TechNewsPro_Masthead_2.jpg

The latest in NEWS, RESOURCES and JOBS

Lower the TCO of your legacy data wareho
Talend_Banner_728x90px_v1.jpg
  • Sahriar Shuvo - Tech Journalist

100,000 Google business sites tacked for backdoor Remote Access Trojans

Sitewide RAT (Remote Access Trojans) is neither new nor uncommon. But when it comes to Google, it is a whole different story. An early briefing in The Register said that 100,000 business sites were being compromised, which caused security vulnerability to users. The incident went around google hosted business sites. As people browsed through them, they got infected. Backdoor malicious script popularly known as Remote Access Trojans (RAT) took access to their device. It did seem harmless at first. Downloading PDF or MS Word document is as common as it sounds. But in terms of RAT, they can take control of the victim's computer, containing sensitive business data or personal information.



Backdoor RAT's are pretty simple to execute from the attacker's side, and it is easy to get infected. A business owner or someone who handles sensitive company information may be prone to losing every security document depending on the attack brutality. According to Sneaky redirects by Google search central, it is the trick to send a visitor to a URL different than the requested one. And that URL will contain a payload to trick the user into downloading simple executable like PDFs. It is a form of social engineering.


A simple procedure to stay safe while creating business and attain traffic to your business site is to provide legit information on your selling products. Not just copy & paste information that will de-rank your site down the road. According to google webmaster, if you only have affiliate links on your business page that provides affiliate links of multiple products and copy-pasted specification, they go against the terms. This, as a result, ranks against sites that can be controlled by people with less effort and potentially waiting for a chance to inject a keylogger or RAT.



Printable receipts, eBooks, zipped files are also prone to have attached scripts than any other file formats as they are the most used ones. Google hosts many business platforms, and to get on their goodwill of search terms; it is important to provide important data that helps customers. If the website is not selling any physical product and just there for the information, then even the info should have sufficient value. They should not just scrape information from anywhere else. In an article covered by The Register, we've seen just that.


The attack is pretty straight forward. On a host machine where the executable file is made, an attacker attaches code of whichever script they want to run on a victim machine. Initially, they are done on local network hosts. Which means information can be shared in real-time. They can also take screenshots of the victim computer, downloading files from the victim pc and even logging password dumps.



On the final note, to protect business and websites from being tagged as malicious redirects, it is recommended to hinder practices of auto redirects. Spamming affiliate links is not recommended as googles crawler can detect them easily. These are not just hardcoded software anymore. They are AI-run powerful programs that track how a site performs and user behaviour regarding it. Cloaking, hidden links, and similarly we mentioned before, "scrapping" should be highly prohibited.


According to eSentire, a cybersecurity solution provider, the flood of injecting 100,000 malicious pages shook the infrastructure of how a business platform should function. These programs come in business forms. But as an outcome, they delivered malware. Remote Access Trojans (RAT) are not a newcomer in the cybersecurity field. They are here for a long time but evolved gradually. They used to be pretty straight forward and could cause permanent harm, but now they can do much more damage as technology advanced. The tracked pages are hard to find one by one, but chances are, someone browsing without filters will fall trap to it, without even guessing what's wrong.


Our logged keywords associated with the attack contain ransomware, malware, and anything related to social engineering with network redirects. So the next time while downloading a web template or documented PDF and even receipt from a website, you should be extra careful. Of course, Google does a tremendous job to stop these attacks right in its footstep. But chances are, if the user is not alert enough and clicks on a malicious link, you'll fall victim—the same routing for sending a file. Our mentioned attack installed SolarMarker RAT to the target systems with tools like Yellow Cockatoo, Jupyter etc.

Element_300x600_June_2.jpg

LATEST RESOURCES

 

 

Parting the clouds. 

for greater security

Covid-19 has landed CSOs a unique opportunity to embrace web isolation.

Eliminate malware threats with zero trust 

Isolation-powered security provides full protection against email and Web based threats.

7 Customer Service Mistakes Companies Should Avoid Making

2020 was a tumultuous year but it did bring customer service back to the forefront of the business planning agenda for 2021. As you plan and prioritise your initiatives, it is important to avoid mistakes.

Integrating Compliance into Innovation: Taking Control Over Customer Communications

Compliance is one of those areas that is better off unnoticed. When compliance does get attention, it is usually because something has gone wrong and that is something that keeps executives up at night. It is easy to see why. 

Artificial Intelligence Based COVID Signature

Detection Software

The software takes the X-Rays and CT scans in digital format and analyses the X-Ray reports through uploading the images which is followed by detailed report about the patient suffering from COVID19 or similar ailments.

Six Steps to Drive Your

Process Center of Excellence to Success

Find out why yo need a center of excellence - and how save you time and money while improving experiences for both your customers and employees. 

Steps to Deliver Data You Can trust at the Speed of Business

Why trusted data is the key to digital transformation. Discover and cleanse your data. 

Organise data you can trust and empower people

Automate your data pipelines and enable data access.

2021 Threat Report 

Four Key Trends in the Cyber-Threat Landscape.

The security implications of remote working, SaaS takeover, rise of fearware, server side attacks, ransomware and Darktrace immune system.

Safe, inclusive communications for the University of Innsbruck

The open matrix is the foundation for secure, collaborative academic research and learning. Keen to support its learning culture, the university wanted to introduce a real time messaging system. 

Darktrace_Logo_Main.png
Element_Logo.jpg
eGain_logo.jpg
talend_Logo.png
MenloSecurity_Signature_Purple_RGB.jpg
MenloSecurity_Signature_Purple_RGB.jpg
nintex_logo.png
GMC_Software_Logo.jpg

    SUBSCRIBE

to our latest RESOURCES

to keep up to date with the

latest whitepapers

WP_GMC_Cover.jpg
WP_bold360_Cover.jpg