Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity
    • IT Management

    How Black Hat SEO Abuses Search Engines

    Written by

    Brian Prince
    Published August 16, 2010
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Designing malware and exploits is only one end of the business for black hats. Getting that malicious content to users is another.

      A key way for attackers to do that is through search engine optimization (SEO), which boosts the search engine rankings of compromised or malicious Web pages.

      “Black hat SEO works by exploiting search indexing algorithms, and I think search engine providers work hard to try and tweak their processes to cut down on misleading search results, but it’s a cat and mouse game,” said Marc Fossi, manager of research and development for Symantec Security Response. “When search engine providers fine-tune their algorithms or make other changes to try and reduce black hat SEO effectiveness, the bad guys counter these adjustments by making minor adjustments of their own.”

      There are three main ways black hats go about search optimization: keyword stuffing, cloaking and link farming. Cloaking, Fossi explained, is where content is created specifically for search engine crawlers and is hidden from normal view.

      Link farming is another common technique for SEO. Chris Larsen, senior malware researcher at Blue Coat Systems, took a look inside such an operation here. In a conversation with eWEEK, he described link farms as a network of interconnected pages with false content designed to look reputable to Google and other search engines to boost search rankings.

      “One place the bad guys like to put link farms is on legitimate sites, and not all link farms are networks of thousands and thousands of bogus pages,” he explained. “Our focus is on identifying and blocking the malware chains, which only begin at the link farms-[which are] so numerous and fluid that it’s not so productive to go after them. There are dozens to hundreds of link farms in any single network, but only a handful of active malicious relay/destination servers-so they are higher value targets.”

      It has become very common for link farm pages to present a clean view to the search engine indexer with no malicious script, he added, which indicates search engines have gotten better at spotting such scripts.

      To get links in front of users, attackers sometimes exploit Web pages such as blogs and news sites that accept user input.

      “The person trying to get their misleading search result high in the rankings will simply paste their URL into these comment fields and anywhere else that allows for user input, and by so doing, search engines see that Web page as more important because so many other sites link to it,” Fossi said.

      When requests for a page are coming from a search engine such as Bing or Google, the user will be redirected to a malicious site. When users visit the pages without the help of a search engine, they will often not be served the malicious content.

      “Rogue AV has been the most common attack that we’ve seen tied to Black hat SEO,” noted Michael Sutton, vice president of security research at Zscaler. Other attacks, he said, include fake updates for software such as Adobe Flash Player that are actually malware.

      “The creativity used by the attackers is impressive-sadly, the average end user is often fooled,” Sutton said.

      According to a spokesperson for Google, the company works to detect and flag sites that serve malware with warning labels in its search results.

      “We are always working to identify and eliminate malware from our index with manual and automated processes,” the spokesperson said.

      For organizations, protecting against SEO requires a mix of URL filtering and content inspection, as well as malware detection technologies. In addition, Website administrators should make sure their sites aren’t vulnerable to compromise by attackers looking for legitimate sites to host their scheme.

      In a paper released (PDF) in March titled “Poisoned search results: How hackers have automated search engine poisoning attacks to distribute malware,” researchers at Sophos found vulnerable versions of popular CMS applications are also a common link between many compromised sites.

      “It is imperative that site administrators upgrade and patch such applications regularly,” the researchers wrote. “The homogeneous nature of the content produced by these CMS systems makes it trivial for attackers to identify potential sites to compromise. … Content scanning on the web server can also add significant protection against SEO attacks, providing detection for the scripts used in SEO kits and PHP backdoors. Such detections can give administrators an early heads up of a potential server compromise.”

      As time goes on, attackers will likely move more and more of their content to hacked sites, Larsen predicted.

      “The search engines will be fighting this battle for the foreseeable future,” he said.

      Brian Prince
      Brian Prince

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.