Google has introduced a new piece of logic into their indexing engine, which detects malware embedded within websites. If your website has been compromised, which I’ll explain what ‘compromised’ means later, then you will see “This site may harm your computer” when you search Google for your website.
Within this article we will discuss
- What does it mean to have a compromised website
- How does a compromise occur
- How to resolve this issue
- How to I work with Google to remove the “This site may harm your computer” link
What does it mean to have a compromised website?
Recently we had a client call us with this concern. Several of his clients contacted him and said that when they searched for his website on Google, they were presented with a link under the title of the result page that said “This site may harm your computer”. The result looked just like this:
How did this happen?
In this case, it is easy to look at the result of the attack and work backward toward how the attack occurred. Here is what we know;
- The attacker placed the following line of code on a website file:
width=180 height=111 style="visibility: hidden"></iframe>
- After consulting with the client, who had FTP access, we knew that he was not responsible for uploading a file containing this information
- We noted the date of the modified file on the file system 6/10/2009 @ 2:08am CST
- We then looked at the FTP log files to understand what happened on the 10th at 2:08am.
- The log file outlined that every page on the site was overwritten, status 226, on or around 2:08am
- The account used to access the server was a valid FTP account.
Based on this information, and a few other things that we collected from the client, we are 99% sure that the client’s computer was infected by a ‘keylogger’ program. A ‘keylogger’ does exactly what it sounds like, it logs all of the keystrokes you make on your computer, and oftentimes, transmits the data to a computer outside of your network, which is then accessed by the hacker.
To test our ‘keylogger’ theory, we connected a dummy system to the infected website and sure enough, we were infected with a keylogger.
How do I resolve this issue?
If you are the hosting company – you should know what to do. Reset the FTP account password, remove ‘any’ access to port 21 on your firewall and begin restricting access by IP or VPN.
If you are the client – your computer, and potentially your network is infected with a keylogger program. Our suggestion is that you complete the following steps immediately.
- If you do online banking, call your bank immediately to have your account credentials changed
- If you have purchased anything online recently, call your credit card companies and have them reissue you a new card.
- If you have provided any websites significant information about your identity, contact an identity theft company
Once you have completed the steps above, you now have to remove the keylogger program from your system. We recommend using AVAST, found at http://www.avast.com/, there are several types of software like this out on the internet. Run a full scan of your system and remove all of the infected files. Moving forward, you should run these types of programs constantly and conduct full system/network scan on a routine basis.
How to I work with Google to remove the “This site may harm your computer” link