Unmasking Hackers

3,433,815 Victims Uncovered

Unmasking Hackers

3,433,815 Victims Uncovered



Why Suffer so hackers can thrive?

We help sites protect themselves from being the victim of villains trying to manipulate search engine result rankings at their expense. We use algorithms, machine learning, and Artificial Intelligence (AI) to identify, group, and stop parasitic behavior. Why would anyone give away their ability to rank in Google to these villains?

Should Your Site Promote Adult Content Also?

We reverse engineered three escort service sites, identified how they’re being promoted, and discovered questionable affiliations. A majority of infected sites have zero knowledge of their implied promotion, attrition rates of correction, or understanding of the cost being absorbed by their online entity.

Business - 9 Sites HACKED

  1. McAfee.com
  2. Fedex.com
  3. Intel.com
  4. Dodge.com
  5. Dictionary.com
  6. LATimes.com
  7. Panasonic.jp
  8. TrustedSite.com
  9. Brother.com

Government - 21 Sites HACKED


  1. BTS.gov – Bureau of Transportation Statistics
  2. DOT.gov – Department of Transportation
  3. FAA.gov – Federal Aviation Administration
  4. HRU.gov – Federal Human Resource Training
  5. JUVENILECOUNCIL.gov – Juvenile Justice and Delinquency Prevention
  6. LOC.gov – Library of Congress
  7. NASA.gov – National Aeronautics and Space Administration
  8. NIH.gov – National Institutes of Health
  9. NOAA.gov – National Oceanic and Atmospheric Administration
  10. RESEARCH.gov – National Science Foundation
  11. SAMHSA.gov – Substance Abuse and Mental Health Services Administration
  12. SENATE.gov – United States Senate
  13. WEATHER.gov – National Weather Service


  1. CA.gov – State of California
  2. KS.gov – State of Kansas
  3. KY.gov – State of Kentucky
  4. MT.gov – State of Montana
  5. ND.gov – State of North Dakota
  6. PA.gov – State of  Pennsylvania
  7. TXDOT.gov – State of Texas Department of Transportation
  8. WI.gov – State of Wisconsin

Search Engines - 154 Sites HACKED

  1. Baidu.com
  2. Google.ac
  3. Google.ad
  4. Google.ae
  5. Google.al
  6. Google.am
  7. Google.as
  8. Google.at
  9. Google.az
  10. Google.ba
  11. Google.be
  12. Google.bf
  13. Google.bg
  14. Google.bi
  15. Google.bj
  16. Google.bs
  17. Google.bt
  18. Google.by
  19. Google.ca
  20. Google.cd
  21. Google.cf
  22. Google.ci
  23. Google.ch
  24. Google.cl
  25. Google.co.ao
  26. Google.co.bw
  27. Google.co.ck
  28. Google.co.id
  29. Google.co.il
  30. Google.co.in
  31. Google.co.jp
  32. Google.co.kr
  33. Google.co.ls
  34. Google.co.ma
  35. Google.co.nz
  36. Google.co.th
  37. Google.co.tz
  38. Google.co.ug
  39. Google.co.uk
  40. Google.co.uz
  41. Google.co.vi
  42. Google.co.za
  43. Google.com.af
  44. Google.com.ag
  45. Google.com.ar
  46. Google.com.au
  47. Google.com.bo
  48. Google.com.br
  49. Google.com.bz
  50. Google.com.co
  51. Google.com.cu
  52. Google.com.cy
  53. Google.com.do
  54. Google.com.ec
  55. Google.com.eg
  56. Google.com.et
  57. Google.com.fj
  58. Google.com.gh
  59. Google.com.hk
  60. Google.com.jm
  61. Google.com.kh
  62. Google.com.lb
  63. Google.com.ly
  64. Google.com.mg
  65. Google.com.mt
  66. Google.com.mx
  67. Google.com.na
  68. Google.com.nf
  69. Google.com.ng
  70. Google.com.ni
  71. Google.com.om
  72. Google.com.pe
  73. Google.com.pg
  74. Google.com.ph
  75. Google.com.pk
  76. Google.com.pr
  77. Google.com.py
  78. Google.com.sa
  79. Google.com.sb
  80. Google.com.sg
  81. Google.com.sv
  82. Google.com.tj
  83. Google.com.tr
  84. Google.com.tw
  85. Google.com.ua
  86. Google.com.uy
  87. Google.com.vc
  88. Google.com.vn
  89. Google.cv
  90. Google.cz
  91. Google.de
  92. Google.dk
  93. Google.dm
  94. Google.dz
  95. Google.ee
  96. Google.es
  97. Google.fi
  98. Google.fm
  99. Google.ga
  100. Google.ge
  101. Google.gl
  102. Google.gm
  103. Google.gp
  104. Google.gr
  105. Google.gy
  106. Google.hn
  107. Google.hr
  108. Google.ht
  109. Google.hu
  110. Google.ie
  111. Google.im
  112. Google.iq
  113. Google.is
  114. Google.it
  115. Google.jo
  116. Google.kg
  117. Google.ki
  118. Google.kz
  119. Google.li
  120. Google.lk
  121. Google.lt
  122. Google.lu
  123. Google.lv
  124. Google.me
  125. Google.mg
  126. Google.mk
  127. Google.ml
  128. Google.mn
  129. Google.ms
  130. Google.mu
  131. Google.mw
  132. Google.ne
  133. Google.nl
  134. Google.no
  135. Google.nr
  136. Google.nu
  137. Google.pl
  138. Google.ps
  139. Google.pt
  140. Google.ro
  141. Google.rs
  142. Google.ru
  143. Google.se
  144. Google.sh
  145. Google.si
  146. Google.sk
  147. Google.sn
  148. Google.sr
  149. Google.st
  150. Google.tg
  151. Google.tk
  152. Google.tm
  153. Google.vu
  154. Yahoo.com

Education - 37 Sites HACKED

  1. BGSU.edu
  2. ChicagoBooth.edu
  3. CSHL.edu
  4. Drake.edu
  5. GATech.edu
  6. Harvard.edu
  7. Hiram.edu
  8. Hudson.edu
  9. MSU.edu
  10. Mass.edu
  11. Monroe.edu
  12. Montana.edu
  13. NCCU.edu
  14. Northeastern.edu
  15. Northshore.edu
  16. Northwestern.edu
  17. ODU.edu
  18. OHR.edu
  19. OKState.edu
  20. Ozarks.edu
  21. SMCCD.edu
  22. SMU.edu
  23. UC.edu
  24. UCSD.edu
  25. UCSC.edu
  26. UGA.edu
  27. UIllinois.edu
  28. UMD.edu
  29. UMHelena.edu
  30. UNM.edu
  31. USC.edu
  32. UTK.edu
  33. UWW.edu
  34. Washington.edu
  35. WJU.edu
  36. WUSTL.edu
  37. YNA.edu


We identify “Victim” sites as being exploited with placement of external links on their site to manipulate search engine algorithms. Using algorithms, machine learning, and Artificial Intelligence (AI) we follow the bad guys “Villains” around and compile a list of sites being exploited which we refer to as “Victims”.


Sites Monitored

Number of “Victim” sites currently tracked compromised by Villains. Compromised sites are defined as having content embedded by third parties unbeknownst to themselves.

> Victim Categories


Average Stolen Links

Average number of Villain embedded links on Victim sites. Embedded content is an attempt by Villain sites to steal “Google Juice” from Victim sites to boost their search rankings.

> Where Are Exploits?

125 : 1

Hacks vs. Site Page Ratio

Ratio between Villain embedded links and Victim website pages. Frequently hacked pages contain 1,000s of links towards Villain sites which increases over time.

> Why So High?

How Do We Find So Many Hacks?

Sorting through billions of sites to identify Villains and Victims could require a gargantuan amount of processing, storage, and filtering. Our machine learning logic dynamically creates algorithms that find Victims and Villains better with every iteration, minimize overhead, and maximize prioritization (all while we sleep).

Villain Clustering

Every Villain we identify provides a blueprint that our algorithms use to build additional associations.

> Villain Alerts

Victim Ranking

Using multiple dimensions our algorithms determine damage scope and rank among other Victims.

> Victim Alerts

Exploit Trending

Comparing the rate of new sites hacked vs. cleaned sites our algorithms change their monitoring.

> Trend Alerts

Does Google Expand Hacked Definition?

Google provides descriptions of the types of hacks, how to identify if you’re a victim, and the next steps to correct the intrusion within your website’s presence. Our team uses the tips provided by Google to ensure your site doesn’t wander into areas that inhibit your ability to rank well within their search engines.

Can You Fix My Hacked Site?

We recommend following a process which includes: verifying the problem, exploring corrective options, and executing a solution. Within this process is a core requirement to deal with a firm who will do what, when, and how their services are conveyed across: price, duration, and guarantee of satisfaction.

Verify Problems

We provide samples of exploited site areas being compromised before we engage.

> Request Samples

Compare Options

Our process defines the timing, cost, and guarantee for every aspect of our services.

