Security Blog

The latest news and insights from Google on security and safety on the Internet

Top 10 Malware Sites

3 giugno 2009
Share on Twitter Share on Facebook
Google

17 commenti :

hongjun ha detto...

Looks like many are from China.
And also, one of them look to have tried to use Google Analytics (phishing).

hongjun

4 giugno 2009 alle ore 12:47
Declare.James ha detto...

Gumblar.cn was added to the Google Safe Browsing list on 4/27?
Would this also handle the obfuscated code?

4 giugno 2009 alle ore 13:57
Unknown ha detto...

A lot of not-so-net-savvy kids are searching for Friv to play games (http://www.google.com/trends?q=friv) but as Friv.com isn't indexed by Google (it is by Bing, Yahoo...?) they get links to malware. I quickly found these two links - the first on page 1, the second on page 2. Just first "-" in URL to check them. Please look into this Google!


m-ops.optus.nu/cheatscoce/guthef.html

i-bigpak.altervista.org/tyson-da46/ocrezderr.html

4 giugno 2009 alle ore 14:26
Alexis de Tocqueville ha detto...
Questo commento è stato eliminato da un amministratore del blog.
4 giugno 2009 alle ore 14:42
Stephan Chenette ha detto...
Questo commento è stato eliminato dall'autore.
4 giugno 2009 alle ore 17:25
Stephan Chenette ha detto...

The Beladen mass compromise which we've been tracking at Websense is the final landing page after legit sites have been infected. The injected code first redirects users to googleanalytlcs.net (on the top 10) and then to a final landing page such as Beladen.

We expect beladen.net to be one of many sites to be used in this attack.

Attackers have already switched from sending users from googleanlytlcs.net to beladen.net to googleanalytlcs.net to shkarkimi.net

http://securitylabs.websense.com/content/Alerts/3412.aspx

4 giugno 2009 alle ore 17:33
heinka ha detto...

Thank you for this very interesting information! A pity that the Internet also has the negative side! Many greetings, heinka

5 giugno 2009 alle ore 05:46
GroundHogDog ha detto...

If you were to publish a regularly updated service for top X Malware destinations, I would be most happy :)

8 giugno 2009 alle ore 10:16
Bilal ha detto...
Questo commento è stato eliminato da un amministratore del blog.
14 giugno 2009 alle ore 06:40
Unknown ha detto...

Why bother blocking just 10 sites? Block them all or maybe the top 100 or so. At least by blocking 100 you are blocking a bigger majority of malware out there than just 10.

17 giugno 2009 alle ore 17:59
Jan ha detto...

If you want a long list, just download the free blacklist at http://urlblacklist.com/?sec=download

18 giugno 2009 alle ore 01:57
Unknown ha detto...

Unfortunately, you cause software to block an entire root domain when just one subdomain, such as www.*.com has been hacked. This is unacceptable and unecessary because it can lead to loss of millions of dollars for just one server being hacked (which shouldn't happen, but does on occasion). Furthermore, your review process takes too long. It should be instantaneous. You should be more targeted in your reporting of malicious sites, and have an instantaneous review process.

3 luglio 2009 alle ore 18:30
Billco ha detto...

@Brian: If having your site flagged as unsafe by Google can lead to you losing "millions of dollars", you're in the wrong business and crying on the wrong shoulder. No site in the world makes millions of dollars a day from search traffic, not even the almighty Google.

One would also argue that if you had that sort of income stream, security would be a bigger responsibility for you, and ideally you'd find out about the breach before Google does. Or are you the type of businessman who cries to the government when the reality of your ineptitude tampers with your bottom line ?

13 luglio 2009 alle ore 14:58
Unknown ha detto...

New on the list: http://x9p.ru:8080/ts/in.cgi?pepsi118

My host provider give me a solution, then a link to Slashdot article.

Te article Head Title is: R.I.P FTP.

Crazy as a Life!

What about pepsi in the url.

Crazy

29 luglio 2009 alle ore 20:52
Muslims Get BTFO'd ha detto...

How ca anyone do this? Its wrong and a disgrace.

28 luglio 2011 alle ore 22:29
Unknown ha detto...

what a nice and the best kinds of the games platforms that’s why the most of the gamer are there to play and also to enjoy it the biggest kinds of the Friv games.

24 maggio 2014 alle ore 07:02
Unknown ha detto...

Thank you for share this is such a very nice post i really like it your blog.
Security Audit

17 giugno 2014 alle ore 08:45

Posta un commento

  

Etichette


  • #sharethemicincyber
  • #supplychain #security #opensource
  • AI Security
  • android
  • android security
  • android tr
  • app security
  • big data
  • biometrics
  • blackhat
  • C++
  • chrome
  • chrome enterprise
  • chrome security
  • connected devices
  • CTF
  • diversity
  • encryption
  • federated learning
  • fuzzing
  • Gboard
  • google play
  • google play protect
  • hacking
  • interoperability
  • iot security
  • kubernetes
  • linux kernel
  • memory safety
  • Open Source
  • pha family highlights
  • pixel
  • privacy
  • private compute core
  • Rowhammer
  • rust
  • Security
  • security rewards program
  • sigstore
  • spyware
  • supply chain
  • targeted spyware
  • tensor
  • Titan M2
  • VDP
  • vulnerabilities
  • workshop


Archive


  •     2025
    • giu
    • mag
    • apr
    • mar
    • feb
    • gen
  •     2024
    • dic
    • nov
    • ott
    • set
    • ago
    • lug
    • giu
    • mag
    • apr
    • mar
    • feb
    • gen
  •     2023
    • dic
    • nov
    • ott
    • set
    • ago
    • lug
    • giu
    • mag
    • apr
    • mar
    • feb
    • gen
  •     2022
    • dic
    • nov
    • ott
    • set
    • ago
    • lug
    • giu
    • mag
    • apr
    • mar
    • feb
    • gen
  •     2021
    • dic
    • nov
    • ott
    • set
    • ago
    • lug
    • giu
    • mag
    • apr
    • mar
    • feb
    • gen
  •     2020
    • dic
    • nov
    • ott
    • set
    • ago
    • lug
    • giu
    • mag
    • apr
    • mar
    • feb
    • gen
  •     2019
    • dic
    • nov
    • ott
    • set
    • ago
    • lug
    • giu
    • mag
    • apr
    • mar
    • feb
    • gen
  •     2018
    • dic
    • nov
    • ott
    • set
    • ago
    • lug
    • giu
    • mag
    • apr
    • mar
    • feb
    • gen
  •     2017
    • dic
    • nov
    • ott
    • set
    • lug
    • giu
    • mag
    • apr
    • mar
    • feb
    • gen
  •     2016
    • dic
    • nov
    • ott
    • set
    • ago
    • lug
    • giu
    • mag
    • apr
    • mar
    • feb
    • gen
  •     2015
    • dic
    • nov
    • ott
    • set
    • ago
    • lug
    • giu
    • mag
    • apr
    • mar
    • feb
    • gen
  •     2014
    • dic
    • nov
    • ott
    • set
    • ago
    • lug
    • giu
    • apr
    • mar
    • feb
    • gen
  •     2013
    • dic
    • nov
    • ott
    • ago
    • giu
    • mag
    • apr
    • mar
    • feb
    • gen
  •     2012
    • dic
    • set
    • ago
    • giu
    • mag
    • apr
    • mar
    • feb
    • gen
  •     2011
    • dic
    • nov
    • ott
    • set
    • ago
    • lug
    • giu
    • mag
    • apr
    • mar
    • feb
  •     2010
    • nov
    • ott
    • set
    • ago
    • lug
    • mag
    • apr
    • mar
  •     2009
    • nov
    • ott
    • ago
    • lug
    • giu
    • mar
  •     2008
    • dic
    • nov
    • ott
    • ago
    • lug
    • mag
    • feb
  •     2007
    • nov
    • ott
    • set
    • lug
    • giu
    • mag

Feed

Follow
Give us feedback in our Product Forums.
  • Google
  • Privacy
  • Terms