Home Internet Security Report: Bing Surpasses Google in Having Malware-Laced and Spam Search Results

Report: Bing Surpasses Google in Having Malware-Laced and Spam Search Results

Posted: October 11, 2012

It has been estimated in a recent Sophos Security study that nearly two-thirds of search results on Bing are found to have links that spread spam or malware. When compared with the search engine giant Google, which only accounts for 30 percent of links that spread spam or malware, Bing clearly leads the search engine pack for malware-laced search results.

What has become an epidemic over the course of the past few years, is the efforts of hackers to poison search engine results. This crafty game played well by cybercrooks, is an effort of combining sophisticated SEO (Search Engine Optimization) techniques with either hacked sites or ones created specifically for spreading malware. Popular new stories are always prime real estate on search engine results for search engine poisoning.

In Sophos' latest efforts to test their own 'web appliance' for poisoned searches used to drive traffic to sites designed to extort money from unsuspecting computer users, they are able to track down search engine redirects. Contrary to Sophos' findings of Bing being responsible for nearly two-thirds of search results having links spreading malware or spam, Microsoft exclaimed "signals that have been previously spammed now have countermeasures to prevent abuse. Bing has also developed several ranking signals to help weed out spam results and better understand the intent of the searcher. We are always looking to improve the Bing user experience for customers, and remain dedicated to providing a trusted and reliable search experience."

From data collected by Sophos, they were able to determine that attackers were most successful by poisoning image search results. The chart below, Figure 1, is compiled from Sophos' data clearly showing how text results are filtered more so than image results. The percentage of search results poisoning is happening more so among image searches, about 92% in total, over a small 8% of text results.

Figure 1. Sophos Security percent of image vs text poisoned search results
sophos percent malware search engine results

The Pew Research Center's Internet & American Life Project estimates that 91% of Internet users utilize a search engine, which is only surpassed by 92% rate of Internet users using it for sending or reading email, as demonstrated in the Internet user's activity chart below (Figure 2). It would only make sense for online attackers and cybercrooks to focus their efforts on poisoning search engine results whenever possible. Even though Bing is not as widely used as Google (second place to Google), there is enough 'virtual' business for hackers where their malicious actions are not in vein. You may be asking yourself, how can you protect yourself and limit the amount of poisoned search engine results that come your way? Below we have 5 simple tips that you may use to reduce your chances of loading a malicious or spammy site from poisoned search results.

Figure 2. Pew Research % of internet users activity report chart
pew research percent internet users

Top 5 Tips for Safer Surfing to Combat Search Engine Poisoning

  • Be cautions of pop-ups and banner ads that copy legitimate security applications. Do not click on these types of advertisements.
  • Never accept or open error displays while inside of a web browser application. Opening or clicking 'Accept' or 'OK' on such display pop-ups may lead to the installation of rogue security programs.
  • Critique and scrutinize search engine results at all times. If something looks the least bit out of place, do not click on it. Move on to the next search result.
  • Completely log out of websites when you complete a session. It is important to log out of accounts or sessions when you no longer need them to reduce the changes of results hijacking an open session. Additionally, many sites will verify with a message that you have been logged out.
  • Regularly review your financial accounts or credit cards for unapproved activity. The first sign of being a victim of a crafty malware attack are debits or transactions on your banking or credit card account that you did not authorize.
    Loading...