","' returned xxx results ","Injection inside tag attributes - double quote not filtered or escaped","
","\">","
","Injection inside URL attributes - non-http(s) URL","...","In JavaScript context - single quote not filtered or escaped","","Update:","\nThe reason behind the \"We're sorry...\" message\n","\nJuly 9, 2007\n","Posted by Niels Provos, Anti-Malware Team","CAPTCHA","sorry","Search Worms [PDF]","first post","\nPhishers and Malware authors beware!\n","\nJune 18, 2007\n","Posted by Brian Rakowski and Garrett Casto, Anti-Phishing and Anti-Malware Teams","The API is still experimental, but we hope it will be useful to ISPs, web-hosting companies, and anyone building a site or an application that publishes or transmits user-generated links. Sign up for a key and let us know how we can make the API better. We fully expect to iterate on the design and improve the data behind the API, and we'll be paying close attention to your feedback as we do that. We look forward to hearing your thoughts.
","\nThwarting a large-scale phishing attack\n","\nJune 11, 2007\n","Posted by Colin Whittaker, Anti-Phishing Team","
In addition to targeting malware, we're interested in combating phishing, a social engineering attack where criminals attempt to lure unsuspecting web surfers into logging into a fake website that looks like a real website, such as eBay, E-gold or an online bank. Following a successful attack, phishers can steal money out of the victims' accounts or take their identities. To protect our users against phishing, we publish a blacklist of known phishing sites. This blacklist is the basis for the anti-phishing features in the latest versions of Firefox and Google Desktop. Although blacklists are necessarily a step behind as phishers move their phishing pages around, blacklists have proved to be reasonably effective.","Not all phishing attacks target sites with obvious financial value. Beginning in mid-March, we detected a five-fold increase in overall phishing page views. It turned out that the phishing pages generating 95% of the new phishing traffic targeted MySpace, the popular social networking site. While a MySpace account does not have any intrinsic monetary value, phishers had come up with ways to monetize this attack. We observed hijacked accounts being used to spread bulletin board spam for some advertising revenue. According to this interview with a phisher, phishers also logged in to the email accounts of the profile owners to harvest financial account information. In any case, phishing MySpace became profitable enough (more than phishing more traditional targets) that many of the active phishers began targeting it.","Interestingly, the attack vector for this new attack appeared to be MySpace itself, rather than the usual email spam. To observe the phishers' actions, we fed them the login information for a dummy MySpace account. We saw that when phishers compromised a MySpace account, they added links to their phishing page on the stolen profile, which would in turn result in additional users getting compromised. Using a quirk of the CSS supported in MySpace profiles, the phishers injected these links invisibly as see-through images covering compromised profiles. Clicking anywhere on an infected profile, including on links that appeared normal, redirected the user to a phishing page. Here's a sample of some CSS code injected into the \"About Me\" section of an affected profile:","absolute;top:1px;left:1px;\" href=\"http://myspacev.net\">style=\"border-width:0px;width:1200px; height:650px;\"
src=\"http://x.myspace.com/images/clear.gif\">
"," \"","Why won't it let any of my friends look at my pictures?","\" regarding our warnings on these phishing pages, suggesting that even an explicit warning was not enough to protect many users. The effectiveness of the attack and the increasing sophistication of the phishing pages, some of which were hosted ","Things you can do to help end phishing and Internet fraud","Learn to recognize and avoid phishing. The Anti-Phishing Working Group has a good list of recommendations.
","Update your software regularly and run an anti-virus program. If a cyber-criminal gains control of your computer through a virus or a software security flaw, he doesn't need to resort to phishing to steal your information.","Use different passwords on different sites and change them periodically. Phishers routinely try to log in to high-value targets, like online banking sites, with the passwords they steal for lower-value sites, like webmail and social networking services.","\nWeb Server Software and Malware\n","\nJune 5, 2007\n","Web server software across the Internet.","Web server software distribution across the Internet.","Web server software across servers distributing malware.","Web server software distribution across malicious servers.","Distribution of web server software by country.","Web server distribution by country","Malicious web server distribution by country","
The figure on the left shows the distribution of all Apache, IIS, and nginx webservers by country. Apache has the largest share, even though there is noticeable variation between countries. The figure on the right shows the distribution, by country, of webserver software of servers either distributing malware or hosting browser exploits. It is very interesting to see that in China and South Korea, a malicious server is much more likely to be running IIS than Apache.

We suspect that the causes for IIS featuring more prominently in these countries could be due to a combination of factors: first, automatic updates have not been enabled due to software piracy (piracy statistics from NationMaster, and BSA), and second, some security patches are not available for pirated copies of Microsoft operating systems. For instance the patch for a commonly seen ADODB.Stream exploit is not available to pirated copies of Windows operating systems.

