Difference between revisions of "Gumblar Google-poisoning attack morphs"
Jump to navigation
Jump to search
m (1 revision imported) |
|
(No difference)
|
Revision as of 16:28, 7 February 2015
(Publication) Google search: [1]
Gumblar Google-poisoning attack morphs | |
---|---|
Botnet | Gumblar |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2009 / 2009-05-19 |
Editor/Conference | The Register |
Link | http://www.theregister.co.uk/2009/05/19/gumblar google poisoning update/ www.theregister.co.uk (www.theregister.co.uk Archive copy) |
Author | John Leyden |
Type |
Abstract
“ A Web attack that poisons Google search results is getting worse, according to security researchers.
The attack first relies on compromising normally legitimate website and planting malicious scripts. US CERT reports that stolen FTP credentials are reckoned to be the main technique in play during this stage of the attack but poor configuration settings and vulnerable web applications might also play a part.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2009BFR1219, editor = {The Register}, author = {John Leyden}, title = {Gumblar Google-poisoning attack morphs}, date = {19}, month = May, year = {2009}, howpublished = {\url{http://www.theregister.co.uk/2009/05/19/gumblar_google_poisoning_update/ www.theregister.co.uk}}, }