Google To Send Detailed Info About Hacked Web Sites 58
alphadogg writes "In an effort to promote the 'general health of the Web,' Google will send Webmasters snippets of malicious code in the hopes of getting infected Web sites cleaned up faster. The new information will appear as part of Google's Webmaster Tools, a suite of tools that provide data about a Web site, such as site visits. 'We understand the frustration of Webmasters whose sites have been compromised without their knowledge and who discover that their site has been flagged,' wrote Lucas Ballard on Google's online security blog. To Webmasters who are registered with Google, the company will send them an email notifying them of suspicious content along with a list of the affected pages. They'll also be able to see part of the malicious code." Another of the new Webmaster Tools is Fetch as Googlebot, which shows you a page as Google's crawler sees it. This should allow Webmasters to see malicious code that bad guys have hidden on their sites via "cloaking," among other benefits.
Gentlemen, check your Webmaster tools (Score:4, Interesting)
This is a great service. Google should set up an opt-in email notification as well.
It helps the webmasters build better sites and teaches them to check the Google website tools that allow them to groom their site for best indexing on Google. That's great.
Re: (Score:2, Informative)
Re:Gentlemen, check your Webmaster tools (Score:4, Informative)
Did you mean http://googlewebmastercentral.blogspot.com/2009/10/fetch-as-googlebot-and-malware-details.html [blogspot.com] ? Your link got garbled by some evil force...
Re: (Score:2)
They do. It's the thing you said.
Re: (Score:2)
This is a great service. Google should set up an opt-in email notification as well.
It helps the webmasters build better sites and teaches them to check the Google website tools that allow them to groom their site for best indexing on Google. That's great.
Webmaster Tools has opt-in email notification. Here are details: http://googlewebmastercentral.blogspot.com/2009/06/to-make-webmaster-tools-message-center.html [blogspot.com]
The "Malware details" feature (mentioned in the article), however, doesn't send you any notifications just yet.
Google needs to clean up their own act first, (Score:5, Informative)
Google has a malware hosting problem of their own.
Google Spreadsheets can be abused to create phony login pages. Here's one for "Free Habbo credits" [google.com], designed to collect Habbo logins. It's been reported via the usual "Google abuse" mechanism, repeatedly, and it's still up. It's been up since October 28, 2008.
We track major domains being exploited by active phishing scams. [sitetruth.com] ("Major" here means only that it's in Open Directory, with about 1.5 million domains.) There are 39 exploited domains today. Only 7 have been on that list since 2008. The most abused site is Piczo.com, which is a hosting service/social network/shopping site for teenagers.
Just about everybody else has cleaned up their act. 18 months ago, that list had 174 entries, including Yahoo, eBay, Microsoft Live, and TinyURL. All those companies have become more aggressive about checking for phishing scams that were injected into their domain. Google's cluelessness in this area ought to be embarrassing to someone.
Re: (Score:2)
Where is this $$$-hill and does it have trees? I'd prefer a €€€-hill though.
Re: (Score:2)
Heck. Money-hills of any sort are appreciated.
Re:Google needs to clean up their own act first, (Score:4, Insightful)
An ordinary scam (like the Habbo one listed above) is different from a phishing attack (which requires that the attacker impersonates another entity).
You have absolutely no hard evidence (other than your own experience and cynicism) that the site collecting Habbo logins isn't doing so for purely honest reasons and will only use them to deposit 500 credits in each account submitted.
This comes down to a matter of trust. If you trust random people on the Internet, you're going to get screwed over.
Re: (Score:2)
An ordinary scam (like the Habbo one listed above) is different from a phishing attack (which requires that the attacker impersonates another entity).
PhishTank calls it a phishing scam. [phishtank.com] We follow their data.
Re: (Score:2)
PhishTank is a crowd sourcing site which merely samples the opinions of their users which makes it accountable to... no-one?
Netcraft does not consider it a phish (although you have to use their toolbar to check that.)
Incidentally, the spreadsheet is suddenly gone so I suspect someone at Google is reading Slashdot.
Re: (Score:3, Interesting)
Re: (Score:2)
Google cleans up their act. (Score:2)
Google finally fixed this. The offending page now reads "We're sorry. You can't access this spreadsheet because it is in violation of our Terms of service. If you feel this is in error, please contact us."
Sometimes you just have to use a big clue stick to get their attention. It took some help from The Register to get Yahoo, Microsoft, and eBay to clean up their acts.
Five more long-term exploited sites remain. A bit more nagging, and we'll have this cleaned up.
Once this is cleaned up, phishing blac
Good idea, but... (Score:4, Interesting)
Re: (Score:2)
I'm pretty sure Google checks to see what's reachable through links on the site. Just look at the dead link checker in the Webmaster Tools ;)
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
Also, I think allot of infected pages are a result of SQL injection or simply dropping some cross-site scripting code into form fiel
Re: (Score:1, Redundant)
Oh please.
Doctors do things for the common good as well. That doesn't mean they don't have bills to pay.
Re: (Score:3, Informative)
Poor Google IT webmasters! (Score:2, Funny)
Default Apache e-mail is webmaster@localhost
Re: (Score:2)
Default Apache e-mail is webmaster@localhost
Google would probably first try sending mail to the Google account that confirmed its control of the site.
If not, Google would just assume "localhost" is an error for whatever domain the site actually uses. For example, given webmaster@localhost at www.example.com, Google might look up the MX for www.example.com, not see it, look up the MX for example.com, and send mail.
If the site doesn't list such an address at all, there's an RFC that strongly recommends webmaster@example.com as the WWW technical co
Helping the hackers? (Score:2)
If you wanted to test out malicious code to see whether it was likely to be discovered, wouldn't this be a great tool to have?
Re:Who requests (Score:4, Informative)
It's an opt-in notification system - nobody's forcing you to do anything. Also, robots.txt has been around since long before google.
Re: (Score:2)
The notifications are opt-in. That's what I meant.
And it's not like it's hard to set up. You should be thankful robots.txt is obeyed by most robots.
Re: (Score:3, Interesting)
Company? what the...
You obviously have no idea about the early days of the internet and HTTP. The whole point of HTTP was to publish documents, if you host something you are implicitly allowing other people to fetch a copy of it.
robots.txt came about in the very early days of HTTP. An enterprising hacker wrote a crawler to index the whole internet (which wasn't that big at the time). But his crawler got stuck fetching pages from one machine with dynamically generated pages. This obviously tied up the band
Re: (Score:1)
Hi Mr. Murdoch!
Re: (Score:1)
Google is not playing police, they merely tell searchers it's a bad idea to go there. If you don't want others to link to you, don't go on the intarwebs. Also getting indexed by google is only possible if you sign up.
Yes it's terrible, you have to type in "User-agent: *\n Disallow / " I can feel you pain.
Re: (Score:1)
If you are that paranoid, cut your network cable. It will ensure that those pesky googlebots stay away from your precious data.
If you put your data on public website, others are free to read that data.
Re: (Score:2)
If it's on the internet, it's public. Don't put anything private on the internet. Don't expect anything private put on the internet to remain private.
Information wants to be free. If you don't want your information to be free, keep it to your god damn self!
Happened over here (Score:3, Interesting)
Re: (Score:2, Interesting)
From the awesome-for-pr0n dept. (Score:2)
Another of the new Webmaster Tools is Fetch as Googlebot, which shows you a page as Google's crawler sees it.
Heh, could find some use outside of the designed purpose then... A number of pay-to-view web forums allow the Googlebot to freely navigate it, but requires payment from users. Among other boards, those involving erotica. :p
Re: (Score:1)
Academic cloaking (Score:3, Informative)
A number of pay-to-view web forums allow the Googlebot to freely navigate it, but requires payment from users. Among other boards, those involving erotica.
This sort of cloaking is frustrating even for people who aren't porn fans. A lot of scholarly journals spam search engine result pages with their cloaked, noarchived pages <cough>elsevier and springerlink</cough>. Even more frustrating is that Google provides no way for users 1. to exclude noarchived pages from its results or 2. to report sites that violate Google's stated cloaking policy.
Re: (Score:3, Interesting)
WOW sites (Score:2)
So many wow accounts are hacked from keyloggers that are installed just by visiting wow sites. Gold vendors, wow auction houses, and simple forums can cause you to lose your wow accounts...
What would be nice if google could make these sites it detects with googlebot available so developers could patch the holes in firefox.
tit for tat (Score:2)
I've tried this before, and failed (Score:2)
My site was once getting hit really hard from some other web site with a hole on their feedback page. I tried to email their webmaster but my message got flagged as spam. I guess including IP addresses, multiple links, phrases like "spam", "execute script", "spambot", and "exploit" aren't looked kindly upon by the internet powers that be. I just blocked any connections coming from their IP, but I wish I could have gotten through to shut down the security exploit.
"Google" to send this info or Google pretenders? (Score:1)
Phishing types are already preparing false communications and false sites with such warnings "from google". There are certainly many mechanisms in existence to help authenticate that a communication is actually from google. Hopefully the use of such mechanisms is clever enough to avoid more contamination.
Re: (Score:2)
All the diagnosis information and messages are presented through the Google Webmaster Tools UI, not through email. There is an option in Webmaster Tools to forward messages [blogspot.com] to email, but this is opt-in.
You have a point though...there are lots of "from google" false emails floating around. As you know it's a tough problem to solve :/