Hackers Enlist Search Engines for Phishing Attacks

Hackers are increasingly attempting to influence search engines to misdirect users to spurious Web sites. Earlier this month, software security firm Marshal highlighted the phishing-attack problem and the role of search engine optimization (SEO) in a blog post.

Users who are misdirected by the search results typically get hit by a fake security dialog box telling the user to download a fake antimalware program. The misrepresentations that show up in search-engine results include sites mimicking the California Franchise Tax Board and college basketball Web sites, among others, according to Marshal.

Spokespersons for search engine providers Microsoft and Google did not talk directly about what measures their companies take to ensure that search rankings don't divert users to malicious Web sites. Possibly, neither wants to give hackers information or divulge trade secrets.

One of the measures that Microsoft took with its Internet Explorer 8 browser is the addition of a SmartScreen filter that displays popup warnings when users click on links suspected to lead to malicious Web sites, according to a Microsoft spokeswoman. The filter is "URL-reputation-based" and runs a diagnostic scan of the servers hosting downloads to determine if those servers have a track record of parsing out malicious content. Presumably, users will take a common-sense approach and not go to such sites.

Google, for its part, has guidelines on what Webmasters should and shouldn't be doing, explained Google spokesman Nate Tyler, in an e-mail. Google expels Web pages from its search results when Webmasters use programmatic queries to improve search rankings. It also forbids the use of link schemes with hidden coding or the creation of doorway pages used specifically to increase clicks and move up in search rankings. Again, the implication here is that with golden rules in place, users should act at their own discretion.

Hackers also add bad links to other Web sites, particularly in the comments sections. When that's done to blogs, the practice is known as blog spamming. The links typically connect with automated tools that can help hackers gain entry into a computer.

Still, there's no way to prevent people from visiting malicious Web sites and no firewall rule for foolish behavior.

"Unfortunately, there is no Holy Grail product to solve this issue," said Paul Henry, security and forensic analyst at Scottsdale, Ariz.-based Lumension. "Links to increase the SEO for a given Web page -- and, just as concerning, links added that direct users to malware-laden pages -- are increasing at an alarming rate. The most effective mitigation would of course be to make sure that your browser and any related add-ons are fully patched and up to date and does what it is supposed to do."

About the Author

Jabulani Leffall is a business consultant and an award-winning journalist whose work has appeared in the Financial Times of London, Investor's Business Daily, The Economist and CFO Magazine, among others. He consulted for Deloitte & Touche LLP and was a business and world affairs commentator on ABC and CNN.

Featured

  • AI logo near computer equipment

    White House Releases National Policy Framework for AI

    The White House has released a four-page AI policy framework aimed at setting a national approach to AI, with priorities including child safety, intellectual property protections, truth and accuracy guardrails, and worker training for an AI-driven economy.

  • abstract automation workflow

    Druva Adds Agentic Workflows, Deep Analysis Agents to DruAI Platform

    Druva has announced an expansion of its DruAI platform, introducing Deep Analysis Agents and new agentic workflow capabilities aimed at automating complex forensic, compliance, and operational investigations.

  • Abstract digital cloudscape of glowing interconnected clouds and radiant lines

    Cloud Complexity Outpacing Human Defenses, Report Warns

    According to the 2026 Cloud Security Report from Fortinet, while cloud security budgets are rising, 66% of organizations lack confidence in real-time threat detection across increasingly complex multi-cloud environments, with identity risks, tool sprawl, and fragmented visibility creating persistent operational gaps despite significant investment increases.

  • Educational path and career development growth with neon icons for study, idea, graduation, and success

    How to Embrace Lifelong Learning as a Non-negotiable for Career Growth

    In a world shaped by rapid technological change and shifting economic forces, staying curious and committed to learning is the most powerful way to stay prepared.