Web Hosting Articles

  Home arrow Web Hosting Articles arrow Page 4 - Methodologies of the RBN
Web Hosting Articles  
Web Hosting FAQs  
Web Hosting How-Tos  
Web Hosting News  
Web Hosting Reviews  
Web Hosting Security  
Weekly Newsletter 
Developer Updates  
Free Website Content 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Contact Us 
Site Map 
Privacy Policy 
  >>> SIGN UP!  
  Lost Password? 

Methodologies of the RBN
By: James Payne
  • Search For More Articles!
  • Disclaimer
  • Author Terms
  • Rating: 5 stars5 stars5 stars5 stars5 stars / 2

    Table of Contents:
  • Methodologies of the RBN
  • Fake Spyware/Anti-Malware Continued
  • IframeCash
  • Search Exploit

  • Rate this Article: Poor Best 
      Del.ici.ous Digg
      Blink Simpy
      Google Spurl
      Y! MyWeb Furl
    Email Me Similar Content When Posted
    Add Developer Shed Article Feed To Your Site
    Email Article To Friend
    Print Version Of Article
    PDF Version Of Article




    Methodologies of the RBN - Search Exploit

    (Page 4 of 4 )

    Another method used by the RBN is to create fake websites, then use botnets to post in blogs and forums in order to link back to those fake sites for two purposes: to install a piece of malware known as Scam.Iwin, which turns the user's computer into a zombie and uses it to generate pay-per-click revenue for the attacker. It can also install other malware.

    By linking back to the fake sites, the botnets also drive up the search ranking of sites, often giving them a top three page ranking on search engines like Google, Yahoo, and MSN. The group has reportedly done this for hundreds of keywords, such as "infinity" and "hospice."

    Back in November, Google reportedly cleansed some 40,000 of the malware hosting sites, though they have yet to deny or confirm this. Google did, however, recently come out with a report that stated more than 3 million sites contained malicious code that was intended to install software on a user's computer. That equates to roughly 1 in 1,000 of the web pages on the Internet.


    Well that's all the time we have for this article. Next week, DevShed writer Michael Lowry takes up an article on the different types of denial of service attacks used by groups such as the RBN, then it's back here for a look at some other RBN tactics.

    Till then...

    DISCLAIMER: The content provided in this article is not warranted or guaranteed by Developer Shed, Inc. The content provided is intended for entertainment and/or educational purposes in order to introduce to the reader key ideas, concepts, and/or product reviews. As such it is incumbent upon the reader to employ real-world tactics for security and implementation of best practices. We are not liable for any negative consequences that may result from implementing any information covered in our articles or tutorials. If this is a hardware review, it is not recommended to open and/or modify your hardware.


    - Top Wordpress Plugins for SEO
    - Top Drupal Evaluation and Rating Modules
    - Free Network Monitoring Programs for Max Per...
    - E-store Hosting: Free Options for Beginners
    - Dropbox: The Ultimate File-Sharing and Synci...
    - Reviewing the Best Free Web Hosting Sites
    - Businesses Turn to Reseller Web Hosting for ...
    - Multiple Data Center Hosting
    - Web Hosting Goes Green
    - Web Hosting Technology Overview
    - Collaborate: An Examination of Tools for Gro...
    - Social Networking Security
    - Domain Names 101
    - Top Software to Help Manage Your Websites
    - The Evolution of Phishing

    Developer Shed Affiliates


    © 2003-2019 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap