Hijacked Web Traffic For Sale 68
mask.of.sanity writes "If you can't create valuable content to attract users to your site, Russian cyber criminals will sell them to you. A web store has been discovered that sells hacked traffic that has been redirected from legitimate sites. Sellers inject hidden iframes into popular web sites and redirect the traffic to a nominated domain. Buyers purchase the traffic from the store to direct to their sites and the sellers get paid."
Re: (Score:1)
"Russian Hackers find a way to sell..."
Your Mom.
I have just two questions. Is she fit, and how much?
I'll visit your site, govnah. (Score:1)
Ten pence per page load!
Uhm... (Score:5, Informative)
Re: (Score:1)
I can't tell the difference, because I adblock and greasemonkey that shit into oblivion.
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
Re: (Score:2, Informative)
Isn't this what websites do all the time with ads, and Facebook and Google+ buttons? It's not like I personally agree to send my traffic to Facebook when the button shows up on a random webpage, and visiting all those ad servers incidentally just slows down my web browsing for no good reason.
This is different. In this case, It looks like the browser is redirected to the to the seller's domain. The "buttons" you refer to are just AJAX requests in the background.
what are you talking about? facebook "like" buttons are either scripts or iframes, and the script just adds an iframe after the fact, but in it all comes down to GET requests and cookies stealing information that do slow down browsing of sites. if you cannot see this perhaps it is time to get off dialup.
Re: (Score:1)
?
You only "send your traffic" to facebook, if you choose to click on the link to Facebook.
The "free" content you like to browse costs money to produce.
Re:Uhm... (Score:5, Informative)
?
You only "send your traffic" to facebook, if you choose to click on the link to Facebook.
Aaaaand, congratulations! You don't know how the Web works.
Whenever you see the "Like" facebook button, you browser has made several HTTP request to facebook and run facebook hosted scripts on your page. And if you're logged in to facebook on that computer, facebook has recorded the fact that YOU went to that page.
All of that without clicking on the button, courtesy of the website owner.
Re:Uhm... (Score:5, Interesting)
Very true. It's something that has bothered me for a while. I'd really rather not have Facebook and others tracking me all over the web, and yet, they usually do. Even while you're viewing this very page, there are icons for Twitter, Facebook, and Google which must be loaded from their site. IIRC, some of those ToS won't allow you to use their logo, so it has to come from their site. Even the website has a copy of the image, you still need to use their site for stats and other nifty functionality. In modern sites, that is almost always done by client side JavaScript which makes users send traffic to their site. All of that can be bypassed, but I don't know anybody who does for long.
I think that people would be truly shocked to find out how much information they are sending about themselves, and how many sites collect it that they are unaware of. Most of that comes because of an ignorance about how the web works. What makes it sad is that most of them don't care as long as they get to chat with friends on their Facebook page.</rant>
Re:Uhm... (Score:4, Insightful)
Even while you're viewing this very page, there are icons for Twitter, Facebook, and Google which must be loaded from their site
Actually, those images are loaded from http://a.fsdn.com/sd/commentshareicons.png [fsdn.com].
Tinfoil hat fail.
Yes, most of them don't care. I don't care either.
Re: (Score:2)
How about;
static.ak.fbcdn.net
apis.google.com
platform.twitter.com
and google-analytics.com ?
Re: (Score:2)
Well, I only checked the icons since he said they "must" be loaded from Facebook, etc.
Anyone who does care about such things could log out when they're not using those sites, or use a separate browser for social sites, or block those domains from being accessed when they're not on the relevant site, do some types of browsing via proxy, etc etc etc. If you don't want these guys collecting your information to make your advertisements (if you don't block them) more relevant, simply stop handing out the informa
Re: (Score:3)
How about;
static.ak.fbcdn.net
apis.google.com
platform.twitter.com
and google-analytics.com ?
Use Ghostery add-on (Firefox & Chromium), perhaps with RequestPolicy Firefox add-on.
Unrelated but I can't stand browsing without EasyGestures add-on for Firefox...
Re: (Score:3)
Re: (Score:1)
Just install Ghostery on your browser?
Very true. It's something that has bothered me for a while. I'd really rather not have Facebook and others tracking me all over the web, and yet, they usually do. Even while you're viewing this very page, there are icons for Twitter, Facebook, and Google which must be loaded from their site. IIRC, some of those ToS won't allow you to use their logo, so it has to come from their site. Even the website has a copy of the image, you still need to use their site for stats and other nifty functionality. In modern sites, that is almost always done by client side JavaScript which makes users send traffic to their site. All of that can be bypassed, but I don't know anybody who does for long.
