Difference between revisions of "Gumblar Google-poisoning attack morphs"

From Botnets.fr
Jump to navigation Jump to search
m (1 revision imported)
m (Text replacement - "/ www." to "/ |Site=www.")
 
Line 1: Line 1:
{{Publication
{{Publication
|Link=http://www.theregister.co.uk/2009/05/19/gumblar_google_poisoning_update/ www.theregister.co.uk
|Link=http://www.theregister.co.uk/2009/05/19/gumblar_google_poisoning_update/
|Site=www.theregister.co.uk
|Author=John Leyden
|Author=John Leyden
|NomRevue=The Register
|NomRevue=The Register

Latest revision as of 12:48, 31 July 2015

(Publication) Google search: [1]

Gumblar Google-poisoning attack morphs
Botnet Gumblar
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2009 / 2009-05-19
Editor/Conference The Register
Link http://www.theregister.co.uk/2009/05/19/gumblar google poisoning update/ (Archive copy)
Author John Leyden
Type

Abstract

A Web attack that poisons Google search results is getting worse, according to security researchers.

The attack first relies on compromising normally legitimate website and planting malicious scripts. US CERT reports that stolen FTP credentials are reckoned to be the main technique in play during this stage of the attack but poor configuration settings and vulnerable web applications might also play a part.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2009BFR1219,
   editor = {The Register},
   author = {John Leyden},
   title = {Gumblar Google-poisoning attack morphs},
   date = {19},
   month = May,
   year = {2009},
   howpublished = {\url{http://www.theregister.co.uk/2009/05/19/gumblar_google_poisoning_update/}},
 }