iFrame Piggybacking on Google Searches to Install Malware

These spammers and scammers are getting rather clever, and very sneaky. This is still epedemic and seems to be happening more and more. It takes a re-write of many of the large sites online..which frankly isn’t going to happen is it?

It just shows once again the spammers will think of all kinds of weird little tricks to get their goods pimped online

Hackers have found a new way to get Google to point to malicious websites with the help of unwitting websites such as TorrentReactor, ZDNet Asia and several other CNET-owned properties.

As a result, more than 101,000 Google search results that appeared to lead to pages of legitimate sites actually directed end users to sites that attempted to install malware.

The hack, which was first documented Wednesday by Netherlands-based researcher Dancho Danchev, takes advantage of the practice by many sites of logging search queries typed into their search boxes and storing them where search engine bots can see them. The terms are then indexed by Google and other search engines and included in the results they return. Exploiting the weakness is as easy as typing popular search terms into a popular website along with the text of an IFRAME that points to a malicious website. Within time, the strings will be included in results returned by Google and others.

Pretty dodgy eh? These ones are straight installing malware too, not even pointing to phishing sites or straight up adverts/porn sites.

This is going for mass infection, possible a part of some large botnet operation.

In the second half of 2007, 51 per cent of sites hosting malware were legitimate destinations that had been compromised, as opposed to sites specifically set up by criminals, according to security firm Finjan. In the case here, neither ZDNet Asia nor TorrentReactor were compromised, although the criminals were clearly taking advantage of their strong page ranking and the trust that many end users have in them.

The injected IFRAME redirects unwitting users to sites associated with the Russian Business Network, F-Secure says. The sites try to install malicious programs with names including XP Antivirus 2008 and Spy Shredder Scanner.

The attackers are also notable for the care they’ve taken to cover their tracks. The malicious sites will only attack users who click on the link as it’s returned from Google or another major search engine. Client-side honeypots or security researchers who merely type the address into a browser will receive an error message indicating the site is unavailable.

Even if the site itself is secure, a small architecture flaw allows things like this to flourish, apparently ZDNet Asia fixed the issue. There are still 100’s of other large sites still effected though.

Source: The Register

Posted in: Exploits/Vulnerabilities, Malware, Spammers & Scammers, Web Hacking

Latest Posts:

Memhunter - Automated Memory Resident Malware Detection Memhunter – Automated Memory Resident Malware Detection
Memhunter is an Automated Memory Resident Malware Detection tool for the hunting of memory resident malware at scale, improving threat hunter analysis process.
Sandcastle - AWS S3 Bucket Enumeration Tool Sandcastle – AWS S3 Bucket Enumeration Tool
Astra - API Automated Security Testing For REST Astra – API Automated Security Testing For REST
Astra is a Python-based tool for API Automated Security Testing, REST API penetration testing is complex due to continuous changes in existing APIs.
Judas DNS - Nameserver DNS Poisoning Attack Tool Judas DNS – Nameserver DNS Poisoning Attack Tool
Judas DNS is a Nameserver DNS Poisoning Attack Tool which functions as a DNS proxy server built to be deployed in place of a taken over nameserver to perform targeted exploitation.
dsniff Download - Tools for Network Auditing & Password Sniffing dsniff Download – Tools for Network Auditing & Password Sniffing
Dsniff download is a collection of tools for network auditing & penetration testing. Dsniff, filesnarf, mailsnarf, msgsnarf, URLsnarf, and WebSpy passively monitor a network
OWASP Amass - DNS Enumeration, Attack Surface Mapping & External Asset Discovery OWASP Amass – DNS Enumeration, Attack Surface Mapping & External Asset Discovery
The OWASP Amass Project is a DNS Enumeration, Attack Surface Mapping & External Asset Discovery tool to help information security professionals perform network mapping of attack surfaces.

5 Responses to iFrame Piggybacking on Google Searches to Install Malware

  1. zupakomputer April 1, 2008 at 12:39 pm #

    As the article says, this is taking advantage of the way the searches are indexed. I’ve never agreed with those kinds of methods of returning searches; I’m not interested in what other people looked for – I’m interested if the website creator says they have whatever info I’m looking for (in their tags) and have specified or if the text or images (or whatever else specified) contains the terms I typed in.

    Search engines tend to be awful and they’ve been getting worse for years; thesedays your finding what you really wanted is wholly dependant on someones else having also searched for the same thing.

    I remember when the phrase or keyword you typed actually retuned results and ALL of them contained that phrase / keyword. There’s too many results thesedays that also claim to have what you typed in – and you go to the page…..and there’s nothing there to do with it, then there’s the ones that direct you to: another search engine. Rubbish.

  2. goodpeople April 1, 2008 at 12:59 pm #

    It would be a good day if this marked the end of the Google/Yahoo etc. searchbars….

  3. Pantagruel April 1, 2008 at 7:12 pm #


    Indeed it’s always a pain to explain why people should refrain from this ‘apperently’ handy piece of software.

  4. ZaD MoFo April 1, 2008 at 10:10 pm #

    Again the stupid idea of being the biggest or the best!

    Google had in a way ejected all the others search engine from what was a choice act. But when the near ONLY choice get contaminated with malware, how come a simple answered question could bring such great security treat. Google now is a big business and will take long to react. This is the price to pay for a single source of answers.

    By the way, Dancho Danchev, a blog I visit frequently, made a fabulous investigative work on the subject.

  5. Pantagruel April 2, 2008 at 9:08 am #

    @ZaD MoFo

    Thanks for the blog hint.
    Danchev has been indeed following the iframe inject problem for quite some time (judging by his blog entries). He also touches some other problems and phenomena which are good reading stuff.