Story image

New cyber threat using SEO to target websites

19 Jan 16

There’s a new threat on the loose targeting websites, where a sophisticated SEO campaign used SQL injections. Affected websites will distribute hidden HTML links the confuse search engine bots and erroneously impact page rankings.

The threat was discovered by Akamai Technologies Threat Research Division.

Over the course of a two week period in Q3 2015, Threat Research analysed data gathered from the Akamai Intelligent Platform and observed attacks on more than 3800 websites and 348 unique IP addresses participating in the various campaigns, revealing the following key findings:

  • Evidence of mass defacement – when searching the Internet for the HTML links that were used as part of this campaign, Threat Research identified hundreds of web applications containing these malicious links.
  • Attacks manipulated search engine results – when searching for a combination of common words such as “cheat” and “story”, it was apparent that the “cheating stories” application appeared on the first page of the leading search engines.
  • Analytics showcased impact of attacks– Threat Research looked at Alexa analytics and the ranking of the “cheating stories” application dramatically increased during the three month span.

Search engines use specific algorithms to determine page rankings and indexing for sites on the web, and the number and reputation of links that redirect to the web application influence these rankings, Akamai Technologies explains.

According to the company, the SEO attackers created a chain of external links that direct to stories of cheating and infidelity on the web to mimic normal web content and impact search engine algorithms.

“The ability to manipulate page rankings is an enticing proposition and business for attackers,” says Stuart Scholly, senior vice president and general manager, Security Business Unit, Akamai.

“If successful, attacks can impact revenue and, most importantly, the reputation of many organisations and companies using the internet,” he says.

Mitigation

Scholly says attacks in the campaign have demonstrated a unique understanding of search engine operations, and accordingly, Threat Research recommends the following defence techniques:

For Web Application Developers

  • Ensure that you have implemented proper input validation checks for all user-supplied data that will be used within a back-end database query.
  • Only use prepared statements with parameterised queries when constructing SQL queries based on user-supplied data.

For Web Application Defenders

  • Deploy a Web Application Firewall (WAF) that is configured in a blocking mode for SQL Injection attacks.
  • Consider profiling and monitoring the HTML response body format to help identify if there are significant changes such as an increase in the number of web links.
AlgoSec delivers native security management for Azure Firewall
AlgoSec’s new solution will allow a central management capability for Azure Firewall, Microsoft's new cloud-native firewall-as-a-service.
Kiwis losing $24.7mil to scam calls every year
The losses are almost five times higher compared to the same period last year, from reported losses alone.
How to configure your firewall for maximum effectiveness
ManageEngine offers some firewall best practices that can help security admins handle the conundrum of speed vs security.
Exclusive: Why Australian enterprises are prime targets for malware attacks
"Only 14% of Australian organisations are continuously training employees to spot cyber attacks."
Exclusive: Why botnets will swarm IoT devices
“What if these nodes were able to make autonomous decisions with minimal supervision, use their collective intelligence to solve problems?”
"Is this for real?" The reality of fraud against New Zealanders
Is this for real? More often than not these days it can be hard to tell, and it’s okay to be a bit suspicious, especially when it comes to fraud.
Why you should leverage a next-gen firewall platform
Through full lifecycle-based threat detection and prevention, organisations are able to manage the entire threat lifecycle without adding additional solutions.
The quid pro quo in the IoT age
Consumer consciousness around data privacy, security and stewardship has increased tenfold in recent years, forcing businesses to make customer privacy a business imperative.