Contact
QR code for the current URL

Story Box-ID: 429311

Imperva Inc. 3400 Bridge Parkway, Suite 101 94065 Redwood Shores, CA, United States http://www.imperva.com
Contact Ms Claire Hojem +44 20 7183 2841
Company logo of Imperva Inc.
Imperva Inc.

Latest insight from Imperva on search engine poisoning (SEP) attacks

(PresseBox) (Redwood Shores, CA, )
"Today, Imperva released a report on search engine poisoning. Search Engine Poisoning attacks manipulate, or "poison", search engines to display search results that contain references to malware-delivering websites. There are a multitude of methods to perform SEP: taking control of popular websites; using the search engines' "sponsored" links to reference malicious sites; and injecting HTML code.

How has hacker interest in SEP grown? This is very difficult to gauge and formal statistics do not exist quantifying the problem. However, as the recent Bin Laden death reminds us, hackers leverage current events as they happen to dupe search engine users. One metric that helps understand the growth of this problem? Look at hacker forum discussions. For example, one major hacker forum saw a dramatic increase in discussions regarding search engine poisoning:

Year over year growth of SEP discussions in hacker forums: Percent growth

2007 - 2008 980.00%
2008 - 2009 212.96%
2009 - 2010 121.30%

Year over year growth of SEP discussions in hacker forums: Raw numbers

2007 5
2008 54
2009 169
2010 374

How does Imperva detect SEP? Our probes were able to detect and track a SEP attack campaign from start to end. The prevalence and longevity of this attack indicates not only how long it lasted undetected, but also that companies are not aware they are being used as a conduit of an attack. It also highlights that search engines should do more to improve their ability to accurately identify potentially harmful sites and warn users about them.

The attack method we monitored returned search results containing references to sites infected with Cross Site Scripting (XSS). The infected Web pages then redirect unsuspecting users to malicious sites where their computers become infected with malware. This technique is particularly effective as the criminal doesn’t take over, or break into, any of the servers involved to carry out the attack. Instead he finds vulnerable sites, injects his code, and leaves it up to the search engine to spread his malware.

SEP is an extremely popular method used by hackers to widely spread their malware. Attackers exploit XSS to take advantage of the role of third-party websites as mediators between search engines and the attacker’s malicious site.

The prevalence of this attack has ramifications for search engines, especially Google. Current solutions which warn the user of malicious sites lack accuracy and precision whereas many malicious sites continue to be returned un-flagged. However, these solutions can be enhanced by studying the footprints of a SEP via XSS. This allows a more accurate, and timely notification, as well as prudent indexing. We hope Google and Yahoo! step up.”

To receive a copy of this latest report, which includes the SEP observed by Imperva from beginning to end – with screenshots, or have an interview with Amichai Shulman CTO of Imperva please contact claire@eskenzipr.com. 020 7183 2841 To find out more about Imperva visit www.imperva.com.
The publisher indicated in each case (see company info by clicking on image/title or company info in the right-hand column) is solely responsible for the stories above, the event or job offer shown and for the image and audio material displayed. As a rule, the publisher is also the author of the texts and the attached image, audio and information material. The use of information published here is generally free of charge for personal information and editorial processing. Please clarify any copyright issues with the stated publisher before further use. In case of publication, please send a specimen copy to service@pressebox.de.
Important note:

Systematic data storage as well as the use of even parts of this database are only permitted with the written consent of unn | UNITED NEWS NETWORK GmbH.

unn | UNITED NEWS NETWORK GmbH 2002–2024, All rights reserved

The publisher indicated in each case (see company info by clicking on image/title or company info in the right-hand column) is solely responsible for the stories above, the event or job offer shown and for the image and audio material displayed. As a rule, the publisher is also the author of the texts and the attached image, audio and information material. The use of information published here is generally free of charge for personal information and editorial processing. Please clarify any copyright issues with the stated publisher before further use. In case of publication, please send a specimen copy to service@pressebox.de.