Unmasking Hackers

3,433,815 Victims Uncovered

Unmasking Hackers

3,433,815 Victims Uncovered

Unmasking
Hackers

3,433,815
Victims
Uncovered

Why Suffer so hackers can thrive?

Our focus is to help compromised sites correct the exploited vulnerabilities being utilized by hackers to manipulate search engine result rankings at their expense. We use algorithms, machine learning, and Artificial Intelligence (AI) to identify, group, and follow Villain sites that create Victims online.

Find Site Hacks

We uncover “Villain” sites exploiting “Victim” sites and build associations that reveals bad behavior.

> What We See?

Fix Hacked Sites

Victim sites can be corrected from exploits in 2 Hrs or less (on average) and enjoy unlimited hack resolution.

> How We Help?

Foil New Hacks

After exploits are corrected we actively monitor for threats and provide unlimited free corrections.

> Why We Fight?

Should Your Site Promote Prostitution Also?

We reverse engineered three websites that specialize in escort services, investigated sites associated by promotional elements, and summarized our findings below. Sites highlighted were exploited using a multitude of techniques, some have corrected the compromised area of their site, but a majority are still promoting prostitution by allowing questionable content and redirecting mechanisms to remain on their site. Sites we’ve mentioned represent less than 1% of the compromised sites identified from only three sites who use these types of exploits.

Security / Technology - 6 Sites Exploited

  1. McAfee.com
  2. Intel.com
  3. TrustedSite.com
  4. Panasonic.jp
  5. Brother.com
  6. MixPanel.com

Business / Corporate / Personal - 13 Sites Exploited

  • Fedex.com
  • Dodge.com
  • Yext.com
  • Dictionary.com
  • LATimes.com
  • GeorgeWBush.org
  • BT.com
  • CreativeCommons.org
  • Fool.com
  • Info-Komen.org
  • TheSmokingGun.com
  • UsainBolt.com
  • WomenHeart.org

US Federal Government - 13 Sites Exploited

  • BTS.gov – Bureau of Transportation Statistics
  • DOT.gov – Department of Transportation
  • FAA.gov – Federal Aviation Administration
  • HRU.gov – Federal Human Resource Training
  • JUVENILECOUNCIL.gov – Juvenile Justice and Delinquency Prevention
  • LOC.gov – Library of Congress
  • NASA.gov – National Aeronautics and Space Administration
  • NIH.gov – National Institutes of Health
  • NOAA.gov – National Oceanic and Atmospheric Administration
  • RESEARCH.gov – National Science Foundation
  • SAMHSA.gov – Substance Abuse and Mental Health Services Administration
  • SENATE.gov – United States Senate
  • WEATHER.gov – National Weather Service

US State Government - 8 Sites Exploited

  • CA.gov – State of California
  • KS.gov – State of Kansas
  • KY.gov – State of Kentucky
  • MT.gov – State of Montana
  • ND.gov – State of North Dakota
  • PA.gov – State of  Pennsylvania
  • TXDOT.gov – State of Texas Department of Transportation
  • WI.gov – State of Wisconsin

Search Engines - 154 Sites Exploited

  • Baidu.com
  • Google.ac
  • Google.ad
  • Google.ae
  • Google.al
  • Google.am
  • Google.as
  • Google.at
  • Google.az
  • Google.ba
  • Google.be
  • Google.bf
  • Google.bg
  • Google.bi
  • Google.bj
  • Google.bs
  • Google.bt
  • Google.by
  • Google.ca
  • Google.cd
  • Google.cf
  • Google.ci
  • Google.ch
  • Google.cl
  • Google.co.ao
  • Google.co.bw
  • Google.co.ck
  • Google.co.id
  • Google.co.il
  • Google.co.in
  • Google.co.jp
  • Google.co.kr
  • Google.co.ls
  • Google.co.ma
  • Google.co.nz
  • Google.co.th
  • Google.co.tz
  • Google.co.ug
  • Google.co.uk
  • Google.co.uz
  • Google.co.vi
  • Google.co.za
  • Google.com.af
  • Google.com.ag
  • Google.com.ar
  • Google.com.au
  • Google.com.bo
  • Google.com.br
  • Google.com.bz
  • Google.com.co
  • Google.com.cu
  • Google.com.cy
  • Google.com.do
  • Google.com.ec
  • Google.com.eg
  • Google.com.et
  • Google.com.fj
  • Google.com.gh
  • Google.com.hk
  • Google.com.jm
  • Google.com.kh
  • Google.com.lb
  • Google.com.ly
  • Google.com.mg
  • Google.com.mt
  • Google.com.mx
  • Google.com.na
  • Google.com.nf
  • Google.com.ng
  • Google.com.ni
  • Google.com.om
  • Google.com.pe
  • Google.com.pg
  • Google.com.ph
  • Google.com.pk
  • Google.com.pr
  • Google.com.py
  • Google.com.sa
  • Google.com.sb
  • Google.com.sg
  • Google.com.sv
  • Google.com.tj
  • Google.com.tr
  • Google.com.tw
  • Google.com.ua
  • Google.com.uy
  • Google.com.vc
  • Google.com.vn
  • Google.cv
  • Google.cz
  • Google.de
  • Google.dk
  • Google.dm
  • Google.dz
  • Google.ee
  • Google.es
  • Google.fi
  • Google.fm
  • Google.ga
  • Google.ge
  • Google.gl
  • Google.gm
  • Google.gp
  • Google.gr
  • Google.gy
  • Google.hn
  • Google.hr
  • Google.ht
  • Google.hu
  • Google.ie
  • Google.im
  • Google.iq
  • Google.is
  • Google.it
  • Google.jo
  • Google.kg
  • Google.ki
  • Google.kz
  • Google.li
  • Google.lk
  • Google.lt
  • Google.lu
  • Google.lv
  • Google.me
  • Google.mg
  • Google.mk
  • Google.ml
  • Google.mn
  • Google.ms
  • Google.mu
  • Google.mw
  • Google.ne
  • Google.nl
  • Google.no
  • Google.nr
  • Google.nu
  • Google.pl
  • Google.ps
  • Google.pt
  • Google.ro
  • Google.rs
  • Google.ru
  • Google.se
  • Google.sh
  • Google.si
  • Google.sk
  • Google.sn
  • Google.sr
  • Google.st
  • Google.tg
  • Google.tk
  • Google.tm
  • Google.vu
  • Yahoo.com

