Search Engine Poisoning: An Evolving Vector for Malware Distribution via SEO Attacks
DOI:
https://doi.org/10.52783/jns.v14.3181Keywords:
Poisoning, Search Engine Optimization (SEO), Digital Marketing, Malwares, Websites, Or ganic Search, Unpaid Search, Se arch Engine Redirection, DetectionAbstract
To promote websites among search results Search engine optimization (SEO) techniques are often used and over the past
few years the rising rate of increased spread of malware through the Internet has opened up new dimensions for the attackers
along with the traditional techniques for spreading malware (such as through links or attachments in spam emails). The
attackers are continuously devising advance methods to launch attacks among which a technique that has came into the
limelight is the selection of search engines for distributing malware with high potential to produce devastating results. SEO
attacks poisons the search results for popular queries by spreading malware, although recent, appear to be both widespread
and effective where legitimate Websites are compromised and a large number of fake pages targeting trendy keywords are
generated as a result.
Downloads
Metrics
References
D. Fetterly, M. Manasse, and M. Najork. Spam, damn spam, and statistics: using statistical analysis to locate spam Web pages. In Proceedings of the 7th International Workshop on the Web and Databases, WebDB, 2004.
A. Moshchuk, T. Bragin, S. D. Gribble, and H. M. Levy. A crawler-based study of spyware on the Web. In Pro- ceedings of the Network and Distributed System Security Symposium, NDSS, 2006.
D. Arthur and S. Vassilvitskii. K-means++: the advan- tages of careful seeding. In Proceedings of the 18th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA, 2007.
C. Castillo, D. Donato, A. Gionis, V. Murdock, and F. Sil- vestri. Know your neighbors: Web spam detection using the Web topology. In Proceedings of the 30th Interna- tional ACM Conference on Research and Development inInformation Retrieval, SIGIR, 2007.
M. A. Rajab, L. Ballard, P. Mavrommatis, N. Provos, and X. Zhao. The nocebo effect on the web: an analysis of fakeanti-virus distribution. In Proceedings of the 3rd USENIX LEET, 2010
L. Lu, V. Yegneswaran, P. Porras, and W. Lee. Blade: an attack-agnostic approach for preventing drive-by malwareinfections. In Proceedings of the 17th ACM CCS, 2010
K. Thomas, C. Grier, J. Ma, V. Paxson, and D. Song. Design and evaluation of a real- time url spam filtering service. In InProceedings of the IEEE S&P, 2011.
J. John, F. Yu, Y. Xie, M. Abadi, and A. Krishnamurthy. deSEO: Combating search-result poisoning. In Proceedings of the 20th USENIX Security, 2011.
Google search engine optimization. http://www.google.com/webmasters/.
Kozak The dirty little secrets of search. http://www.nytimes.com/2011/02/13/business/13search.html,February 2011.
https://www.bankinfosecurity.com/how-seo-poisoning-used-to-deploy-malware-a- 16882#:~:text=SEO%20poisoning%20is%20an%20illegitimate,websites%20to%20download%20malicious%20files.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
Terms:
- Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.