Home > slashdot > Doorways Sneak To Non-Default Ports of Hacked Servers

Doorways Sneak To Non-Default Ports of Hacked Servers

December 4th, 2010 12:55 admin Leave a comment Go to comments

UnmaskParasites writes “To drive traffic to their online stores, software pirates hack reputable legitimate websites injecting hidden spammy links and creating doorway pages. Google’s search results are seriously poisoned by such doorways. Negligence of webmasters of compromised sites makes this scheme viable — doorways remain unnoticed for years. Not so long ago, hackers began to re-configure Apache on compromised servers to make them serve doorway pages off of non-default ports, still taking advantage of using established domain names.”

Source: Doorways Sneak To Non-Default Ports of Hacked Servers

Related Articles:

  1. Two FreeBSD Project Servers Hacked
  2. Backdoor Targeting Apache Servers Spreads To Nginx, Lighttpd
  3. Backdoor Targeting Apache Servers Spreads To Nginx, Lighttpd
  4. Backdoor Targeting Apache Servers Spreads To Nginx, Lighttpd
  5. Backdoor Targeting Apache Servers Spreads To Nginx, Lighttpd
blog comments powered by Disqus