Security Blog

The latest news and insights from Google on security and safety on the Internet

Top 10 Malware Sites

3. Juni 2009
Share on Twitter Share on Facebook
Google

17 Kommentare :

hongjun hat gesagt…

Looks like many are from China.
And also, one of them look to have tried to use Google Analytics (phishing).

hongjun

4. Juni 2009 um 12:47
Declare.James hat gesagt…

Gumblar.cn was added to the Google Safe Browsing list on 4/27?
Would this also handle the obfuscated code?

4. Juni 2009 um 13:57
Unknown hat gesagt…

A lot of not-so-net-savvy kids are searching for Friv to play games (http://www.google.com/trends?q=friv) but as Friv.com isn't indexed by Google (it is by Bing, Yahoo...?) they get links to malware. I quickly found these two links - the first on page 1, the second on page 2. Just first "-" in URL to check them. Please look into this Google!


m-ops.optus.nu/cheatscoce/guthef.html

i-bigpak.altervista.org/tyson-da46/ocrezderr.html

4. Juni 2009 um 14:26
Alexis de Tocqueville hat gesagt…
Der Kommentar wurde von einem Blog-Administrator entfernt.
4. Juni 2009 um 14:42
Stephan Chenette hat gesagt…
Dieser Kommentar wurde vom Autor entfernt.
4. Juni 2009 um 17:25
Stephan Chenette hat gesagt…

The Beladen mass compromise which we've been tracking at Websense is the final landing page after legit sites have been infected. The injected code first redirects users to googleanalytlcs.net (on the top 10) and then to a final landing page such as Beladen.

We expect beladen.net to be one of many sites to be used in this attack.

Attackers have already switched from sending users from googleanlytlcs.net to beladen.net to googleanalytlcs.net to shkarkimi.net

http://securitylabs.websense.com/content/Alerts/3412.aspx

4. Juni 2009 um 17:33
heinka hat gesagt…

Thank you for this very interesting information! A pity that the Internet also has the negative side! Many greetings, heinka

5. Juni 2009 um 05:46
GroundHogDog hat gesagt…

If you were to publish a regularly updated service for top X Malware destinations, I would be most happy :)

8. Juni 2009 um 10:16
Bilal hat gesagt…
Der Kommentar wurde von einem Blog-Administrator entfernt.
14. Juni 2009 um 06:40
Unknown hat gesagt…

Why bother blocking just 10 sites? Block them all or maybe the top 100 or so. At least by blocking 100 you are blocking a bigger majority of malware out there than just 10.

17. Juni 2009 um 17:59
Jan hat gesagt…

If you want a long list, just download the free blacklist at http://urlblacklist.com/?sec=download

18. Juni 2009 um 01:57
Unknown hat gesagt…

Unfortunately, you cause software to block an entire root domain when just one subdomain, such as www.*.com has been hacked. This is unacceptable and unecessary because it can lead to loss of millions of dollars for just one server being hacked (which shouldn't happen, but does on occasion). Furthermore, your review process takes too long. It should be instantaneous. You should be more targeted in your reporting of malicious sites, and have an instantaneous review process.

3. Juli 2009 um 18:30
Billco hat gesagt…

@Brian: If having your site flagged as unsafe by Google can lead to you losing "millions of dollars", you're in the wrong business and crying on the wrong shoulder. No site in the world makes millions of dollars a day from search traffic, not even the almighty Google.

One would also argue that if you had that sort of income stream, security would be a bigger responsibility for you, and ideally you'd find out about the breach before Google does. Or are you the type of businessman who cries to the government when the reality of your ineptitude tampers with your bottom line ?

13. Juli 2009 um 14:58
Unknown hat gesagt…

New on the list: http://x9p.ru:8080/ts/in.cgi?pepsi118

My host provider give me a solution, then a link to Slashdot article.

Te article Head Title is: R.I.P FTP.

Crazy as a Life!

What about pepsi in the url.

Crazy

29. Juli 2009 um 20:52
Muslims Get BTFO'd hat gesagt…

How ca anyone do this? Its wrong and a disgrace.

28. Juli 2011 um 22:29
Unknown hat gesagt…

what a nice and the best kinds of the games platforms that’s why the most of the gamer are there to play and also to enjoy it the biggest kinds of the Friv games.

24. Mai 2014 um 07:02
Unknown hat gesagt…

Thank you for share this is such a very nice post i really like it your blog.
Security Audit

17. Juni 2014 um 08:45

Kommentar veröffentlichen

  

Labels


  • #sharethemicincyber
  • #supplychain #security #opensource
  • android
  • android security
  • android tr
  • app security
  • big data
  • biometrics
  • blackhat
  • C++
  • chrome
  • chrome enterprise
  • chrome security
  • connected devices
  • CTF
  • diversity
  • encryption
  • federated learning
  • fuzzing
  • Gboard
  • google play
  • google play protect
  • hacking
  • interoperability
  • iot security
  • kubernetes
  • linux kernel
  • memory safety
  • Open Source
  • pha family highlights
  • pixel
  • privacy
  • private compute core
  • Rowhammer
  • rust
  • Security
  • security rewards program
  • sigstore
  • spyware
  • supply chain
  • targeted spyware
  • tensor
  • Titan M2
  • VDP
  • vulnerabilities
  • workshop


Archive


  •     2025
    • Mai
    • Apr.
    • März
    • Feb.
    • Jan.
  •     2024
    • Dez.
    • Nov.
    • Okt.
    • Sept.
    • Aug.
    • Juli
    • Juni
    • Mai
    • Apr.
    • März
    • Feb.
    • Jan.
  •     2023
    • Dez.
    • Nov.
    • Okt.
    • Sept.
    • Aug.
    • Juli
    • Juni
    • Mai
    • Apr.
    • März
    • Feb.
    • Jan.
  •     2022
    • Dez.
    • Nov.
    • Okt.
    • Sept.
    • Aug.
    • Juli
    • Juni
    • Mai
    • Apr.
    • März
    • Feb.
    • Jan.
  •     2021
    • Dez.
    • Nov.
    • Okt.
    • Sept.
    • Aug.
    • Juli
    • Juni
    • Mai
    • Apr.
    • März
    • Feb.
    • Jan.
  •     2020
    • Dez.
    • Nov.
    • Okt.
    • Sept.
    • Aug.
    • Juli
    • Juni
    • Mai
    • Apr.
    • März
    • Feb.
    • Jan.
  •     2019
    • Dez.
    • Nov.
    • Okt.
    • Sept.
    • Aug.
    • Juli
    • Juni
    • Mai
    • Apr.
    • März
    • Feb.
    • Jan.
  •     2018
    • Dez.
    • Nov.
    • Okt.
    • Sept.
    • Aug.
    • Juli
    • Juni
    • Mai
    • Apr.
    • März
    • Feb.
    • Jan.
  •     2017
    • Dez.
    • Nov.
    • Okt.
    • Sept.
    • Juli
    • Juni
    • Mai
    • Apr.
    • März
    • Feb.
    • Jan.
  •     2016
    • Dez.
    • Nov.
    • Okt.
    • Sept.
    • Aug.
    • Juli
    • Juni
    • Mai
    • Apr.
    • März
    • Feb.
    • Jan.
  •     2015
    • Dez.
    • Nov.
    • Okt.
    • Sept.
    • Aug.
    • Juli
    • Juni
    • Mai
    • Apr.
    • März
    • Feb.
    • Jan.
  •     2014
    • Dez.
    • Nov.
    • Okt.
    • Sept.
    • Aug.
    • Juli
    • Juni
    • Apr.
    • März
    • Feb.
    • Jan.
  •     2013
    • Dez.
    • Nov.
    • Okt.
    • Aug.
    • Juni
    • Mai
    • Apr.
    • März
    • Feb.
    • Jan.
  •     2012
    • Dez.
    • Sept.
    • Aug.
    • Juni
    • Mai
    • Apr.
    • März
    • Feb.
    • Jan.
  •     2011
    • Dez.
    • Nov.
    • Okt.
    • Sept.
    • Aug.
    • Juli
    • Juni
    • Mai
    • Apr.
    • März
    • Feb.
  •     2010
    • Nov.
    • Okt.
    • Sept.
    • Aug.
    • Juli
    • Mai
    • Apr.
    • März
  •     2009
    • Nov.
    • Okt.
    • Aug.
    • Juli
    • Juni
    • März
  •     2008
    • Dez.
    • Nov.
    • Okt.
    • Aug.
    • Juli
    • Mai
    • Feb.
  •     2007
    • Nov.
    • Okt.
    • Sept.
    • Juli
    • Juni
    • Mai

Feed

Follow
Give us feedback in our Product Forums.
  • Google
  • Privacy
  • Terms