Google Detects 9500 Malicious Sites Per Day 69
An anonymous reader writes "Five years after it was first introduced, Google's Safe Browsing program continues to provide a service to the 600 million Chrome, Firefox, and Safari users, as well as those searching for content through the company's eponymous search engine. According to Google Security Team member Niels Provos, the program detects about 9,500 new malicious websites and pops up several million warnings every day to Internet users. Once a site has been cleaned up, the warning is lifted. They provide malware warnings for about 300 thousand downloads per day through their download protection service for Chrome."
How accurate is this? (Score:1)
Re:How accurate is this? (Score:5, Informative)
Re: (Score:2)
Well for starters it's open source [google.com] so you can see for yourself.
I'd guess that the malware detection is actually performed by servers at Google. That would make more sense (to me, anyway) than trying to embed the code in the browsers where malware authors can examine it, and where updates require a browser release.
Re: (Score:2)
Well for starters it's open source [google.com] so you can see for yourself.
I'd guess that the malware detection is actually performed by servers at Google. That would make more sense (to me, anyway) than trying to embed the code in the browsers where malware authors can examine it, and where updates require a browser release.
Er, I guess I should have clicked your link before shooting my mouth off, rather than after :-)
Re: (Score:3)
Well for starters it's open source [google.com] so you can see for yourself.
I'd guess that the malware detection is actually performed by servers at Google. That would make more sense (to me, anyway) than trying to embed the code in the browsers where malware authors can examine it, and where updates require a browser release.
Er, I guess I should have clicked your link before shooting my mouth off, rather than after :-)
Er, I guess I should have read the code at the link you provided before correcting myself... since it appears that it does indeed connect to "safe browser servers" at Google.
I think I'll just shut up now, even if further perusal shows this comment to be wrong as well.
Re: (Score:2)
Re: (Score:1)
LOL? Well for starters that's the client side stuff. And this gets derped up to +5 informative? Holy crap haha.... if your comment was tongue in cheek, I salute you. Otherwise, let me just slowly back up and then run like fuck.
Re: (Score:3)
Re: (Score:2)
Please read a little deeper:
https://code.google.com/p/google-safe-browsing/wiki/SafeBrowsingDesign [google.com]
Re: (Score:3)
Accuracy can be hit or miss. A lot of people in the translation communty use tools like chiitrans, chiitrans2, Translation Aggregator(TA) and agth. Google reguarlly flags sites with these as malware and specifically mentions these as malware, when they're no such thing. They also regularly flag mentions of RPG maker 2k(JP) [famitsu.com] as malware. To me it seems more like the engine is looking for anything that injects or hooks, which chiitrans, TA and agth do. Or non-standard character sets which the old RPG maker
Re: (Score:1)
After digging around a little I did not find much useful knowledge about the accuracy and how it works.
Well according to one user named AnonymousCoward it has to use MyCleanCP(spelling). He went on saying it was the only one that would work.
Re: (Score:1)
The plural of anecdote is not data. Since anecdote is all I have to offer, here goes: I occasionally run into its malware warnings, most, in fact all in recent memory, for some site I know for a fact has no ill intentions, though malicious adverts might always slip through, of course. What irks me most about those warnings isn't even the indiscriminate false positives, but much more the lack of detail as to just what was found to be suspicious. I for me would be much safer knowing exactly what the problem w
Re: (Score:1)
After digging around a little I did not find much useful knowledge about the accuracy and how it works.
I just put one of my domains online yesterday. It's OK now but the first couple of time I tried to access it I got one of those "This site could be dangerous to your computer" banners. I wonder if Google needs to crawl the site before it blesses it as safe.
Malicious? (Score:4, Funny)
Does Google include *.gov?
Re: (Score:2)
Is your name so uncommon that it matters?
Do you look that much like this thug?
Re: (Score:2)
You might want to mention that when applying for jobs then.
Re: (Score:2)
Would you really want to work for someone so stupid they don't realize two people can have the same name? You could also tell them ahead of time it's not you in the mugshot. What would you have to lose? It might even help them remember you.
Re: (Score:2)
Re: (Score:1)
"fucking"
Re: (Score:1)
going to that site, I see
"[name], [job], arrested for alleged embezzlement, report says"
Seriously, what the fuck is this shit? What kind of nazi would defend it?
