Quantcast
Channel: Blackhat SEO – Webroot Threat Blog
Browsing all 31 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Cybercriminals populate Scribd with bogus adult content, spread malware using...

On their way to convert legitimate traffic into malware-infected hosts using web malware exploitation kits, cybercriminals have been actively experimenting with multiple traffic acquisition techniques...

View Article



Image may be NSFW.
Clik here to view.

How fraudulent blackhat SEO monetizers apply Quality Assurance (QA) to their...

How are cybercriminals most commonly abusing legitimate Web traffic? On the majority of occasions, some will either directly embed malicious iFrames on as many legitimate Web sites as possible, target...

View Article

Image may be NSFW.
Clik here to view.

Cybercrime-friendly underground traffic exchange helps facilitate fraudulent...

Throughout the last couple of years, the persistent demand for geolocated traffic coming from both legitimate traffic exchanges or purely malicious ones — think traffic acquisition through illegally...

View Article

Image may be NSFW.
Clik here to view.

A peek inside a Blackhat SEO/cybercrime-friendly doorways management platform

The perceived decline in the use of blackhat SEO (search engine optimization) tactics for delivering malicious/fraudulent content over the last couple of years, does not necessarily mean that...

View Article

Image may be NSFW.
Clik here to view.

Commercially available Blackhat SEO enabled multi-third-party product...

Standardization is the cybercrime ecosystem’s efficiency-oriented mentality to the general business ‘threat’ posed by inefficiencies and lack of near real-time capitalization on (fraudulent/malicious)...

View Article


Image may be NSFW.
Clik here to view.

Newly launched VDS-based cybercrime-friendly hosting provider helps...

Realizing the market segment potential of bulletproof hosting services in a post-Russian Business Network (RBN) world — although it can be easily argued that as long as its operators are at large they...

View Article

Image may be NSFW.
Clik here to view.

Commercial Windows-based compromised Web shells management application...

For years, whenever I needed a fresh sample of pharmaceutical scams, I always sampled the Web sites of major educational institutions, where a thriving ecosystem relying on compromised Web shells,...

View Article

Cybercrime Trends 2013 – Year in Review

It’s that time of the year! The moment when we reflect back on the cybercrime tactics, techniques and procedures (TTPs) that shaped 2013, in order to constructively speculate on what’s to come for 2014...

View Article


Image may be NSFW.
Clik here to view.

Google’s reCAPTCHA under automatic fire from a newly launched...

It can be easily argued, that CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart), is the modern day’s ‘guardian of the Web’, in the context of preventing the mass,...

View Article


Image may be NSFW.
Clik here to view.

Commercially available database of 52M+ ccTLD zone transfer domains spotted...

For years, cybercriminals have been building ‘hit lists’of potential targets through automated and efficiency-oriented reconnaissance TTPs (tactics, techniques and procedures).  The aim is to...

View Article

Image may be NSFW.
Clik here to view.

A peek inside a Blackhat SEO/cybercrime-friendly doorways management platform

The perceived decline in the use of blackhat SEO (search engine optimization) tactics for delivering malicious/fraudulent content over the last couple of years, does not necessarily mean that...

View Article

Image may be NSFW.
Clik here to view.

Commercially available Blackhat SEO enabled multi-third-party product...

Standardization is the cybercrime ecosystem’s efficiency-oriented mentality to the general business ‘threat’ posed by inefficiencies and lack of near real-time capitalization on (fraudulent/malicious)...

View Article

Image may be NSFW.
Clik here to view.

Newly launched VDS-based cybercrime-friendly hosting provider helps...

Realizing the market segment potential of bulletproof hosting services in a post-Russian Business Network (RBN) world — although it can be easily argued that as long as its operators are at large they...

View Article


Image may be NSFW.
Clik here to view.

Commercial Windows-based compromised Web shells management application...

For years, whenever I needed a fresh sample of pharmaceutical scams, I always sampled the Web sites of major educational institutions, where a thriving ecosystem relying on compromised Web shells,...

View Article

Cybercrime Trends 2013 – Year in Review

It’s that time of the year! The moment when we reflect back on the cybercrime tactics, techniques and procedures (TTPs) that shaped 2013, in order to constructively speculate on what’s to come for 2014...

View Article


Image may be NSFW.
Clik here to view.

Google’s reCAPTCHA under automatic fire from a newly launched...

It can be easily argued, that CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart), is the modern day’s ‘guardian of the Web’, in the context of preventing the mass,...

View Article

Image may be NSFW.
Clik here to view.

Commercially available database of 52M+ ccTLD zone transfer domains spotted...

For years, cybercriminals have been building ‘hit lists’of potential targets through automated and efficiency-oriented reconnaissance TTPs (tactics, techniques and procedures).  The aim is to...

View Article


Image may be NSFW.
Clik here to view.

A peek inside a Blackhat SEO/cybercrime-friendly doorways management platform

The perceived decline in the use of blackhat SEO (search engine optimization) tactics for delivering malicious/fraudulent content over the last couple of years, does not necessarily mean that...

View Article

Image may be NSFW.
Clik here to view.

Commercially available Blackhat SEO enabled multi-third-party product...

Standardization is the cybercrime ecosystem’s efficiency-oriented mentality to the general business ‘threat’ posed by inefficiencies and lack of near real-time capitalization on (fraudulent/malicious)...

View Article

Image may be NSFW.
Clik here to view.

Newly launched VDS-based cybercrime-friendly hosting provider helps...

Realizing the market segment potential of bulletproof hosting services in a post-Russian Business Network (RBN) world — although it can be easily argued that as long as its operators are at large they...

View Article
Browsing all 31 articles
Browse latest View live




Latest Images