Educational Institutions - 38 Sites Exploited

  • BGSU.edu
  • ChicagoBooth.edu
  • CSHL.edu
  • Drake.edu
  • GATech.edu
  • Harvard.edu
  • Hiram.edu
  • Hudson.edu
  • MSU.edu
  • Mass.edu
  • Monroe.edu
  • Montana.edu
  • NCCU.edu
  • Northeastern.edu
  • Northshore.edu
  • Northwestern.edu
  • ODU.edu
  • OHR.edu
  • OKState.edu
  • Ozarks.edu
  • SMCCD.edu
  • SMU.edu
  • UC.edu
  • UCSD.edu
  • UCSC.edu
  • UGA.edu
  • UIllinois.edu
  • UMD.edu
  • UMHelena.edu
  • UNM.edu
  • USC.edu
  • UTK.edu
  • UWW.edu
  • Washington.edu
  • WJU.edu
  • WUSTL.edu
  • YNA.edu

Victim Sites We’ve Discovered

We identify “Victim” sites as being exploited with placement of external links on their site to manipulate search engine algorithms. Using algorithms, machine learning, and Artificial Intelligence (AI) we follow the bad guys “Villains” around and compile a list of sites being exploited which we refer to as “Victims”.

3,433,815

Sites Currently Compromised

Number of “Victim” sites currently tracked compromised by Villains. Compromised sites are defined as having content embedded by third parties unbeknownst to themselves.

> Victim Categories

56,619

Average Stolen Links

Average number of Villain embedded links on Victim sites. Embedded content is an attempt by Villain sites to steal “Google Juice” from Victim sites to boost their search rankings.

> Where Are Exploits?

125 : 1

Hacks vs. Site Page Ratio

Ratio between Villain embedded links and Victim website pages. Frequently hacked pages contain 1,000s of links towards Villain sites which increases over time.

> Why So High?

How Do We Find So Many Hacks?

Sorting through billions of sites to identify Villains and Victims could require a gargantuan amount of processing, storage, and filtering. Our machine learning logic dynamically creates algorithms that find Victims and Villains better with every iteration, minimize overhead, and maximize prioritization (all while we sleep).

Villain Clustering

Every Villain we identify provides a blueprint that our algorithms use to build additional associations.

> Villain Alerts

Victim Ranking

Using multiple dimensions our algorithms determine damage scope and rank among other Victims.

> Victim Alerts

Exploit Trending

Comparing the rate of new sites hacked vs. cleaned sites our algorithms change their monitoring.

> Trend Alerts

Does Google Expand Hacked Definition?

Google provides descriptions of the types of hacks, how to identify if you’re a victim, and the next steps to correct the intrusion within your website’s presence. Our team uses the tips provided by Google to ensure your site doesn’t wander into areas that inhibit your ability to rank well within their search engines.

Can You Fix My Hacked Site?

We recommend following a process which includes: verifying the problem, exploring corrective options, and executing a solution. Within this process is a core requirement to deal with a firm who will do what, when, and how their services are conveyed across: price, duration, and guarantee of satisfaction.

Verify Problems

We provide samples of exploited site areas being compromised before we engage.

> Request Samples

Compare Options

Our process defines the timing, cost, and guarantee for every aspect of our services.

