Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Latest insight from Imperva on search engine poisoning(SEP) attacks

June 2011 by Imperva

Today, Imperva released a report on search engine poisoning. Search Engine Poisoning attacks manipulate, or “poison”, search engines to display search results that contain references to malware-delivering websites.

There are a multitude of methods to perform SEP: taking control of popular websites; using the search engines’ “sponsored” links to reference malicious sites; and injecting HTML code. Here’s a graphic explaining how it works:

How has hacker interest in SEP grown? This is very difficult to gauge and formal statistics do not exist quantifying the problem. However, as the recent Bin Laden death reminds us, hackers leverage current events as they happen to dupe search engine users. One metric that helps understand the growth of this problem? Look at hacker forum discussions. For example, one major hacker forum saw a dramatic increase in discussions regarding search engine poisoning:

Year over year growth of SEP discussions in hacker forums: Percent growth

 2007 - 2008: 980.00%
 2008 - 2009: 212.96%
 2009 - 2010: 121.30%

Year over year growth of SEP discussions in hacker forums: Raw numbers

 2007: 5
 2008: 54
 2009: 169
 2010: 374

How does Imperva detect SEP? Our probes were able to detect and track a SEP attack campaign from start to end. The prevalence and longevity of this attack indicates not only how long it lasted undetected, but also that companies are not aware they are being used as a conduit of an attack. It also highlights that search engines should do more to improve their ability to accurately identify potentially harmful sites and warn users about them.

The attack method we monitored returned search results containing references to sites infected with Cross Site Scripting (XSS). The infected Web pages then redirect unsuspecting users to malicious sites where their computers become infected with malware. This technique is particularly effective as the criminal doesn’t take over, or break into, any of the servers involved to carry out the attack. Instead he finds vulnerable sites, injects his code, and leaves it up to the search engine to spread his malware.

SEP is an extremely popular method used by hackers to widely spread their malware. Attackers exploit XSS to take advantage of the role of third-party websites as mediators between search engines and the attacker’s malicious site.

The prevalence of this attack has ramifications for search engines, especially Google. Current solutions which warn the user of malicious sites lack accuracy and precision whereas many malicious sites continue to be returned un-flagged. However, these solutions can be enhanced by studying the footprints of a SEP via XSS. This allows a more accurate, and timely notification, as well as prudent indexing. We hope Google and Yahoo! step up.”


See previous articles

    

See next articles


Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts