Security Blog

The latest news and insights from Google on security and safety on the Internet

Using data to protect people from malware

١٩ يوليو ٢٠١١
Share on Twitter Share on Facebook
Google

هناك ٣٦ تعليقًا :

Mecandes يقول...

It's too bad that the malware folks in the world already use "your computer appears to be infected" messages to trick people into installing malicious software. Tomorrow, the bad guys will copy the format and appearance of Google's version of the message, to leverage the trust people have in Google. Perhaps Google needs something akin to the Yahoo personalized "sign-in seal" for moments like this?

١٩ يوليو ٢٠١١ في ٨:٣٣ م
DanH يقول...

I'm with Mecandes on this. For as long as I've been on the internet, there have been messages like this floating around that will actually GIVE you a virus. If I saw that message without reading this blogpost, I would assume the message was fake.

١٩ يوليو ٢٠١١ في ٨:٥٩ م
Chad يقول...

The difference is that this message is on the Google page, where as the 'fake' ones are typically in some banner or other shady webpage.

If malware is putting messages on your Google page telling you that you have malware, I say let them go for it.

١٩ يوليو ٢٠١١ في ٩:١٢ م
aelfwyne يقول...

I agree, this is too much like those phishing virus/trojans that claim your computer is infected.

What it SHOULD say is:

Your computer is infected. Shut it down now, take it to your best geek buddy, buy him a venti nonfat tripple espresso, and ask HIM to fix it, because you can't trust links like this, and your judgment is impaired otherwise you'd never have gotten infected in the first place.

١٩ يوليو ٢٠١١ في ١٠:٤٤ م
rpauli يقول...

Wait..."some people use it for harm and their own gain at the expense of others."

... gosh. I plan to stay alert for that.

١٩ يوليو ٢٠١١ في ١١:٠٢ م
Raoul Teeuwen يقول...

Thanks Google team! Keep improving the service... Sure, Mecandes and other commenters are right in that for lots of end users it is confusing as the bad guys also use a similar message. But it's always easier to comment on stuff, and at least this Google team is trying...

٢٠ يوليو ٢٠١١ في ١:٢٨ ص
Jim Seward يقول...

Now....If I was these dodgy people sending you via proxies, one of them would send you to a page that looked exactly like Google, with the message on and ask them to click here to remove the message. Pretty easy to even make the Google search work due to the APIs available....

In fact, I'd set up 100 pages exactly the same across hundreds of spammy domains so as soon as one got shut down, I could switch to another

thankfully I'm not that way inclined

٢٠ يوليو ٢٠١١ في ٥:١٩ ص
Friedrich يقول...

I would remove the link "Learn how to fix this". Most people who know don't know how to remove malware, won't learn by reading a webpage. Malware developers will soon copy your google imagery transform that link in a malware link.If you have malware running in your computer, the best advice is to shut it down and take it to your best geeky friend to fix it! (Or pay for it!). (As aelfwyne said ...)

٢٠ يوليو ٢٠١١ في ٥:٥١ ص
Vincent يقول...

They most certainly will fake it and those who do trust the fakes will do so without checking the URL.

٢٠ يوليو ٢٠١١ في ٧:٣٠ ص
Rob Carlson يقول...

Does this malware have a name?

٢٠ يوليو ٢٠١١ في ٨:٣٣ ص
غير معرف يقول...

Is it also possible to notify the abuse@ address for the IP space? In certain networks (for example universities) this gives a better chance of the right system and user being traced and cleanup being done.

٢٠ يوليو ٢٠١١ في ٨:٤٨ ص
غير معرف يقول...

This is stupid. Great idea, very, very poor execution. This is only going to confuse people. Ridiculous.

٢٠ يوليو ٢٠١١ في ٩:٥٧ ص
R&T Computers يقول...

I run a computer repair shop and see this stuff all the time. So far, I for see this as "someone lighting a match and yelling fire". I have found a post from Google stating that it is simply altering the hosts file. This is very sort on details.

Where is the bug coming from?
What put the line(s) in the hosts file?

All they are listing that I have found so far is the symptoms of the cold but not the cold. If anyone has any more details, please email me ASAP at rtcomp@gmail.com

٢٠ يوليو ٢٠١١ في ٩:٥٧ ص
Handy يقول...

Hey Damian,
I'm a Xoogler (AdWords Risk) with an idea about this based on some things I've been seeing in my current industry. I love your work on this but would prefer to keep my input private, please email me at jackhanlon at gmail so we could speak more.

Kudos on the great work.

Best,
Jack

٢٠ يوليو ٢٠١١ في ١٠:٣٢ ص
BaconGawd يقول...

Does anyone of a list of the IP addresses of the malware proxies?

٢٠ يوليو ٢٠١١ في ١٠:٤٨ ص
Mr Nice Guy يقول...

I’m glad I’m not the only one who sees a problem with this. It’s a good idea, but I think it’ll confuse your average user and may help SPREAD malware, doing little to eliminate it.

On one hand I’m inclined to agree with the previous poster who suggested that the link to fix the problem should be removed. On the other hand, I wondering if the notification bar is just a bad idea in general. I like what Google is trying to do, and I can see the good intentions, but it certainly doesn’t seem like it was thought through very well.

٢٠ يوليو ٢٠١١ في ١١:٠٨ ص
Kat يقول...

remember how these ppl got infected to begin with, was clicking on an a link telling them they were infected... that's who it's aimed at. Google is also far more trusted than most other sites anyway so it will definatly encourage ppl to try to do something about it.

I think this can only be positive.

٢٠ يوليو ٢٠١١ في ١١:١٤ ص
Lucid يقول...

The fact that people still get malware/viri to this day amazes me.

٢٠ يوليو ٢٠١١ في ١١:٤٤ ص
Matthew Cline يقول...

What do the attackers gain by sending Google traffic through proxies? Seems like a weird sort of attack.

٢٠ يوليو ٢٠١١ في ١١:٥٠ ص
R&T Computers يقول...

Update: So far from what I am seeing, this thing is altering the Google proxy so that it sends you to a Malware site.

When you do a search, it sends you to the Google proxy IP then just before doing the search, changes the search string and lists the Malware sites in a way to let you think that your going to good sites.

Please correct me if I am wrong. I am still researching this and the more info the better.

٢٠ يوليو ٢٠١١ في ١٢:٠٤ م
Michael Kennedy يقول...

@Lucid-

Some people still don't change their oil. What about people getting malware/viruses is surprising to you?

٢٠ يوليو ٢٠١١ في ١:٣٦ م
Gnelg يقول...

The pop-up, while nice that Google is trying to help, is at best vague and unhelpful for the very reasons others above have listed.

The biggest problem is not with the pop-up, but instead with the Blog Post itself. It says nothing.

What malware is it detecting?! What strain, give us the popular names that the security community is using for the malware.

There are literally hundreds of new malware/virii released into the wild every day.

You don't need to provide exact details in the pop-up but at least be complete with you research and dissemination of the information.

٢٠ يوليو ٢٠١١ في ١:٥٠ م
غير معرف يقول...

Thanks to everyone for the comments and discussion. I've updated the post with some additional details to address the most common questions.

٢٠ يوليو ٢٠١١ في ٢:٥٣ م
Mr Nice Guy يقول...

On point three you are dealing with technicalities about where you place the warning on the Google page, and what it would take to compromise the warning on the Google page. True, the actual Google notice isn’t a risk to additional users. But what about fake notices that look like the Google alert on other web sites. Because this comes from Google, and people have some degree of trust in the Google brand, people will have less reluctance to click in the link in your notice.

Before if someone were to see a fake AV ad that associates itself with Google, it could be rejected immediately. But now, a fake AV add making that claim might seem more believable, because people will know that Google does in fact offer that service. Not only that, Google has established a visual design that furthers that degree of trust. This has never been the case before. Think of it from the view of an average web surfer who encounters a forged ad on some 3rd party web site. Sure, they’re not on the Google page, but hey, it looks like the Google Ad, It Says it’s from Google, and they know Google does this kind of thing (and may not know it’s only valid on the Google page). So it’s *click*, and game over.

I’m glad to hear you’ve helped hundreds of thousands of users, but I don't know that I'd go as far as saying that the notice is not a risk to additional users.

٢٠ يوليو ٢٠١١ في ٣:٥٤ م
Jon Fleming يقول...

Mr. Lembo and othres, my extensive experience indicates that Malwarebytes AntiMalware (http://www,malwarebytes.org) is currently the best tool around for killing fake AV. In most cases it just runs and kills the fake. Sometimes it requires some trickery such as renaming the installer and/or executable. In extreme cases it requires manual fixes to re-enable safe mode before installing and running. I carry some .reg files with me; http://blog.didierstevens.com/2007/02/19/restoring-safe-mode-with-a-reg-file/.

(links purposefully not active)

٢٠ يوليو ٢٠١١ في ٦:٠٧ م
Amnon يقول...

I'm sorry to say this, but one way to get confronted with an attempt to install this Fake AV software is by browsing for picture results with Google. The pictures in the search result do not open the picture in question, but instead open a fake virus detection notice box and immediately start a fake scan of what seems to be your own hard drive and files. You can not close the Internet Explorer tab and you have to kill IE to get rid of it. If you fail to do so or follow through with what they tell you to do, you will get that Fake AV malware installed. It's time that Google does something about these fake picture found results that have been manipulated to land you on a malware site. It's also time that Microsoft changes IE so that it becomes less susceptible to these kind of attacks, but that counts for the other browsers as well.

٢١ يوليو ٢٠١١ في ١:٠٨ ص
R&T Computers يقول...

Amnon, I have seen that 1000s of times. Have you found it to be only IE and if so what version?

٢١ يوليو ٢٠١١ في ٢:٤١ ص
Unknown يقول...

At first i got scared. "I said Google showing such a message" then thanx to this post. My doubts were clear.

٢١ يوليو ٢٠١١ في ١٠:٣٧ ص
Mike P. يقول...

1) Fake AV pages are rampant. The fact that they are on pages with odd URLS does not matter, people don't pay attention. Plus, there are lots of ways to hide the URL, or make it look reasonable.

2) Google is a terrific source of hacking data and always has been. Until they borked the svn server, google code held a list of known password drop boxes. At least a third, and probably more phished passwords transit Google. However, these are for non-Google hacked accounts. As soon as Google is somewhat threatened, though, they spring into action. With an ill-conceived plan. Not impressed, folks.

٢١ يوليو ٢٠١١ في ١٠:٤٩ ص
Roidsear يقول...

Very nice, but I think this should definately be made more public: If someone sees this message he might think it's fake.
Why not post a notice on the normal Google start page about this feature?
I think most people would appericiate this.

٢١ يوليو ٢٠١١ في ١٢:٢٨ م
R&T Computers يقول...

This is just an off the wall idea. I don't know how much of a load it would be on the servers but there are "blacklist" sites out there... I use WOT on my firefiox if you've never seen it... www.mywot.com

May a flag (red yellow green or something) when a link is on a blacklist?

I am planing something like this on a local access point that's in the works here

٢١ يوليو ٢٠١١ في ١٢:٣٧ م
aa يقول...

Can google provide a Chrome USB stick, that user can boot his windows computer off of, so that computer becomes a Chrome computer.

٢١ يوليو ٢٠١١ في ١:١٩ م
Henry Hertz Hobbit يقول...

That link "Learn how to fix this" needs to be removed. I would not be surprised that the hackers have already made something that looks just like it with that link going to something malicious. A warning that the machine is compromised and they need the machine cleansed by a geek and new AV software installed is enough. Do not provide links and make that an established principle of these warnings.

٢٣ يوليو ٢٠١١ في ٣:٢٠ م
Noneya Business يقول...

Silly rabbits! Google isn't doing this to let the end user know that they might be infected. One commenter even pointed out the fact that a/v software can not remediate an unknown infection. Google is telling the attackers in a polite way to knock it off before google lays a smack down. I'm sure that the google team has been aware of this packet interception and manipulation for some time. They have collected the necessary identifying information and decided to play cat and mouse for fun. Google has resources that vastly overshadow even some governments. A group of hackers isn't a direct threat to google, hence the polite "Hey, we know who you are and what you're up to. Knock it off!"

٢٤ يوليو ٢٠١١ في ١٢:٥٤ م
Ed Coyne يقول...

This should surely help my business. One obstacle in winning new customers is that people just don't know their computers are infected. This may help to overcome that.

٢٥ يوليو ٢٠١١ في ٦:٢٣ ص
غير معرف يقول...

my google is hacked.
whenever i search for any thing on google.co.uk it goes on to a different sometimes dangerous site. please help.