> View Pricing

Execute Solutions

Secure the exploited areas on your site today. Our team can rectify your situation in 2 Hrs on average.

> Get Started

Villain Sites We’ve Discovered

We identify “Villain” sites as those who manipulate search engine algorithms by placing external links on exploited sites. Initially, we began with 2,000 Villain sites compromising a single Victim, created logic to find common behavior, and currently spot exploits at an exponential rate of growth.

87,351

Villain Sites Monitored

Number of Villain sites compromising sites to enhance search results rankings. Compromised sites are defined as having content embedded by third parties without their knowledge.

> Villain Categories

2,199,282

Average Stolen Victim Links

Average number of embedded links per Victim site by Villain. Embedded links towards Villain sites represent an attempt to manipulate search engine rankings.

> Why Sites Exploited?

9 : 1

New vs. Fixed Link Ratio

Ratio of new sites compromised by Villains vs. Victim sites cleaned during a single month on average. Exploited sites continue to grow and Villains realize this disparity as an advantage.

> Why So Fast?

How Was Your Site Hacked?

Obtaining an understanding of “How?” in site security concerns should follow a path that achieves realization towards “Why?”, “Who?”, and “Where?”. Determining these three elements will provide a snapshot of “How?” regardless of the depth or severity of the compromise exploited by hackers upon your online presence.

Why?

Reasons hackers exploit sites include: monetary gain, activism, ego, chaos, revenge, and information theft.

> Derive Intention

Who?

Understanding “Why” narrows the list of culpable entities responsible for your site’s hack.

> Determine Identity

Where?

Hackers can target single or global elements, but both used a compromised security doorway.

> Discover Doorway

Are Sites Hacked and Penalized Frequently?

The number of sites exploited daily and also blacklisted by search engines due to embedded malware, questionable linking characteristics, and malicious techniques aimed at manipulating search engine results grows exponentially due to the benefit derived from these exploits.

37,000+

Sites Hacked Daily *

10,000+

Sites Blacklisted Daily *

What’s Cost of Being Hacked?

Hacker theft of information including: customer, billing, or corporate data can quickly cost any / all organizations considerable resources to correct. Large, medium, and small organizations each have different levels of concern across multiple dimensions, but they all share a common goal when their site is hacked.

$36,000+

Small Businesses *

60%+

Small Business Closures *

$4,000,000+

Large Businesses *

Will Google Penalize Sites Hacked?

Google’s standards for quality represent expectations of a positive user experience that drive your search engine rankings, inclusion within search results, and ultimately your conversion rates for your products and services. Verifying your site’s compliance of these topics will improve your success, risk, and user experience.

  • User-generated spam

    Allowing unapproved content on your site can quickly result in receiving penalties by search engines for your entire site.

  • Hidden text and links

    Search engines look code vs. users who see the presentation layer and intentionally hidden content is a problem.

  • Link schemes

    Links act as votes of popularity manipulated by hackers to improve their search engine rankings using tiered structures.

  • Irrelevant keywords

    Hacked content frequently includes irrelevant keywords to your site’s context attempting to manipulate search engines.

  • Sneaky redirects

    Redirects that occur for users, but not search engines are an attempt to hide or promote hacked content on your site.

  • Cloaking

    Presenting one version of a page for users and another for search engines can quickly result in your site being blacklisted.

  • Ways to prevent comment spam

    Protect your site from hacked content by limiting access to embed content, moderate submissions, and monitor your site.

  • Scraped content

    Hackers frequently use auto-generated content to promote themselves using common strings placed on millions of sites.

  • Doorway pages

    Compromised pages with similar hacker content on your site appear as platforms to funnel users to hacked sites.

  • Affiliate programs

    Hackers frequently monetize their activities using affiliate networks with embedded links placed on unsuspecting sites.

  • Quality Guidelines Index

    Find all of the quality guidelines using this index page to ensure your site is providing the expected user experience.

How Does Perception Change After a Hack?

Indirect damages incurred from a data breach can touch every facet of your organization’s ability to succeed, which was recently highlighted in a study conducted by the Ponemon Institute, that reveals the depth of damage that can occur concurrently across customers, confidence, and your reputation.

31%

Customers Lost

57%

Confidence Lost

75%

Reputation Lost

Do Hackers Cluck Around?

Software which allows hackers to efficiently, effectively, and quickly compromise your online presence is cheap, automated, and vicious on every front. The depth of techniques available to compromise sites is used by a collective group of users that: test, improve, and utilize the functionality within.

$249

Ave. Hacker Software Cost

584

Vulnerabilities Targeted

1,072

Milliseconds per Hacked Link

95%

Success Bypassing Captchas

Questions? Maybe Poultry is Your Answer.

Express your wants, needs, and questions by using the provided contact methods to start the conversation.