Category Archives: Exploits

An Ultimate Black Hat Script

Twitter Facebook

Yesterday I received this spam. If you’ve ever wondered who bothers to hack websites and why they do it, here’s a premium explanation straight from the hackers.

Hey guys,

A true bl4ckhat system for Internet Marketers

Do you want to control other site’s traffic? Ever wanted to insert your ads, well paid CPA offers and adsense code on other site’s high traffic pages? Every wanted to place your backlinks on other’s high page ranked pages without them knowing? Ever wanted to redirect the other site’s visitors to any link you desire? Well you have finally found the secret souce, Presenting…

An Ultimate Black Hat Script

What is it exactly ?

Mass control millions of servers at a given moment with Affiliate Ad’s, Adsense, Clickjacking, Content-Locking, Redirection -The sky is the limit! These black hat methods are being utilized by the pharmas and now its your time to get hold of their secrect way of money laundering.

Control Millions of people’s servers from all over the internet.

– Redirect the traffic of the other website
– Contron their ads or inster your own ad in their website
– Initate the pop-unders
– Put backlinks on the high page rank sites
– Place any code on their sites

How to gain access to people’s servers ?

You insert a simple code within scripts, themes, or plugins…or whatever…get creative! Then distribute it.
Once they put it on their server, all sites within their IP are now under your control It’s really quite simple. the coder was able to gain over 100,000 IP’s in about 3 months. That’s not website…that’s IP. Right now, it over 8 million pages that he has full control over to redirect, post ads on, place popups, popunders, or just insert his backlink on.

Check it out:-

Click Here!!

Only few copies will be given out and than this product will be taken off the market forever! Act now!

Don’t let cybercriminals pwn your site. No matter how good your security, it will break sooner or later. When that happens, you’ll want to be informed promptly and have an easy way to put things right.

Law Firms Need Website Backup More Than Ever

Twitter Facebook

If you work for a law firm, it is unlikely that the idea of protecting your firm’s website has entered and lingered in your mind. Attorneys and paralegals are focused on clients, not websites. Most firm’s sites contain service descriptions, company history, and contact information, so if they were hacked it wouldn’t be that big of a deal, right?

Wrong. Just ask Matt Passen.

Passen Law Firm Becomes Victim of Malware Cyber Attack

Passen Law Group is a two-man personal injury firm in Chicago. As told by USA Today, in June of 2011 Matt Passen went to his site and says he was confronted with “a series of letters and numbers that made no sense to me.”  Passen soon learned that he had been targeted in a slew of malware-based cyber attacks.

Being infected means lost traffic, not just an ugly webpage- Google actively blacklists websites that are known to be infected with malware (currently 700,000+), rendering the sites invisible to searches, or marked with a warning not to visit it. The idea of not having a searchable web presence is unacceptable.

Passen needed to remediate immediately, and after a few weeks and three separate attempts by hired professionals to remove the malicious script, Passen’s site was finally back to an uninfected state. But what did he lose by not preparing for a situation like this? He put it best himself by saying: “It will easily cost us a couple thousand dollars to remedy, and I can’t tell you what the costs are in terms of lost business opportunity.”

What Could Passen Have Done?

Matt Passen could have dedicated a considerable amount of time each day to manually checking his site for unsolicited changes. He could have downloaded his site’s source code and compared it line-by-line to a prior version in order to detect discrepancies between the two. If he found something that didn’t look right, he could rollback to an earlier rendition of his site by finding that version’s source code and pushing it onto his server. If he had done this each day, he would have caught and eradicated the malware in a shorter timeframe, and with less damage.

Unsurprisingly, Passen didn’t do any of that. Shifting focus away from day-to-day professional responsibilities in order to manually monitor a website isn’t a feasible option for most. Luckily, it isn’t the only option.

CodeGuard, a cloud-based website backup, monitoring, and restore service could have easily lessened Passen’s burden. After a simple initial backup, CodeGuard monitors each site for malware every hour and completes daily scans for file changes. Should a site become compromised, the user receives an email notification from CodeGuard. But it doesn’t stop there: we store every backup taken of your site, so someone in a situation similar to Passen’s can choose a prior version and quickly restore their site back to an uninfected, fully functional state.

Law Firms Need CodeGuard

Law firms are prime targets for hackers because website security is not currently a priority in the legal industry; regulation, competition, and client-servicing dominates mindshare. Here are two things law firms stand to lose by not focusing on properly protecting their websites:

1. Losing potential clients- without a searchable web presence, site traffic will plummet. In today’s search dominated lifestyle, you will lose industry traction by not appearing to potential clients looking to utilize your services.

2. Losing credibility- current and prospective clients may perceive your firm as unprepared and insecure, and choose to take their business to a competitor whose site and content hasn’t been tampered with.

CodeGuard is part of a solution that helps protect against real struggles that law firms face, and should firms encounter difficulties with their website, can help to quickly remediate the problems. Law firms have enough things to worry about – the website shouldn’t be one of them. Talk with your IT department or webmaster about giving CodeGuard a try before it’s too late, and gain peace of mind that you never knew you could have!


How to Enable HTTPS Security on LinkedIn

Twitter Facebook

Logging into social networking, WordPress, or any other website via a public WiFi hotspot could be risky because somebody using a cookie-sniffing tool, such as FireSheep, can hijack your session cookie and get full access to your account—unless you are using https. On Feb 7, 2012 LinkedIn announced a feature that allows users to turn on https, and thus prevent session hijacking.  The feature is currently opt-in, but will be rolled out to all users “in the next coming weeks.”

The https switch is not that easy to find in the LinkedIn configurations.  After logging in, select your name in the upper right corner, choose Settings, then click Account in the lower left, and Manage security settings at the bottom.  Click the check box in the pop up window.

Google Segments Offending Sites: Distribution Domains vs Compromised Sites

Twitter Facebook

Read on Google Online Security Blog

“Google announced last week that it would be expanding the program, Safe Browsing Alerts for Network Administrators, to also include malicious domains to the information available to Web site administrators” states Carlton Jurvis of

This is an interesting twist, indeed. As Nav Jagpal states on Google’s Online Security Blog, “distribution domains” are created explicitly to distribute malware and launch exploits, as opposed to “compromised sites”, which are run by “innocent webmasters”. No information is provided that reveals how Google will determine if a site is an evil distribution domain or an innocent compromised site, or the repercussions of falling in either bucket.

Rest assured, however, that this distinction will be key moving forward. Google rarely discloses changes in policy on the Online Security Blog, and webmasters should be wary. If you do not have a service that monitors the status of your site as Google sees it, now is a good time to start. Make sure you don’t end up misclassified as a “distribution domain”; the results will likely be unfavorable.

Examples of the information provided to webmasters is below.

photo by Robert Scoble/flickr

Google Chrome Pwned by Vupen

Twitter Facebook

Read on VUPEN

Security researchers at VUPEN have defeated the Google Chrome browser’s sandbox.  In computing a sandbox is a tightly controlled set of resources that a guest program can access.   That’s how Chrome maintains security when running web code such as Javascript.  With a method to circumvent the sandbox, a malicious web page could execute arbitrary instructions on any Windows machine via Chrome.   The obvious criminal application would be to install software that allows the attackers remote access to the machine, turning it into a zombie.

Thus far the nature of the exploit is a secret, so malware kit makers probably haven’t been able to take advantage of it yet.  However, it is only  a matter of time until the specifics leak.  VUPEN informed several government clients of the exploits.  Can every one of those people be trusted to keep this confidential? Hopefully Google will issue a patch before the bad guys come out with a zero day exploit.

Read more: