Torrent sites are infiltrating Google Search with some crafty SEO hacks

Google Looker Studio is being abused to boost malicious sites

When you purchase through links on our site, we may earn an affiliate commission.Here’s how it works.

Cybercriminals are hackingGoogleLooker Studio to place their malicious websites high on the search engine’s results pages, promoting spam, pirated content, and torrents.

The campaign uses a technique known asSEOpoisoning. This method uses legitimate website copy and fills it with links leading to these malicious sites. In the eyes of Google’s search engine algorithm, the links give the spam sites enough credibility for the tool to rank them high for specific keywords.

This specific attack uses Google’s datastudio.google.com subdomain.

Fake blockbuster movie downloads

Fake blockbuster movie downloads

BleepingComputersays it found multiple pages of Google search results “flooded with datastudio.google.com links”, after being tipped off by a concerned reader. The links don’t lead to an actual Google Data Studio project, but rather to websites hosting pirated content, such as current blockbuster movies (Black Adam, Black Panther: Wakanda Forever, and similar).

Before actually landing on these pages, the victims will first be redirected a couple of times, as well.

Here’s another good reason not to download pirated software>This evil dropper infects you with a dozen malware strains at the same time>Here’s our rundown of the best malware protection solutions around

SEOpoisoning is a known method, often used by threat actors to improve their chances of landing malware onto moreendpoints.

Most of the time, SEO poisoning is used to push torrent sites high on Google’s results pages for queries such as commercial software, the latest movies, or computer games. Consumers looking to save a few dollars on software and games sometimes go on shady sites promising cracks and activators which would enable them to use the products without paying for the license.

Are you a pro? Subscribe to our newsletter

Are you a pro? Subscribe to our newsletter

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

Most of the time, the activators and cracks don’t really work as advertised, and all they do is distribute viruses, or malware. These malicious programs are capable of wreaking all kinds of havoc, from installing cryptocurrency miners, to stealing sensitive data, to deploying ransomware and rendering the devices completely useless.

Via:BleepingComputer

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

7 myths about email security everyone should stop believing

Best Usenet client of 2024

Your doctor may have an AI assistant taking notes during your next Zoom call