I think that people would be truly shocked to find out how much information they are sending about themselves, and how many sites collect it that they are unaware of. Most of that comes because of an ignorance about how the web works. What makes it sad is that most of them don't care as long as they get to chat with friends on their Facebook page.</rant>
Re: (Score:2)
Re:Uhm... (Score:5, Informative)
You only "send your traffic" to facebook, if you choose to click on the link to Facebook.
?
Wrong. Many sites share information on their visitors to 3rd parties, this allows said 3rd parties to track and profile you. You do not have to click a link, it happens in the background.
Use this to find out who the main players are: http://www.ghostery.com/ [ghostery.com]
Ghostery sees the invisible web - tags, web bugs, pixels and beacons. Ghostery tracks the trackers and gives you a roll-call of the ad networks, behavioral data providers, web publishers, and other companies interested in your activity.
And obviously ad-block plus, NoScript at al...
Facebook specific:
https://addons.mozilla.org/en-US/firefox/addon/facebook-blocker/?src=userprofile [mozilla.org]
Re: (Score:2)
Re: (Score:3)
http://lifehacker.com/5542041/block-sites-from-using-your-facebook-login-with-adblock-plus [lifehacker.com]
Re: (Score:2)
http://sharemenot.cs.washington.edu/ [washington.edu]
This should block those iframes.
Re: (Score:2)
and visiting all those ad servers incidentally just slows down my web browsing for no good reason.
You don't use AdBlock [mozilla.org]? You'd be crazy to browse the web these days without AdBlock, NoScript, Flashblock and Ghostery. Unblock sites that you really care about if you must, but browsing without any protection is just nuts.
This is getting ridiculous (Score:3)
It also shows the complete failure of law-enforcement when it comes to commercial hacking.
Re: (Score:2)
Re: (Score:3)
The only one I can be sure about is mine ;-)
This is slashdot though, so I am fine with that.
The rest looks a bit like moronic cops failing to catch moronic criminals defrauding moronic companies to deviate business from moronic customers. The complete human tragedy rolled into it. Reminds me a bit of of the movie "Fargo".
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
It also shows the complete failure of law-enforcement when it comes to commercial hacking.
it also shows the braindeadness of site value assessment based on traffic.
AAA: Anti-Ajax-Argument (Score:2, Insightful)
Re: (Score:2)
iFrames != AJAX. I'd say they probably never even used AJAX, only a simple JavaScript redirect.
Re: (Score:2)
Re: (Score:1)
I always thought AJAX couldn't be done cross-domain, correct me if I'm wrong? (I don't do JavaScript very often)
Anyway, for me, the best solution is disabling JavaScript altogether using NoScript, and enabling on a per-domain basis. Call me paranoid...
Re:AAA: Anti-Ajax-Argument (Score:4, Informative)
You are correct. AJAX cannot be cross-domain.
There is however a catch, since a lots of libraries will allow you do do cross-domain "AJAX-like" request by adding a "SCRIPT" object to the page dynamically. You can't POST but you can GET fine with this method since the SCRIPT tag is cross domain.
AJAX-like = JSONP (Score:4, Informative)
https://en.wikipedia.org/wiki/JSONP [wikipedia.org]
https://en.wikipedia.org/wiki/Cross-Origin_Resource_Sharing [wikipedia.org]
who are they trying to fool? (Score:1)
OMG (Score:4, Funny)
1) There are hackers on the Internet
2) Foreign capitalists also engage in criminal activity
3) Noone cares about Australian click-throughs
Pay for bandwidth/hosting, AND for visitors (Score:3)
Re: (Score:1)
Whats the point?
Their account information and/or credit card information. Think phishing on a more ambitious scale.
I don't understand.... (Score:1)
Re:I don't understand.... (Score:4, Informative)
The iframe loads in a line of javascript which initiates a redirect to the target site. The user doesn't need to click on anything as the javascript will run automatically.
What this means in practice is that as soon as a user loads the page they will be redirected to the target site, probably so quickly that they don't realise. This is what makes it so dangerous as the user can be redirected to a page that is almost identical to the genuine one and then convinced to login to the site giving up their login or bank details etc.
Re: (Score:3)
Just because you, the end user, doesn't see something, doesn't mean that you aren't actively engaging it. Everytime you open a web page, your browser usually makes several requests to retrieve stylesheets, scripts, and every image on the page. There is nothing that requires those items to come from the site you think they do. If a rogue script is there, then it gets on your computer and likely has all the permission that you've allowed for the page you're on, possibly including cookie information. Also, a s
Ancient news (Score:3)
Not sure why this is suddenly news, the Russian iframe traffic hubs have been running for over a decade now.
The destination URLs are typically clickfraud, exploits, and iframes to other traffic redirectors.
The domain registrar mentioned in the article (DirectI) is notorious for high levels of abuse from the Russian-language sploit/AWM community.
Coincidence? (Score:1)
I wrote about this in 2003.. (Score:2)