Re: (Score:2)
"Extortion"? Really? Unless mugshots.com is actually claiming you are that person, it has nothing whatsoever to do with you. People googling your name who are too stupid to realize multiple people can have the same name... well, I probably wouldn't want anything to do with them anyways.
And it can't even be extortion unless they are threatening to release the name unless you pay them money. They aren't, are they? No? Than welcome to the Internet, where 10,000 people have the exact same name as you.
Re: (Score:2)
Detects malicious websites, but allows mugshots.com to end up at the top of search results. My own site (with a myfullname.com), my twitter page, my linkedin profile, etc., etc., etc. are all now listed after a mugshots.com page for someone else with the exact same name as me. Mugshots.com is nothing but an extortion attempt. And I get to suffer because someone thug has the same name I do.
Anyone named Anonymous Coward is going to be taunted from grade school onward. Either that or he learns to fight.
Just stop hosting it! (Score:1)
Do a search in Google for - https://docs.google.com/a/njit.edu/spreadsheet/viewform?formkey=dEdpR1lrTjZPenFtY3BkS1l3UF9VWHc6MQ
hmmm, no flags...
or how about https://docs.google.com/spreadsheet/viewform?formkey=dEZfZjkwa0FxYmRRbzFvend5ODhhX2c6MQ
oh, it's in Phishtank as 100% verified (and yes, Google gets reports from Phishtank), but has Google taken it down? NO.
Geniuses would have this down programmatically. Google only does enou
Re: (Score:1)
Yes, it has been clicked on many times, and reported to many contacts @Google. Their abuse was de-centralized many moons ago down to the product level, and it's been a mess ever since.
Does it take a genius to remove phish and malware reported to Safe Browser when they are hosted on blogspot and google docs? Nope.
Re: (Score:3)
Re: (Score:2)
Somehow, I think if someone sees a form purporting to be from either Yahoo or Microsoft, but says right on it "Powered by Google Docs," and they still go ahead and enter their information, then they're stupid enough that they'll give away their information anyway at some point, so it doesn't make much difference if this stays up or not.
Incidentally, I did get a warning on the second one.
Re: (Score:2)
Re: (Score:2)
Re: (Score:3)
Impressive numbers? (Score:2)
"Five years after it was first introduced, Google's Safe Browsing program continues to provide a service to the 600 million Chrome, Firefox, and Safari users"
Is that 600 million users served over the five-year span? Or the total number of users on Chrome, Firefox and Safari that we have now? 600 million is just a little under 9% of the world's population.
Impressive numbers, in any case.
Phishing site hotspots (Score:4, Interesting)
This [blogspot.com] image from Google's blog post [blogspot.co.uk] shows that majority of the phishing sites are hosted in the US. Interestingly, most of Africa is relatively "clean", except for Algeria and South Africa.
Re: (Score:1)
That is deceiftful and doesn't tell the whole picture.
The malware is not developed here. It is just America has lots and lots of old servers running unpatched wordpress, apache, and linux software full of vulnerabilities. Many slashdotters are under the impression most malware is still installed by a user clicking something and the problem is always between the monitor and keyboard and also that Linux is 100% safe and only IIS gets infected etc.
Most bad sites are legit and just get hacked and crackers inser
Re: (Score:2)
If you used Windows without AV software guess what? You are owned if you visited slashdot in late february or early march.
That's almost as vague as Google's warnings. Did the malware in this case target IE? Firefox? Chrome? Flash player? Java?
Did it rely on a zero-day exploit? Or something that you just hadn't got around to patching?
I haven't run A/V for somewhere around a decade. I've never been infected. I visit /. on a regular basis, including the time in question. Obviously your blanket warning isn't accurate.
Re: (Score:2)
I haven't run A/V for somewhere around a decade. I've never been infected.
That you know of.
Re: (Score:2)
True, but he likely does run noscript and an ad blocker.
Re: (Score:2)
Why does everyone think the only way to know if you're infected is to run some resource-sucking A/V software?
How do you think A/V companies know to add something to their definitions? Does it have to show an infection in an antivirus scan?
Maybe the fact that I don't get falsely complacent by running A/V software, means that when the A/V companies miss something like Flame for two years then I'd know about it on my machine before the AV warning, because I wouldn't be thinking "My A/V software shows nothing,
Re: (Score:2)
Why does everyone think the only way to know if you're infected is to run some resource-sucking A/V software?
