Malware: Malware, Short For Malicious Software, Is

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 12

Malware

Malware, short for malicious software, is software designed to secretly access a computer
system without the owner's informed consent. The expression is a general term used by computer
professionals to mean a variety of forms of hostile, intrusive, or annoying software or program
code.[1] The term "computer virus" is sometimes used as a catch-all phrase to include all types of
malware, including true viruses.

Software is considered to be malware based on the perceived intent of the creator rather than any
particular features. Malware includes computer viruses, worms, trojan horses, spyware, dishonest
adware, scareware, crimeware, most rootkits, and other malicious and unwanted software. In
law, malware is sometimes known as a computer contaminant, for instance in the legal codes of
several U. S. states, including California and West Virginia.[2][3]

Malware is not the same as defective software, that is a software that has a legitimate purpose but
contains harmful bugs.

Preliminary results from Symantec published in 2008 suggested that "the release rate of
malicious code and other unwanted programs may be exceeding that of legitimate software
applications."[4] According to F-Secure, "As much malware [was] produced in 2007 as in the
previous 20 years altogether."[5] Malware's most common pathway from criminals to users is
through the Internet: primarily by e-mail and the World Wide Web.[6]

The prevalence of malware as a vehicle for organized Internet crime, along with the general
inability of traditional anti-malware protection platforms (products) to protect against the
continuous stream of unique and newly produced malware, has seen the adoption of a new
mindset for businesses operating on the Internet: the acknowledgment that some sizable
percentage of Internet customers will always be infected for some reason or another, and that
they need to continue doing business with infected customers. The result is a greater emphasis on
back-office systems designed to spot fraudulent activities associated with advanced malware
operating on customers' computers.[7]
On March 29, 2010, Symantec Corporation named Shaoxing, China as the world's malware
capital.[8]

Sometimes, malware is disguised as genuine software, and may come from an official site.
Therefore, some security programs, such as McAfee may call malware "potentially unwanted
programs" or "PUP".

[edit] Purposes
Many early infectious programs, including the first Internet Worm and a number of MS-DOS
viruses, were written as experiments or pranks. They were generally intended to be harmless or
merely annoying, rather than to cause serious damage to computer systems. In some cases, the
perpetrator did not realize how much harm their creations would do. Young programmers
learning about viruses and their techniques wrote them simply for practice, or to see how far they
could spread. As late as 1999, widespread viruses such as the Melissa virus and the David virus
appear to have been written chiefly as pranks.

Hostile intent related to vandalism can be found in programs designed to cause harm or data loss.
Many DOS viruses, and the Windows ExploreZip worm, were designed to destroy files on a hard
disk, or to corrupt the file system by writing invalid data to them. Network-borne worms such as
the 2001 Code Red worm or the Ramen worm fall into the same category. Designed to vandalize
web pages, worms may seem like the online equivalent to graffiti tagging, with the author's alias
or affinity group appearing everywhere the worm goes.[citation needed]

Since the rise of widespread broadband Internet access, malicious software has been designed for
a profit, for examples forced advertising. For instance, since 2003, the majority of widespread
viruses and worms have been designed to take control of users' computers for black-market
exploitation.[citation needed] Infected "zombie computers" are used to send email spam, to host
contraband data such as child pornography,[9] or to engage in distributed denial-of-service attacks
as a form of extortion.

Another strictly for-profit category of malware has emerged in spyware -- programs designed to
monitor users' web browsing, display unsolicited advertisements, or redirect affiliate marketing
revenues to the spyware creator. Spyware programs do not spread like viruses; they are, in
general, installed by exploiting security holes or are packaged with user-installed software, such
as peer-to-peer applications.

[edit] Infectious malware: viruses and worms


Main articles: Computer virus and Computer worm

The best-known types of malware, viruses and worms, are known for the manner in which they
spread, rather than any other particular behavior. The term computer virus is used for a program
that has infected some executable software and that causes that when run, spread the virus to
other executables. Viruses may also contain a payload that performs other actions, often
malicious. A worm, on the other hand, is a program that actively transmits itself over a network
to infect other computers. It too may carry a payload.

These definitions lead to the observation that a virus requires user intervention to spread,
whereas a worm spreads itself automatically. Using this distinction, infections transmitted by
email or Microsoft Word documents, which rely on the recipient opening a file or email to infect
the system, would be classified as viruses rather than worms.

Some writers in the trade and popular press appear to misunderstand this distinction, and use the
terms interchangeably.

[edit] Capsule history of viruses and worms

Before Internet access became widespread, viruses spread on personal computers by infecting
the executable boot sectors of floppy disks. By inserting a copy of itself into the machine code
instructions in these executables, a virus causes itself to be run whenever a program is run or the
disk is booted. Early computer viruses were written for the Apple II and Macintosh, but they
became more widespread with the dominance of the IBM PC and MS-DOS system. Executable-
infecting viruses are dependent on users exchanging software or boot-able floppies, so they
spread rapidly in computer hobbyist circles.

