Search Engine Poisoning: An Evolving Vector for Malware Distribution via SEO Attacks

Authors

  • Shankar Prasad Mitra
  • Partha Shankar Nayak
  • Debmalya Mukherjee
  • Shuvrajit Nath
  • Ranjan Banerjee

DOI:

https://doi.org/10.52783/jns.v14.3181

Keywords:

Poisoning, Search Engine Optimization (SEO), Digital Marketing, Malwares, Websites, Or ganic Search, Unpaid Search, Se arch Engine Redirection, Detection

Abstract

To promote websites among search results Search engine optimization (SEO) techniques are often used and over the past
few years the rising rate of increased spread of malware through the Internet has opened up new dimensions for the attackers
along with the traditional techniques for spreading malware (such as through links or attachments in spam emails). The
attackers are continuously devising advance methods to launch attacks among which a technique that has came into the
limelight is the selection of search engines for distributing malware with high potential to produce devastating results. SEO
attacks poisons the search results for popular queries by spreading malware, although recent, appear to be both widespread
and effective where legitimate Websites are compromised and a large number of fake pages targeting trendy keywords are
generated as a result.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

References

D. Fetterly, M. Manasse, and M. Najork. Spam, damn spam, and statistics: using statistical analysis to locate spam Web pages. In Proceedings of the 7th International Workshop on the Web and Databases, WebDB, 2004.

A. Moshchuk, T. Bragin, S. D. Gribble, and H. M. Levy. A crawler-based study of spyware on the Web. In Pro- ceedings of the Network and Distributed System Security Symposium, NDSS, 2006.

D. Arthur and S. Vassilvitskii. K-means++: the advan- tages of careful seeding. In Proceedings of the 18th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA, 2007.

C. Castillo, D. Donato, A. Gionis, V. Murdock, and F. Sil- vestri. Know your neighbors: Web spam detection using the Web topology. In Proceedings of the 30th Interna- tional ACM Conference on Research and Development inInformation Retrieval, SIGIR, 2007.

M. A. Rajab, L. Ballard, P. Mavrommatis, N. Provos, and X. Zhao. The nocebo effect on the web: an analysis of fakeanti-virus distribution. In Proceedings of the 3rd USENIX LEET, 2010

L. Lu, V. Yegneswaran, P. Porras, and W. Lee. Blade: an attack-agnostic approach for preventing drive-by malwareinfections. In Proceedings of the 17th ACM CCS, 2010

K. Thomas, C. Grier, J. Ma, V. Paxson, and D. Song. Design and evaluation of a real- time url spam filtering service. In InProceedings of the IEEE S&P, 2011.

J. John, F. Yu, Y. Xie, M. Abadi, and A. Krishnamurthy. deSEO: Combating search-result poisoning. In Proceedings of the 20th USENIX Security, 2011.

Google search engine optimization. http://www.google.com/webmasters/.

Kozak The dirty little secrets of search. http://www.nytimes.com/2011/02/13/business/13search.html,February 2011.

https://www.bankinfosecurity.com/how-seo-poisoning-used-to-deploy-malware-a- 16882#:~:text=SEO%20poisoning%20is%20an%20illegitimate,websites%20to%20download%20malicious%20files.

Downloads

Published

2025-04-08

How to Cite

1.
Prasad Mitra S, Shankar Nayak P, Mukherjee D, Nath S, Banerjee R. Search Engine Poisoning: An Evolving Vector for Malware Distribution via SEO Attacks . J Neonatal Surg [Internet]. 2025Apr.8 [cited 2025Sep.12];14(13S):51-6. Available from: https://www.jneonatalsurg.com/index.php/jns/article/view/3181