٢٥ يوليو ٢٠١١ في ٣:٤٩ م

إرسال تعليق

  

التسميات


  • #sharethemicincyber
  • #supplychain #security #opensource
  • AI Security
  • android
  • android security
  • android tr
  • app security
  • big data
  • biometrics
  • blackhat
  • C++
  • chrome
  • chrome enterprise
  • chrome security
  • connected devices
  • CTF
  • diversity
  • encryption
  • federated learning
  • fuzzing
  • Gboard
  • google play
  • google play protect
  • hacking
  • interoperability
  • iot security
  • kubernetes
  • linux kernel
  • memory safety
  • Open Source
  • pha family highlights
  • pixel
  • privacy
  • private compute core
  • Rowhammer
  • rust
  • Security
  • security rewards program
  • sigstore
  • spyware
  • supply chain
  • targeted spyware
  • tensor
  • Titan M2
  • VDP
  • vulnerabilities
  • workshop


Archive


  •     2026
    • فبراير
    • يناير
  •     2025
    • ديسمبر
    • نوفمبر
    • أكتوبر
    • سبتمبر
    • أغسطس
    • يوليو
    • يونيو
    • مايو
    • أبريل
    • مارس
    • فبراير
    • يناير
  •     2024
    • ديسمبر
    • نوفمبر
    • أكتوبر
    • سبتمبر
    • أغسطس
    • يوليو
    • يونيو
    • مايو
    • أبريل
    • مارس
    • فبراير
    • يناير
  •     2023
    • ديسمبر
    • نوفمبر
    • أكتوبر
    • سبتمبر
    • أغسطس
    • يوليو
    • يونيو
    • مايو
    • أبريل
    • مارس
    • فبراير
    • يناير
  •     2022
    • ديسمبر
    • نوفمبر
    • أكتوبر
    • سبتمبر
    • أغسطس
    • يوليو
    • يونيو
    • مايو
    • أبريل
    • مارس
    • فبراير
    • يناير
  •     2021
    • ديسمبر
    • نوفمبر
    • أكتوبر
    • سبتمبر
    • أغسطس
    • يوليو
    • يونيو
    • مايو
    • أبريل
    • مارس
    • فبراير
    • يناير
  •     2020
    • ديسمبر
    • نوفمبر
    • أكتوبر
    • سبتمبر
    • أغسطس
    • يوليو
    • يونيو
    • مايو
    • أبريل
    • مارس
    • فبراير
    • يناير
  •     2019
    • ديسمبر
    • نوفمبر
    • أكتوبر
    • سبتمبر
    • أغسطس
    • يوليو
    • يونيو
    • مايو
    • أبريل
    • مارس
    • فبراير
    • يناير
  •     2018
    • ديسمبر
    • نوفمبر
    • أكتوبر
    • سبتمبر
    • أغسطس
    • يوليو
    • يونيو
    • مايو
    • أبريل
    • مارس
    • فبراير
    • يناير
  •     2017
    • ديسمبر
    • نوفمبر
    • أكتوبر
    • سبتمبر
    • يوليو
    • يونيو
    • مايو
    • أبريل
    • مارس
    • فبراير
    • يناير
  •     2016
    • ديسمبر
    • نوفمبر
    • أكتوبر
    • سبتمبر
    • أغسطس
    • يوليو
    • يونيو
    • مايو
    • أبريل
    • مارس
    • فبراير
    • يناير
  •     2015
    • ديسمبر
    • نوفمبر
    • أكتوبر
    • سبتمبر
    • أغسطس
    • يوليو
    • يونيو
    • مايو
    • أبريل
    • مارس
    • فبراير
    • يناير
  •     2014
    • ديسمبر
    • نوفمبر
    • أكتوبر
    • سبتمبر
    • أغسطس
    • يوليو
    • يونيو
    • أبريل
    • مارس
    • فبراير
    • يناير
  •     2013
    • ديسمبر
    • نوفمبر
    • أكتوبر
    • أغسطس
    • يونيو
    • مايو
    • أبريل
    • مارس
    • فبراير
    • يناير
  •     2012
    • ديسمبر
    • سبتمبر
    • أغسطس
    • يونيو
    • مايو
    • أبريل
    • مارس
    • فبراير
    • يناير
  •     2011
    • ديسمبر
    • نوفمبر
    • أكتوبر
    • سبتمبر
    • أغسطس
    • يوليو
    • يونيو
    • مايو
    • أبريل
    • مارس
    • فبراير
  •     2010
    • نوفمبر
    • أكتوبر
    • سبتمبر
    • أغسطس
    • يوليو
    • مايو
    • أبريل
    • مارس
  •     2009
    • نوفمبر
    • أكتوبر
    • أغسطس
    • يوليو
    • يونيو
    • مارس
  •     2008
    • ديسمبر
    • نوفمبر
    • أكتوبر
    • أغسطس
    • يوليو
    • مايو
    • فبراير
  •     2007
    • نوفمبر
    • أكتوبر
    • سبتمبر
    • يوليو
    • يونيو
    • مايو

Feed

Follow
Give us feedback in our Product Forums.
  • Google
  • Privacy
  • Terms