> View Pricing

Execute Solutions

Secure the exploited areas on your site today. Our team can rectify your situation in 2 Hrs on average.

> Get Started


We identify “Villain” sites as those who manipulate search engine algorithms by placing external links on exploited sites. Initially, we began with 2,000 Villain sites compromising a single Victim, created logic to find common behavior, and currently spot exploits at an exponential rate of growth.


Sites Monitored

Number of Villain sites compromising sites to enhance search results rankings. Compromised sites are defined as having content embedded by third parties without their knowledge.

> Villain Categories


Average Stolen Victim Links

Average number of links pointing towards Villains at cost of Victims. Embedded links towards Villain sites represent an attempt to manipulate search engine rankings.

> Why Sites Exploited?

9 : 1

New vs. Fixed Link Ratio

Ratio of new sites compromised by Villains vs. Victim sites cleaned during a single month on average. Exploited sites continue to grow and Villains realize this disparity as an advantage.

> Why So Fast?

How Was Your Site Hacked?

Obtaining an understanding of “How?” in site security concerns should follow a path that achieves realization towards “Why?”, “Who?”, and “Where?”. Determining these three elements will provide a snapshot of “How?” regardless of the depth or severity of the compromise exploited by hackers upon your online presence.


Reasons hackers exploit sites include: monetary gain, activism, ego, chaos, revenge, and information theft.

> Derive Intention


Understanding “Why” narrows the list of culpable entities responsible for your site’s hack.

> Determine Identity


Hackers can target single or global elements, but both used a compromised security doorway.

> Discover Doorway

Are Sites Hacked and Penalized Frequently?

The number of sites exploited daily and also blacklisted by search engines due to embedded malware, questionable linking characteristics, and malicious techniques aimed at manipulating search engine results grows exponentially due to the benefit derived from these exploits.


Sites Hacked Daily *


Sites Blacklisted Daily *

What’s Cost of Being Hacked?

Hacker theft of information including: customer, billing, or corporate data can quickly cost any / all organizations considerable resources to correct. Large, medium, and small organizations each have different levels of concern across multiple dimensions, but they all share a common goal when their site is hacked.


Small Businesses *


Small Business Closures *


Large Businesses *

Will Google Penalize Sites Hacked?

Google’s standards for quality represent expectations of a positive user experience that drive your search engine rankings, inclusion within search results, and ultimately your conversion rates for your products and services. Verifying your site’s compliance of these topics will improve your success, risk, and user experience.

  • User-generated spam

    Allowing unapproved content on your site can quickly result in receiving penalties by search engines for your entire site.

  • Hidden text and links

    Search engines look code vs. users who see the presentation layer and intentionally hidden content is a problem.

  • Link schemes

    Links act as votes of popularity manipulated by hackers to improve their search engine rankings using tiered structures.

  • Irrelevant keywords

    Hacked content frequently includes irrelevant keywords to your site’s context attempting to manipulate search engines.

  • Sneaky redirects

    Redirects that occur for users, but not search engines are an attempt to hide or promote hacked content on your site.

  • Cloaking

    Presenting one version of a page for users and another for search engines can quickly result in your site being blacklisted.

  • Ways to prevent comment spam

    Protect your site from hacked content by limiting access to embed content, moderate submissions, and monitor your site.

  • Scraped content

    Hackers frequently use auto-generated content to promote themselves using common strings placed on millions of sites.

  • Doorway pages

    Compromised pages with similar hacker content on your site appear as platforms to funnel users to hacked sites.

  • Affiliate programs

    Hackers frequently monetize their activities using affiliate networks with embedded links placed on unsuspecting sites.

  • Quality Guidelines Index

    Find all of the quality guidelines using this index page to ensure your site is providing the expected user experience.

How Does Perception Change After a Hack?

Indirect damages incurred from a data breach can touch every facet of your organization’s ability to succeed, which was recently highlighted in a study conducted by the Ponemon Institute, that reveals the depth of damage that can occur concurrently across customers, confidence, and your reputation.


Customers Lost


Confidence Lost


Reputation Lost

Do Hackers Cluck Around?

Software which allows hackers to efficiently, effectively, and quickly compromise your online presence is cheap, automated, and vicious on every front. The depth of techniques available to compromise sites is used by a collective group of users that: test, improve, and utilize the functionality within.


Ave. Hacker Software Cost


Vulnerabilities Targeted


Milliseconds per Hacked Link


Success Bypassing Captchas

Not Happy?

Get a running start, flap your wings, and do your funky chicken to set a distance record for unassisted flight.