FutureFive New Zealand - Consumer technology news & reviews from the future
Story image
Cybercrims ready to ride Google's Wave
Mon, 12th Oct 2009
FYI, this story is more than a year old

A leading security company has warned that cybercriminals are ready to exploit Google’s latest technology.As interest in Google's Wave technology - the online giant's successor to old-fashioned email - peaks, so hackers and scammers will inevitably ride the coat tails of Wave Web searches and attempt to divert Internet users to malicious and infected sites, says Imperva, the data security specialist."Reports are already coming in of criminal hackers poisoning Google search results and you can expect similar scams to be pulled by hackers intent on routing Internet users to infected Web sites," said Amichai Shulman, Imperva's chief technology officer."This will almost certainly be achieved by hacking into large numbers of Web servers and injecting malware references into the system. The process will be automated using botnets, which will target SQL injection vulnerabilities in Web applications," he added.According to Shulman, the irony of this type of attack is that, in order to work out which servers to target, the hackers will probably use Google to search them out.The second stage of the attack methodology is to promote pages infected with malware by hacking into Web applications - which are mostly PHP-driven - and creating a revised index that includes link to the malware-infested pages.The problem facing the Internet industry, Shulman explains, is that, although companies tend to dismiss the chance of their applications being hacked due to a lack of public interest, this is not going to be the case with Google Wave search infections."Contemporary hacking campaigns are highly sophisticated and are engineered to select popular search terms on Google, and infect every possible related vulnerable target," he said."The net result of this is that, although Google itself is relatively impervious to hacking attacks, the weaknesses of ancillary Web search result supporting technologies makes it possible to subvert user clickthroughs to land on infected pages," he added.