Overall, we see a mix of results. In Germany, for instance, Apache is more likely to be serving malware than Microsoft IIS, compared to the overall distributions of these servers. In Asia, we see the reverse, which is part of the cause of Microsoft IIS having a disproportionately high representation at 49% of malware servers. In summary, our analysis demonstrates how important it is to keep web servers patched to the latest patch level.
","\nOn virtualisation\n","\nMay 29, 2007\n","Posted by Tavis Ormandy, Security Team","CanSecWest","bitblt routines"," Reduce the attack surface"," Treat virtual machines as services that can be compromised"," Keep software up to date","\nIntroducing Google's online security efforts\n","\nMay 21, 2007\n","Posted by Panayiotis Mavrommatis and Niels Provos, Anti-Malware Team","Online security is an important topic for Google, our users, and anyone who uses the Internet. The related issues are complex and dynamic and we've been looking for a way to foster discussion on the topic and keep users informed. Thus, we've started this blog where we hope to ","periodically provide updates on recent trends, interesting findings, and efforts related to online security. Among the issues we'll tackle is ","malware, which is the subject of our inaugural post.","Malware","plugins","malware","Google's","search results","Google Desktop Search","0.1%","billions","Location of compromised web sites.","Location of malware distribution servers.","These are servers that are used by "," authors to distribute their payload. Very often the compromised sites are modified to include content from these servers. The color coding works as follows: Green means that we did not find anything ","unsual"," in that country, yellow means low activity, orange medium activity and red high activity.","
Guidelines on safe browsing

First and foremost, enable automatic updates for your operating system as well your browsers, browser plugins and other applications you are using. Automatic updates ensure that your computer receives the latest security patches as they are published. We also recommend that you run an anti-virus engine that checks network traffic and files on your computer for known malware and abnormal behavior. If you want to be really sure that your system does not become permanently compromised, you might even want to run your browser in a virtual machine, which you can revert to a clean snapshot after every browsing session.

Webmasters can learn more about cleaning, and most importantly, keeping their sites secure at StopBadware.org's Tips for Cleaning and Securing a Website.
","\n\n\n \n \n\n\n\n\n \n \n\n\n\n \n \n","\nLabels\n","\n \n ","\n#sharethemicincyber\n","\n#supplychain #security #opensource\n","\nandroid\n","\nandroid security\n","\nandroid tr\n","\napp security\n","\nbig data\n","\nbiometrics\n","\nblackhat\n","\nC++\n","\nchrome\n","\nchrome enterprise\n","\nchrome security\n","\nconnected devices\n","\nCTF\n","\ndiversity\n","\nencryption\n","\nfederated learning\n","\nfuzzing\n","\nGboard\n","\ngoogle play\n","\ngoogle play protect\n","\nhacking\n","\ninteroperability\n","\niot security\n","\nkubernetes\n","\nlinux kernel\n","\nmemory safety\n","\nOpen Source\n","\npha family highlights\n","\npixel\n","\nprivacy\n","\nprivate compute core\n","\nRowhammer\n","\nrust\n","\nSecurity\n","\nsecurity rewards program\n","\nsigstore\n","\nspyware\n","\nsupply chain\n","\ntargeted spyware\n","\ntensor\n","\nTitan M2\n","\nVDP\n","\nvulnerabilities\n","\nworkshop\n","\n \n ","\nArchive\n","\n\n\n \n \n\n\n\n\n \n \n  \n \n\n\n\n2024\n\n","\nJul\n","\nJun\n","\nMay\n","\nApr\n","\nMar\n","\nFeb\n","\nJan\n","\n\n\n \n \n\n\n\n\n \n \n  \n \n\n\n\n2023\n\n","\nDec\n","\nNov\n","\nOct\n","\nSep\n","\nAug\n","\n\n\n \n \n\n\n\n\n \n \n  \n \n\n\n\n2022\n\n","\n\n\n \n \n\n\n\n\n \n \n  \n \n\n\n\n2021\n\n","\n\n\n \n \n\n\n\n\n \n \n  \n \n\n\n\n2020\n\n","\n\n\n \n \n\n\n\n\n \n \n  \n \n\n\n\n2019\n\n","\n\n\n \n \n\n\n\n\n \n \n  \n \n\n\n\n2018\n\n","\n\n\n \n \n\n\n\n\n \n \n  \n \n\n\n\n2017\n\n","\n\n\n \n \n\n\n\n\n \n \n  \n \n\n\n\n2016\n\n","\n\n\n \n \n\n\n\n\n \n \n  \n \n\n\n\n2015\n\n","\n\n\n \n \n\n\n\n\n \n \n  \n \n\n\n\n2014\n\n","\n\n\n \n \n\n\n\n\n \n \n  \n \n\n\n\n2013\n\n","\n\n\n \n \n\n\n\n\n \n \n  \n \n\n\n\n2012\n\n","\n\n\n \n \n\n\n\n\n \n \n  \n \n\n\n\n2011\n\n","\n\n\n \n \n\n\n\n\n \n \n  \n \n\n\n\n2010\n\n","\n\n\n \n \n\n\n\n\n \n \n  \n \n\n\n\n2009\n\n","\n\n\n \n \n\n\n\n\n \n \n  \n \n\n\n\n2008\n\n","\n\n\n \n \n\n\n\n\n \n \n  \n \n\n\n\n2007\n\n","Feed","Follow @google","Follow","\nGive us feedback in our Product Forums.\n","\n Google\n ","\n Privacy\n ","\n Terms\n "]}