Hackers Use Fake Google reCAPTCHA to Cloak Banking Malware

The most effective phishing and malware campaigns usually employ one of the following two age-old social engineering techniques:
Impersonation
These online phishing campaigns impersonate a popular brand or product through specially crafted emails, SMS… Continue reading Hackers Use Fake Google reCAPTCHA to Cloak Banking Malware

Unsuccessfully Defaced Websites

Defaced websites are a type of hack that is easy to notice and a pain for website owners. Recently, we came across some defacement pages with a peculiar JavaScript injection included in the source code.
What is a Defacement?
Website defacement is a ha… Continue reading Unsuccessfully Defaced Websites

An Old Trick with a New Twist: Cryptomining Through Disguised URL Shorteners

As we have previously discussed on this blog, surreptitious cryptomining continues to be a problem as new methods emerge to both evade and hasten the ease of mining at the expense of system administrators, website owners, and their visitors.
Another W… Continue reading An Old Trick with a New Twist: Cryptomining Through Disguised URL Shorteners

Analyzing and Cleaning Hijacked Google SEO Spam Results

Blackhat SEO spam comes in many forms, and one of the most nefarious is hijacked search results. This happens when search engines crawl and display unwanted content in the title and description of infected web pages. The negative impact to the infected website cannot be understated. This harms the website’s reputation with visitors and will…

The post Analyzing and Cleaning Hijacked Google SEO Spam Results appeared first on Sucuri Blog.

Continue reading Analyzing and Cleaning Hijacked Google SEO Spam Results

Posted in SBN