How does a website infected by Google Attack?

As per our research following are the main reason to come Google Attack Page

First, it knows the files and their default locations of various FTP software, FileZilla, WS_FTP and many, many others. When users tell their software to save their logon credentials, it saves this information in a file on the computer. Then when you want to send an update to your website, the login information is already there.

The virus looks for these files, opens them, reads the information and then sends it to a server where it's used to login to the website with valid credentials. There's no need to "crack" the password. Which is why strong passwords aren't a defense in this case.

Second, the virus installs a keyboard logger. This variant is relatively new because earlier this year the hackers saw that everyone was telling people not to save their FTP username and passwords, so the hackers started installing keyboard loggers for those who type their passwords in each time. Same follow-through, the stolen information is sent to a server that infects the web site.

Third, the virus "sniffs" the FTP traffic leaving the PC. Since FTP transmits all data, including username and password, in plain text, it's easy for the virus to see the username and password, capture it, send it to a server and ... (you get the idea).

Fourth, and is the most recent, the virus will inject the malscript (the infectious iframe) into the FTP data stream as it leaves the user's PC. This latest variant is sneaky in that the website logs will show that FTP traffic originated from a valid source, with valid FTP credentials.


How to handle the Google Attack Page? The best way we have found to combat this is by following these steps:


  • 2 Users Found This Useful
Was this answer helpful?

Related Articles

 How to handle the Google Attack Page?

When you see the dreaded Google attack site warning, you should immediately submit a ticket. Be...

 How can I prevent hacking?

1. The most important thing to do is keep your passwords a secret. If you must give a password to...

 My account was hacked

If you are the victim of a hacker, immediately submit a ticket and our experts will investigate...

 What is INODES limit?

An inode is basically a file - so say you had 1,000 images, that'd be 1,000 inodes. Every file (a...

 How can I make a stronger password?

Password Selection It is important to have a password that is easy to remember, but hard to...