search results but the fact that many people do click on such results results and get exposed to malicious content,” Sinegubko wrote to the Unmask Parasites blog on Thursday.

Google in the process of improving detection

Google says it is aware of the problem, and is making an effort to detect malicious pages. It would not detail its plans out of fear that attackers may adjust their methods to get around the company’s efforts. Sinegubko is also in the process of developing an add-on for Firefox that will alert users to these links.

Efforts are already underway to protect Google users on the web search side: Google added alerts to potentially hacked sites in December of last year, and Google’s Chrome browser blocks potentially dangerous downloads. For whatever reason, Google’s image search remains unprotected.

What can you do in the meantime to protect yourself if you feel that you have visited a malicious site via Google Images? Security experts recommend not trying to click your way out of it. Instead, quit the browser application using Ctrl-Alt-Delete.(pcworld)

beast image

 
1 Comment

Posted by on May 7, 2011 in Uncategorized

 

Tags: , , , , , , , , , ,