Personal Tech Pipeline | Spoof | Worm Redirects Google Searches For Profit
<A HREF="http://as.cmpnet.com/event.ng/Type=click&amp;FlightID=43525&amp;AdID=86367&amp;TargetID=2164&amp;Segments=115,1411,2549,2690,3108,3448,4751,6918&amp;Targets=315,2164,2625,2878,5028&amp;Values=34,46,51,63,77,85,90,100,140,203,222,227,442,645,646,659,1184,1405,1431,1716,1767,1785,1798,1901,1925,1935,1936,1945,1970,2217,2299,2310,2329,2352,2678,2787,2862,2878,2942,2956,3229,3262,3347,3385&amp;RawValues=&amp;Redirect=http://www.cmp.com/resources/res_whitepapers_main.jhtml?cid=b2b_feet" target="_top"><IMG SRC="http://i.cmpnet.com/ads/graphics/as5/ps/blank.gif" WIDTH=468 HEIGHT=60 BORDER=0></A>

White Papers

Sponsor Resources

WebCasts
Free Newsletter GlossaryContact UsAbout Us
Players & CamsPhones & PDAsHome & AutoOnline

September 16, 2005

Worm Redirects Google Searches For Profit



Courtesy of TechWeb News

A new worm modifies the infected PC so attempts to search using Google are directed to a spoofed site that looks like the real thing, but with different sponsored links to drive traffic to sites the hacker's designated, a security firm said Friday.

Panda Software's analysis of the P2Load.a worm showed that after compromising a PC, it modifies the Windows HOSTS file so all attempts to reach google.com -- and even mistyped addresses, such as "googel.com" -- are redirected to a site actually served from Germany.

"The page is an exact copy of Google and supports the 17 languages of Google," said Panda in a statement.

Searches run on the spoofed version of Google return results similar to the real Google, but in some cases, the sponsored links -- top-of-the-page and right-side links to e-commerce sites that have paid for the placement -- are different.

"The creator of this worm has taken advantage of the importance of a company appearing among the first few links in the search results of an Internet browser,” said Luis Corrons, director of PandaLabs, in a statement. “Its aims are none other than to increase visits to the pages linked by the creator of this malware or earn an income from companies that want to appear in the first few results in computer where the identity of Google has been spoofed…in both case, the motivation of the author of this malware is purely financial."

Because the new HOSTS file is downloaded from a Web site, not embedded in the worm's code as is the usual practice, Panda warned that P2Load.a, or similar threats, could spoof other popular sites by simply changing the content of the file downloaded.

Google has been targeted by hackers before. In March, for instance, a widespread DNS cache poisoning attack redirected traffic from Google and other popular URLs to hacker sites. In another case, phishers and spyware creators downloaded software, including bank account theft software, to PCs when their owners mistyped google.com and ended up at a malicious site hosted by servers in Russia.

E-mail This Story
Print This Story
Reprint This Story




Get the latest Personal Tech news, product info, and trends every week.


Related Content

  Right-click and choose Copy to extract RSS Feed URL  Personal Tech Pipeline's Main RSS Feed
  Right-click and choose Copy to extract RSS Feed URL  Personal Tech Pipeline's Blog RSS Feed



Keeping Up To Date On Enterprise Server Tech?
Review our compilation of columns on server security, database software, and Linux issues.
How to Achieve High Performance Through IT
Learn to achieve high performance by aligning IT to
strategic objectives and solutions to unlock that value.
Using Current Performance to Shape
Future Results

Hear new strategies for improving business
performance and results.

Editor's Picks

Well, Microsoft has "unfolded" its "Origami" ultra-mobile PC platform Thursday. It turned out to be a full-featured PC smaller than a tablet but bigger than a PDA. Are you impressed?
Yes! I want one!
Sort of. We'll see.
No! It's too big for a pocket and too small for real computing. What's the point?


In search of personal tech products? See our new Product Finder, where you'll find personal computing devices, communications solutions, security products, and more.



PERSONAL TECH PIPELINE MARKETPLACE (sponsored links)
On the CIO Agenda with IBM
With business growth back on the agenda, the role of the CIO is changing from manager of technology to C-suite collaborator in enabling innovation that matters for the business. Read an executive summary and register to download the full IBM paper.

Symantec Backup Solutions
Desktop to Data Center Protection. Explore the Official Symantec Site.

SEC & HIPAA IM Compliance
Satisfy regulatory and compliance requirements for instant messaging.

Secure & Easy Console Management with Digi CM
The Digi CM console server provides secure, intelligent & easy access to network devices with a serial console port. With Digi CM, you can securely monitor & control servers, routers, switches & other devices even when your network is down.

Understand the financial impact of open source.
Will open source pay off? Open source is becoming standard within enterprises, often because of cost savings. Find out how much of a financial impact it can have on your organization. Get this methodology and calculator now, compliments of JBoss. Go!


Buy a Link Now


Top ten search terms from the TechWeb TechEncyclopedia
How does your pay rate? Check the InformationWeek Salary Survey
Mobilized Solutions Guide: Find and compare solutions for your business
Top Requested White Paper Categories from TechWeb White paper Library
Top ten search terms from the TechWeb TechEncyclopedia