Mass Compromise of IIS Shared Web Hosting for Blackhat SEO: A Case Study

نویسندگان

  • Jake Drew
  • Tyler Moore
چکیده

This case study studies in great detail a recent breach of a shared webserver running Microsoft IIS. We describe how to detect the intrusion on a particular GoDaddy-hosted webserver controlled by the authors. We review a recent mass compromise of IIS shared hosting to provide context for the case study. We describe how the attackers have used the compromise as part of a larger blackhat search engine optimization (SEO) campaign. We then locate the hacker’s backdoor into the server and proceed to deobfuscate the malicious script. Once deobfuscated, we explain how the attack operates and link the attack to websites promoting counterfeit goods. We developed a program called the ‘Link Spider’ to recursively crawl all malicious URLs and scripts placed on our server collecting any associated websites which are connected. We examine the links gathered by the ‘Link Spider’ to determine the top name brands being solicited by the hackers. Next, we research the hacker’s counterfeit good storefronts and describe how the counterfeit goods supply chain operates at various stages. We next examine China’s role in the counterfeit goods websites reviewed, and the role of various web hosting companies which act as safe-havens for these illegal storefronts. We show that some of these companies and web hosts participate in the sale of online pharmaceuticals as well. We also estimate the amount of illegal web traffic which may be supported by these hosts. Finally, we inspect a random sample of GoDaddy-hosted IIS webservers to estimate the prevalence of this particular backdoor.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Ever-Changing Labyrinth: A Large-Scale Analysis of Wildcard DNS Powered Blackhat SEO

Blackhat Search Engine Optimization (SEO) has been widely used to promote spam or malicious web sites. Traditional blackhat SEO campaigns often target hot keywords and establish link networks by spamming popular forums or compromising vulnerable sites. However, such SEO campaigns are actively disrupted by search engines providers, making the operational cost much higher in recent years. In this...

متن کامل

Characterizing Long-tail SEO Spam on Cloud Web Hosting Services

The popularity of long-tail search engine optimization (SEO) brings with new security challenges: incidents of long-tail keyword poisoning to lower competition and increase revenue have been reported. The emergence of cloud web hosting services provides a new and effective platform for longtail SEO spam attacks. There is growing evidence that largescale long-tail SEO campaigns are being carried...

متن کامل

Performance Analysis of Scalable Web Hosting Service with Flex: Two Case Studies

web hosting service, web server cluster, load balancing, scalability, super linear speedup, performance analysis FLEX is a new cost effective, "locality aware" load balancing solution for a shared web hosting service implemented on a cluster of machines [C99]. FLEX allocates hosted web sites to different machines in the cluster based on the sites' processing and memory requirements which are es...

متن کامل

Performance Analysis of \ Content - Aware " Load BalancingStrategy FLEX : Two Case

FLEX is a new cost eeective, \locality aware" load balancing solution for a shared web hosting service implemented on a cluster of machines 3]. FLEX allocates hosted web sites to diierent machines in the cluster based on the sites' processing and memory requirements which are estimated using the site logs. Appropriate routing of requests can be achieved by using the DNS infrastructure, since ea...

متن کامل

Fighting Parasite Hosting: Identifying and Mitigating Unauthorized Ads on Your Webserver

Parasite hosting is an emerging search poisoning attack that compromisesWeb servers and inserts links that redirects users to scam Web pages that sell products or attempt to victimize users. One of the most significant challenges for Web site operators is that compromised sites are extremely difficult to detect: Attackers adapt techniques such as code obfuscation and cloaking that make it diffi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015