Google SEO Poisoning Campaign
Compromises 15,000 Sites
Contents
Summary Of The Attack
- Around 15,000 sites were compromised in a major search engine optimization campaign.
- The victims were redirected to fake Q&A discussion forums.
- WordPress PHP files of the websites were modified and injected to increase malicious sites rankings.
- The attack was first spotted by Sucuru.
- The threat actors probably tried to conduct an ad fraud.
Stay Up-To-Date On The Latest Attacks
Be the first to know when our experts release new insights on the top attacks.
You're on the list! Just one more step...
Check your email to confirm your subscription.
What Happened?
In the second week of November, around 15,000 sites were compromised in a major search engine optimization (SEO) campaign. The threat actors established the attack to redirect the visitors of the websites to fake Q&A discussion forums.
What Is SEO Poisoning?
SEO poisoning is a type of cyber attack where a threat actor attempts to manipulate search engines into ranking compromised websites higher in search results.
This can be done by using keywords related to popular search terms, creating fake backlinks, or injecting malicious code into legitimate websites. When a user visits the compromised site they may be redirected to a phishing site that hosts malware, or a site that displays unwanted or inappropriate content.
Free Security Policy Templates
Get a step ahead of your cybersecurity goals with our comprehensive templates.
Why Are Threat Actors Using Google Search?
The reason why URLs selectable from Google Search are used is because the URL performance metrics are increased. This is important for the page to be indexed by the platform leading to greater visibility and more visitors to the site.
Also in this manner, some security controls are bypassed and the traffic is classified as legitimate.
Another thing used is the exclusion of logged in users as well as those entering through wp-login.php, which aims to avoid the redirection of an administrator of the site which would raise suspicion and possible alerting and cleaning of the compromised site.
The Anatomy Of The Attack
Attackers modified WordPress PHP files of the websites, some of them being ‘wp-singup.php’, ‘wp-cron.php’, ‘wp-settings.php’, ‘wp-mail.php’, and ‘wp-blog-header.php’, with the goal to inject the redirects to the fakes Q&A discussion forums. The final goal is to increase the rankings of fake sites in search engines.
First Signs Of The Attack
The attacks were spotted primarily by Sucuri and the analysis says that each compromised site that is used as part of the scheme contains approximately 20,000 files used as part of the search engine spam campaign, with most of the sites being WordPress.
What the researchers have also noticed is the presence of ads.txt files on the landing pages which could also indicate that the threat actors are trying to increase traffic to their fake sites in order to commit ad fraud.
What Is Ad Fraud?
Adware, also known as advertising-supported software, are usually used to make revenue for its developers by automatically generating advertisements on the user’s screen. The ads can usually be found within a web browser.
Money can be made from adware from the following methods:
- Pay-per-click – With this method developers get paid each time the user opens an ad.
- Pay-per-view – Money is generated each time the user is shown an ad.
- Pay-per-install – Revenue is made each time bundled software is installed on a device.
How The Attack Happened
Besides infecting some of the files, the attackers also injected a few of them by changing just slightly the name of the aforementioned files so they look like legitimate ones.
Those, whether injected or infected files contain malicious pieces of code that then check if the website visitors logged into WordPress, and if not, redirect them to https://ois.is/images/logo-6.png URL.
What happens after that is that an image is not loaded, as the user expects but instead, JavaScript is loaded that redirects the users to a Google Search click URL that redirects the users to a promoted Q&A site.
The image file uses the ‘windows.location.href’ function and redirects the user to one of the following domains:
- qa.istisharaat[.]com
- en.photolovegirl[.]com
- en.poxnel[.]com
- Qa.tadalafilhot[.]com
- Questions.rawafedpor[.]com
- qa.elbwaba[.]com
How Site Owners Can Prevent This Attack
The recommendation is to upgrade all WordPress plugins and website CMS to their latest version and to activate 2 Factor Authentication (2FA) on all admin accounts.
Article by
Share This Article
Our Editorial Process
Our content goes through a rigorous approval process which is reviewed by cybersecurity experts – ensuring the quality and accuracy of information published.
Categories
The Breach Report
Our team of security researchers analyze recent cyber attacks, explain the impact, and provide actionable steps to keep you ahead of the trends.