Google expunges malware sites from search results
Not that it's admitting there was ever a problem, mind you
Computerworld - Google Inc. has purged its index of the thousands of malware sites that wormed their way into results lists for hundreds of legitimate search phrases, researchers confirmed today.
"They look gone to us," said Alex Eckelberry, the CEO of Sunbelt Software Distribution Inc., the company that broke the news Monday of a massive, coordinated campaign by attackers to spread malware through search results on Google, Yahoo, Microsoft Live Search and other sites.
"Google did confirm yesterday with us that they were working the case, and they are good about nailing this stuff," Eckelberry added in an e-mail late Wednesday afternoon. Sunbelt had notified Google of its findings on Monday.
Earlier today, Sunbelt malware researcher Adam Thomas said his spot searches on Google the night before had come up sans malware URLs. "They appeared to be zapped," Thomas had said.
Ironically, Google itself refused to confirm or deny that it had cleansed its index of the more than 40,000 malware hosting sites, or even that they had existed. "Google takes the security of our users very seriously, especially when it comes to malware," a company spokeswoman said today in an e-mail. "In our search results, we try to warn users of potentially dangerous sites when we know of them. Sites that clearly exploit browser security holes to install software, such as malware, spyware, viruses, adware and Trojan horses, are in violation of the Google quality guidelines and may be removed from Google's index."
She did not, however, answer questions about how long it takes Google to purge its search index or whether it has countermeasures that are supposed to keep sites from gaming its ranking system. According to Thomas, the group who created and stocked the sites with Trojan horses, rootkits and password-stealers drove up those sites' search-result rankings by spamming blogs and site-comment sections with their links.
A Yahoo spokeswoman said her company has taken action to fend off malware. ?????????Yahoo! is very serious about protecting its users from malicious sites on the Web," she said in an e-mailed statement. "Malware is an ongoing battle for all search engines and Yahoo has processes in place to quickly remove these sites from its index.?????????
Microsoft Corp., meanwhile, would only say that it was on the case. "We are aware of the issues and are working to rectify the situation," said Justin Osmer, a senior product manager for Live Search, in an e-mail sent by the company's public relations firm.
Yahoo Inc. did not respond to a similar request for comment Wednesday.
Sunbelt first noticed the huge number of infected sites, and their appearance in results lists for a bewildering array of searches, on Sunday. Thomas explained how the attackers managed to beat the search system. "For months now, our research team has monitored a network of bots whose sole purpose is to post spam links and relevant keywords into online forms, typically comment forms and bulletin board forums," he said. "This network, combined with thousands of pages such as the two seen above, have given the attackers very good, if not top, search-engine position for various search terms." Among the hundreds of search terms he had spotted being used were "infinity" and "hospice."
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts