Security Blog

The latest news and insights from Google on security and safety on the Internet

Using data to protect people from malware

19 juillet 2011
Share on Twitter Share on Facebook
Google

36 commentaires :

Mecandes a dit…

It's too bad that the malware folks in the world already use "your computer appears to be infected" messages to trick people into installing malicious software. Tomorrow, the bad guys will copy the format and appearance of Google's version of the message, to leverage the trust people have in Google. Perhaps Google needs something akin to the Yahoo personalized "sign-in seal" for moments like this?

19 juillet 2011 à 20:33
DanH a dit…

I'm with Mecandes on this. For as long as I've been on the internet, there have been messages like this floating around that will actually GIVE you a virus. If I saw that message without reading this blogpost, I would assume the message was fake.

19 juillet 2011 à 20:59
Chad a dit…

The difference is that this message is on the Google page, where as the 'fake' ones are typically in some banner or other shady webpage.

If malware is putting messages on your Google page telling you that you have malware, I say let them go for it.

19 juillet 2011 à 21:12
aelfwyne a dit…

I agree, this is too much like those phishing virus/trojans that claim your computer is infected.

What it SHOULD say is:

Your computer is infected. Shut it down now, take it to your best geek buddy, buy him a venti nonfat tripple espresso, and ask HIM to fix it, because you can't trust links like this, and your judgment is impaired otherwise you'd never have gotten infected in the first place.

19 juillet 2011 à 22:44
rpauli a dit…

Wait..."some people use it for harm and their own gain at the expense of others."

... gosh. I plan to stay alert for that.

19 juillet 2011 à 23:02
Raoul Teeuwen a dit…

Thanks Google team! Keep improving the service... Sure, Mecandes and other commenters are right in that for lots of end users it is confusing as the bad guys also use a similar message. But it's always easier to comment on stuff, and at least this Google team is trying...

20 juillet 2011 à 01:28
Jim Seward a dit…

Now....If I was these dodgy people sending you via proxies, one of them would send you to a page that looked exactly like Google, with the message on and ask them to click here to remove the message. Pretty easy to even make the Google search work due to the APIs available....

In fact, I'd set up 100 pages exactly the same across hundreds of spammy domains so as soon as one got shut down, I could switch to another

thankfully I'm not that way inclined

20 juillet 2011 à 05:19
Friedrich a dit…

I would remove the link "Learn how to fix this". Most people who know don't know how to remove malware, won't learn by reading a webpage. Malware developers will soon copy your google imagery transform that link in a malware link.If you have malware running in your computer, the best advice is to shut it down and take it to your best geeky friend to fix it! (Or pay for it!). (As aelfwyne said ...)

20 juillet 2011 à 05:51
Vincent a dit…

They most certainly will fake it and those who do trust the fakes will do so without checking the URL.

20 juillet 2011 à 07:30
Rob Carlson a dit…

Does this malware have a name?

20 juillet 2011 à 08:33
Anonyme a dit…

Is it also possible to notify the abuse@ address for the IP space? In certain networks (for example universities) this gives a better chance of the right system and user being traced and cleanup being done.

20 juillet 2011 à 08:48
paul a dit…

This is stupid. Great idea, very, very poor execution. This is only going to confuse people. Ridiculous.

20 juillet 2011 à 09:57
R&T Computers a dit…

I run a computer repair shop and see this stuff all the time. So far, I for see this as "someone lighting a match and yelling fire". I have found a post from Google stating that it is simply altering the hosts file. This is very sort on details.

Where is the bug coming from?
What put the line(s) in the hosts file?

All they are listing that I have found so far is the symptoms of the cold but not the cold. If anyone has any more details, please email me ASAP at rtcomp@gmail.com

20 juillet 2011 à 09:57
Handy a dit…

Hey Damian,
I'm a Xoogler (AdWords Risk) with an idea about this based on some things I've been seeing in my current industry. I love your work on this but would prefer to keep my input private, please email me at jackhanlon at gmail so we could speak more.

Kudos on the great work.

Best,
Jack

20 juillet 2011 à 10:32
BaconGawd a dit…

Does anyone of a list of the IP addresses of the malware proxies?

20 juillet 2011 à 10:48
Mr Nice Guy a dit…

I’m glad I’m not the only one who sees a problem with this. It’s a good idea, but I think it’ll confuse your average user and may help SPREAD malware, doing little to eliminate it.

On one hand I’m inclined to agree with the previous poster who suggested that the link to fix the problem should be removed. On the other hand, I wondering if the notification bar is just a bad idea in general. I like what Google is trying to do, and I can see the good intentions, but it certainly doesn’t seem like it was thought through very well.

20 juillet 2011 à 11:08
Kat a dit…

remember how these ppl got infected to begin with, was clicking on an a link telling them they were infected... that's who it's aimed at. Google is also far more trusted than most other sites anyway so it will definatly encourage ppl to try to do something about it.

I think this can only be positive.

20 juillet 2011 à 11:14
Lucid a dit…

The fact that people still get malware/viri to this day amazes me.

20 juillet 2011 à 11:44
Matthew Cline a dit…

What do the attackers gain by sending Google traffic through proxies? Seems like a weird sort of attack.

20 juillet 2011 à 11:50
R&T Computers a dit…

Update: So far from what I am seeing, this thing is altering the Google proxy so that it sends you to a Malware site.

When you do a search, it sends you to the Google proxy IP then just before doing the search, changes the search string and lists the Malware sites in a way to let you think that your going to good sites.

Please correct me if I am wrong. I am still researching this and the more info the better.

20 juillet 2011 à 12:04
Michael Kennedy a dit…

@Lucid-

Some people still don't change their oil. What about people getting malware/viruses is surprising to you?

20 juillet 2011 à 13:36
Gnelg a dit…

The pop-up, while nice that Google is trying to help, is at best vague and unhelpful for the very reasons others above have listed.

The biggest problem is not with the pop-up, but instead with the Blog Post itself. It says nothing.

What malware is it detecting?! What strain, give us the popular names that the security community is using for the malware.

There are literally hundreds of new malware/virii released into the wild every day.

You don't need to provide exact details in the pop-up but at least be complete with you research and dissemination of the information.

20 juillet 2011 à 13:50
Anonyme a dit…

Thanks to everyone for the comments and discussion. I've updated the post with some additional details to address the most common questions.

20 juillet 2011 à 14:53
Mr Nice Guy a dit…

On point three you are dealing with technicalities about where you place the warning on the Google page, and what it would take to compromise the warning on the Google page. True, the actual Google notice isn’t a risk to additional users. But what about fake notices that look like the Google alert on other web sites. Because this comes from Google, and people have some degree of trust in the Google brand, people will have less reluctance to click in the link in your notice.

Before if someone were to see a fake AV ad that associates itself with Google, it could be rejected immediately. But now, a fake AV add making that claim might seem more believable, because people will know that Google does in fact offer that service. Not only that, Google has established a visual design that furthers that degree of trust. This has never been the case before. Think of it from the view of an average web surfer who encounters a forged ad on some 3rd party web site. Sure, they’re not on the Google page, but hey, it looks like the Google Ad, It Says it’s from Google, and they know Google does this kind of thing (and may not know it’s only valid on the Google page). So it’s *click*, and game over.

I’m glad to hear you’ve helped hundreds of thousands of users, but I don't know that I'd go as far as saying that the notice is not a risk to additional users.

20 juillet 2011 à 15:54
Jon Fleming a dit…

Mr. Lembo and othres, my extensive experience indicates that Malwarebytes AntiMalware (http://www,malwarebytes.org) is currently the best tool around for killing fake AV. In most cases it just runs and kills the fake. Sometimes it requires some trickery such as renaming the installer and/or executable. In extreme cases it requires manual fixes to re-enable safe mode before installing and running. I carry some .reg files with me; http://blog.didierstevens.com/2007/02/19/restoring-safe-mode-with-a-reg-file/.

(links purposefully not active)

20 juillet 2011 à 18:07
Amnon a dit…

I'm sorry to say this, but one way to get confronted with an attempt to install this Fake AV software is by browsing for picture results with Google. The pictures in the search result do not open the picture in question, but instead open a fake virus detection notice box and immediately start a fake scan of what seems to be your own hard drive and files. You can not close the Internet Explorer tab and you have to kill IE to get rid of it. If you fail to do so or follow through with what they tell you to do, you will get that Fake AV malware installed. It's time that Google does something about these fake picture found results that have been manipulated to land you on a malware site. It's also time that Microsoft changes IE so that it becomes less susceptible to these kind of attacks, but that counts for the other browsers as well.

21 juillet 2011 à 01:08
R&T Computers a dit…

Amnon, I have seen that 1000s of times. Have you found it to be only IE and if so what version?

21 juillet 2011 à 02:41
Unknown a dit…

At first i got scared. "I said Google showing such a message" then thanx to this post. My doubts were clear.

21 juillet 2011 à 10:37
Mike P. a dit…

1) Fake AV pages are rampant. The fact that they are on pages with odd URLS does not matter, people don't pay attention. Plus, there are lots of ways to hide the URL, or make it look reasonable.

2) Google is a terrific source of hacking data and always has been. Until they borked the svn server, google code held a list of known password drop boxes. At least a third, and probably more phished passwords transit Google. However, these are for non-Google hacked accounts. As soon as Google is somewhat threatened, though, they spring into action. With an ill-conceived plan. Not impressed, folks.

21 juillet 2011 à 10:49
Roidsear a dit…

Very nice, but I think this should definately be made more public: If someone sees this message he might think it's fake.
Why not post a notice on the normal Google start page about this feature?
I think most people would appericiate this.

21 juillet 2011 à 12:28
R&T Computers a dit…

This is just an off the wall idea. I don't know how much of a load it would be on the servers but there are "blacklist" sites out there... I use WOT on my firefiox if you've never seen it... www.mywot.com

May a flag (red yellow green or something) when a link is on a blacklist?

I am planing something like this on a local access point that's in the works here

21 juillet 2011 à 12:37
aa a dit…

Can google provide a Chrome USB stick, that user can boot his windows computer off of, so that computer becomes a Chrome computer.

21 juillet 2011 à 13:19
Henry Hertz Hobbit a dit…

That link "Learn how to fix this" needs to be removed. I would not be surprised that the hackers have already made something that looks just like it with that link going to something malicious. A warning that the machine is compromised and they need the machine cleansed by a geek and new AV software installed is enough. Do not provide links and make that an established principle of these warnings.

23 juillet 2011 à 15:20
Noneya Business a dit…

Silly rabbits! Google isn't doing this to let the end user know that they might be infected. One commenter even pointed out the fact that a/v software can not remediate an unknown infection. Google is telling the attackers in a polite way to knock it off before google lays a smack down. I'm sure that the google team has been aware of this packet interception and manipulation for some time. They have collected the necessary identifying information and decided to play cat and mouse for fun. Google has resources that vastly overshadow even some governments. A group of hackers isn't a direct threat to google, hence the polite "Hey, we know who you are and what you're up to. Knock it off!"

24 juillet 2011 à 12:54
Ed Coyne a dit…

This should surely help my business. One obstacle in winning new customers is that people just don't know their computers are infected. This may help to overcome that.

25 juillet 2011 à 06:23
Anonyme a dit…

my google is hacked.
whenever i search for any thing on google.co.uk it goes on to a different sometimes dangerous site. please help.