Because with well-written malware it is the only way to know, unless you routinely snapshot your system and do off-line verifications that your system files have not been modified.
How do you think A/V companies know to add something to their definitions?
There are many ways malware is discovered initially. It depends on the type of malware and the infection vector.
Maybe the fact that I don't get falsely complacent by running A/V software, means that when the A/V companies miss something like Flame for two years then I'd know about it on my machine before the AV warning, because I wouldn't be thinking "My A/V software shows nothing, so I'm not infected."
No one (well, not me anyway) is claiming that A/V software never gives false negatives. But not having A/V software gives a lot more false negatives.
Re: (Score:2)
Why does everyone think the only way to know if you're infected is to run some resource-sucking A/V software?
Because with well-written malware it is the only way to know, unless you routinely snapshot your system and do off-line verifications that your system files have not been modified.
Which is essentially what I do, thanks to a security project I've been working on for a few years.
Besides, with well-written malware, even A/V software can't tell you're infected without an offline scan.
Re: (Score:2)
Re: (Score:2)
I think I quite clearly said _I_ don't run antivirus. There was no implication that it was a good idea for others; at least, I didn't mean it. If you took it that way, then maybe I need to be more careful how I word that statement.
Re: (Score:1)
It was a faulty ad using a flash exploit. If you didnt run flashblock your system got owned. If you hate av software you can download a free scanner from Kaspersky that doesnt effect your system or use malware bytes from filehippo. You need to run AV software in this day and age. Modern av software like avast doesnt slow your system down
Re: (Score:2)
Ok, so it was a flash exploit. That still doesn't say whether it was zero day or not. If it wasn't, then you were unpatched, and I wasn't, and I'd be safe. If it was zero-day, I was doing a lot of experimenting with Chrome at that point, which has sandboxed flash since at least 2010, meaning I'd still be safe. All without flashblock.
And incidentally, _all_ antivirus software slows your system down. Unless it's magic, it takes processing time to scan every file you open, meaning there's less processor ti
Re: (Score:1)
Well do not take this the wrong way or anything but if you do not run any AV software how do I know that your credible saying it doesn't slow your computer that much if you do not use it?
True Norton 360 and McCrappy circa 2006 was a total POS but that doesn;t mean they all are. Avast added only 3 second of bootup time to my computer and that is it and well worth it. Sandboxing slows your computer down. Anything besides DOS or pure assembly slow your computer down. I stand by my words when I say a go
Re: (Score:2)
Boot time isn't the only way your computer can be slowed.
And we still don't know if it was a zero-day exploit or not. For that matter, we don't know if it would have even infected you.
Did you know that Avast's web shield doesn't know if you're vulnerable to the exploit or not? It simply warns you when it sees a malicious file, even if you don't have the vulnerable plugin. Just because it blocked something doesn't mean you would have been infected without A/V.
Re: (Score:2)
And Antarctica is hosting zero phishing sites...
It's over 9000! (Score:2)
(no text)
Re: (Score:2)
That's almost 10000!
Tool for webmasters? (Score:2)
Is there a place where we can put our domain names and our emails, so that Google can contact us when they detect something on our websites?
Google needs to clean up their own act first. (Score:3)
Here's our current list of major domains being exploited by active phishing scams. [sitetruth.com] Notice who's at the top of the list. Google.
We've been generating that list for years. It's based on PhishTank data, updated every 3 hours, and uses Open Directory to decide if a site is "major". 46 domains are on the list today. 9 have been on the list since 2011 or earlier. One has been on the list since 2010 - Google. Google is the last free hosting service unable to clean up their phishing problem. MSN, Yahoo, and various free hosting services have been successful at aggressively cleaning up phishing problems, and haven't been on this list, other than briefly, for years.
Here's the oldest phishing attack hosted by Google, up since 2010 [google.com]: "Free Habbo Coins. Email your username and password to..."
For years, Google didn't realize that Google Spreadsheets could be used to host phishing sites. [phishtank.com] They finally caught on, and there's now a "report abuse" button on spreadsheets. Most, but not all, of the spreadsheet-hosted phishing sites have been taken down.
If anybody from Google is reading this, go over to your abuse department and apply a clue stick. It should embarrass someone that Google is the most clueless free hosting provider in the world about phishing.
Re: (Score:2)
I wonder though... (Score:2)