The perceived decline in the use of blackhat SEO (search engine optimization) tactics for delivering malicious/fraudulent content over the last couple of years, does not necessarily mean that cybercriminals have somehow abandoned the concept of abusing the world’s most popular search engines. The fact is, this tactic remains effective at reaching users who, on the majority of occasions, trust that that the search result links are malware/exploit free. Unfortunately, that’s not the case. Cybercriminals continue introducing new tactics helping fraudulent adversaries to quickly build up and aggregate millions of legitimate visitors, to be later on exposed to online scams or directly converted to malware-infected hosts. This is achieved through cybercrime-friendly underground market traffic exchange networks offering positive ROI (Return on Investment) in the process.

In this post, I’ll take a peek inside a blackhat SEO/cybercrime-friendly doorways management script, discuss its core features, and the ways cybercriminals are currently abusing its ability to populate major search engines with hundreds of millions of search queries relevant bogus Web pages, most commonly hosted on compromised Web servers in an attempt by the cybercriminals behind the campaign to take advantage of the compromised Web site’s high page rank.

Sample screenshots of the administration panel for the blackhat SEO/cybercrime-friendly multi-user doorways management platform:

Blackhat_SEO_Cybercrime_Fraud_Rogue_Search_Engine_Doorway_Management

Blackhat_SEO_Cybercrime_Fraud_Rogue_Search_Engine_Doorway_Management_01

Blackhat_SEO_Cybercrime_Fraud_Rogue_Search_Engine_Doorway_Management_02

Blackhat_SEO_Cybercrime_Fraud_Rogue_Search_Engine_Doorway_Management_03

Blackhat_SEO_Cybercrime_Fraud_Rogue_Search_Engine_Doorway_Management_04

Blackhat_SEO_Cybercrime_Fraud_Rogue_Search_Engine_Doorway_Management_05

Blackhat_SEO_Cybercrime_Fraud_Rogue_Search_Engine_Doorway_Management_06

Blackhat_SEO_Cybercrime_Fraud_Rogue_Search_Engine_Doorway_Management_07

Blackhat_SEO_Cybercrime_Fraud_Rogue_Search_Engine_Doorway_Management_08

Blackhat_SEO_Cybercrime_Fraud_Rogue_Search_Engine_Doorway_Management_09

Blackhat_SEO_Cybercrime_Fraud_Rogue_Search_Engine_Doorway_Management_10

Blackhat_SEO_Cybercrime_Fraud_Rogue_Search_Engine_Doorway_Management_11

Basically, what this platform enables cybercriminals to do is to have their fraudulent/malicious/rogue content indexed by Yandex and Google in a near real-time fashion — as you can see in the last screenshot, it only took 24 hours to have one of the rogue doorways indexed by Yandex. How is this accomplished? The cybercriminals behind this service have created an ecosystem designed to generate rogue content, and mal-links pointing back to it, with the actual content and links hosted on compromised Web shells, usually hidden on Web servers with high page ranks.

Next to the advanced customization evident throughout the entire administration panel, the tool is also blackhat-SEO-cybercrime-friendly compatible, as it has been designed to be integrated with other tools. Moreover, the multi-user nature of the platform, allows cybercrime/blackhat SEO groups to work simultaneously while maintaining the necessary degree of QA, ensuring the success of their campaigns. And with the market for (compromised) Web shells proliferating, based on the increasing number of supply+demands underground market type of propositions appearing on, both, public/dark Web, it shouldn’t be surprising that cybercriminals would continue possessing access to tens of millions of unique visitors, which they can convert into virtually anything given that the right incentives have been offered through a cybercrime-friendly affiliate network.

We’ll continue highlighting the existence of these platforms, with the idea to emphasize on on just how easy it is to populate the world’s most popular search engines with fraudulent/malicious/rogue content.

Blog Staff

About the Author

Blog Staff

The Webroot blog offers expert insights and analysis into the latest cybersecurity trends. Whether you’re a home or business user, we’re dedicated to giving you the awareness and knowledge needed to stay ahead of today’s cyber threats.

Share This