25 juillet 2011 à 15:49

Enregistrer un commentaire

  

Libellés


  • #sharethemicincyber
  • #supplychain #security #opensource
  • android
  • android security
  • android tr
  • app security
  • big data
  • biometrics
  • blackhat
  • C++
  • chrome
  • chrome enterprise
  • chrome security
  • connected devices
  • CTF
  • diversity
  • encryption
  • federated learning
  • fuzzing
  • Gboard
  • google play
  • google play protect
  • hacking
  • interoperability
  • iot security
  • kubernetes
  • linux kernel
  • memory safety
  • Open Source
  • pha family highlights
  • pixel
  • privacy
  • private compute core
  • Rowhammer
  • rust
  • Security
  • security rewards program
  • sigstore
  • spyware
  • supply chain
  • targeted spyware
  • tensor
  • Titan M2
  • VDP
  • vulnerabilities
  • workshop


Archive


  •     2025
    • mai
    • avr.
    • mars
    • févr.
    • janv.
  •     2024
    • déc.
    • nov.
    • oct.
    • sept.
    • août
    • juil.
    • juin
    • mai
    • avr.
    • mars
    • févr.
    • janv.
  •     2023
    • déc.
    • nov.
    • oct.
    • sept.
    • août
    • juil.
    • juin
    • mai
    • avr.
    • mars
    • févr.
    • janv.
  •     2022
    • déc.
    • nov.
    • oct.
    • sept.
    • août
    • juil.
    • juin
    • mai
    • avr.
    • mars
    • févr.
    • janv.
  •     2021
    • déc.
    • nov.
    • oct.
    • sept.
    • août
    • juil.
    • juin
    • mai
    • avr.
    • mars
    • févr.
    • janv.
  •     2020
    • déc.
    • nov.
    • oct.
    • sept.
    • août
    • juil.
    • juin
    • mai
    • avr.
    • mars
    • févr.
    • janv.
  •     2019
    • déc.
    • nov.
    • oct.
    • sept.
    • août
    • juil.
    • juin
    • mai
    • avr.
    • mars
    • févr.
    • janv.
  •     2018
    • déc.
    • nov.
    • oct.
    • sept.
    • août
    • juil.
    • juin
    • mai
    • avr.
    • mars
    • févr.
    • janv.
  •     2017
    • déc.
    • nov.
    • oct.
    • sept.
    • juil.
    • juin
    • mai
    • avr.
    • mars
    • févr.
    • janv.
  •     2016
    • déc.
    • nov.
    • oct.
    • sept.
    • août
    • juil.
    • juin
    • mai
    • avr.
    • mars
    • févr.
    • janv.
  •     2015
    • déc.
    • nov.
    • oct.
    • sept.
    • août
    • juil.
    • juin
    • mai
    • avr.
    • mars
    • févr.
    • janv.
  •     2014
    • déc.
    • nov.
    • oct.
    • sept.
    • août
    • juil.
    • juin
    • avr.
    • mars
    • févr.
    • janv.
  •     2013
    • déc.
    • nov.
    • oct.
    • août
    • juin
    • mai
    • avr.
    • mars
    • févr.
    • janv.
  •     2012
    • déc.
    • sept.
    • août
    • juin
    • mai
    • avr.
    • mars
    • févr.
    • janv.
  •     2011
    • déc.
    • nov.
    • oct.
    • sept.
    • août
    • juil.
    • juin
    • mai
    • avr.
    • mars
    • févr.
  •     2010
    • nov.
    • oct.
    • sept.
    • août
    • juil.
    • mai
    • avr.
    • mars
  •     2009
    • nov.
    • oct.
    • août
    • juil.
    • juin
    • mars
  •     2008
    • déc.
    • nov.
    • oct.
    • août
    • juil.
    • mai
    • févr.
  •     2007
    • nov.
    • oct.
    • sept.
    • juil.
    • juin
    • mai

Feed

Follow
Give us feedback in our Product Forums.
  • Google
  • Privacy
  • Terms