The first worms, network-borne infectious programs, originated not on personal computers, but
on multitasking Unix systems. The first well-known worm was the Internet Worm of 1988,
which infected SunOS and VAX BSD systems. Unlike a virus, this worm did not insert itself into
other programs. Instead, it exploited security holes (vulnerabilities) in network server programs
and started itself running as a separate process. This same behavior is used by today's worms as
well.

With the rise of the Microsoft Windows platform in the 1990s, and the flexible macros of its
applications, it became possible to write infectious code in the macro language of Microsoft
Word and similar programs. These macro viruses infect documents and templates rather than
applications (executables), but rely on the fact that macros in a Word document are a form of
executable code.

Today, worms are most commonly written for the Windows OS, although a few like Mare-D[10]
and the Lion worm[11] are also written for Linux and Unix systems. Worms today work in the
same basic way as 1988's Internet Worm: they scan the network and leverage vulnerable
computers to replicate. Because they need no human intervention, worms can spread with
incredible speed. The SQL Slammer infected thousands of computers in a few minutes.[12]

[edit] Concealment: Trojan horses, rootkits, and backdoors


[edit] Trojan horses
For a malicious program to accomplish its goals, it must be able to run without being shut down,
or deleted by the user or administrator of the computer system on which it is running.
Concealment can also help get the malware installed in the first place. When a malicious
program is disguised as something innocuous or desirable, users may be tempted to install it
without knowing what it does. This is the technique of the Trojan horse or trojan.

In broad terms, a Trojan horse is any program that invites the user to run it, concealing a harmful
or malicious payload. The payload may take effect immediately and can lead to many
undesirable effects, such as deleting the user's files or further installing malicious or undesirable
software. Trojan horses known as droppers are used to start off a worm outbreak, by injecting the
worm into users' local networks.

One of the most common ways that spyware is distributed is as a Trojan horse, bundled with a
piece of desirable software that the user downloads from the Internet. When the user installs the
software, the spyware is installed alongside. Spyware authors who attempt to act in a legal
fashion may include an end-user license agreement that states the behavior of the spyware in
loose terms, which the users are unlikely to read or understand.

[edit] Rootkits

Once a malicious program is installed on a system, it is essential that it stays concealed, to avoid
detection and disinfection. The same is true when a human attacker breaks into a computer
directly. Techniques known as rootkits allow this concealment, by modifying the host's operating
system so that the malware is hidden from the user. Rootkits can prevent a malicious process
from being visible in the system's list of processes, or keep its files from being read. Originally, a
rootkit was a set of tools installed by a human attacker on a Unix system, allowing the attacker to
gain administrator (root) access. Today, the term is used more generally for concealment routines
in a malicious program.

Some malicious programs contain routines to defend against removal, not merely to hide
themselves, but to repel attempts to remove them. An early example of this behavior is recorded
in the Jargon File tale of a pair of programs infesting a Xerox CP-V time sharing system:

Each ghost-job would detect the fact that the other had been killed, and would start a new
copy of the recently slain program within a few milliseconds. The only way to kill both
ghosts was to kill them simultaneously (very difficult) or to deliberately crash the system.
[13]

Similar techniques are used by some modern malware, wherein the malware starts a number of
processes that monitor and restore one another as needed. In the event a user running Microsoft
Windows is infected with such malware, if they wish to manually stop it, they could use Task
Manager's 'processes' tab to find the main process (the one that spawned the "resurrector
process(es)"), and use the 'end process tree' function, which would kill not only the main process,
but the "resurrector(s)" as well, since they were started by the main process. Some malware
programs use other techniques, such as naming the infected file similar to a legitimate or trust-
able file (expl0rer.exe VS explorer.exe).
[edit] Backdoors

A backdoor is a method of bypassing normal authentication procedures. Once a system has been
compromised (by one of the above methods, or in some other way), one or more backdoors may
be installed in order to allow easier access in the future. Backdoors may also be installed prior to
malicious software, to allow attackers entry.

The idea has often been suggested that computer manufacturers preinstall backdoors on their
systems to provide technical support for customers, but this has never been reliably verified.
Crackers typically use backdoors to secure remote access to a computer, while attempting to
remain hidden from casual inspection. To install backdoors crackers may use Trojan horses,
worms, or other methods.

[edit] Malware for profit: spyware, botnets, keystroke


loggers, and dialers
Main articles: Spyware, Botnet, Keystroke logging, Web threats, and Dialer

During the 1980s and 1990s, it was usually taken for granted that malicious programs were
created as a form of vandalism or prank. More recently, the greater share of malware programs
have been written with a financial or profit motive in mind. This can be taken as the malware
authors' choice to monetize their control over infected systems: to turn that control into a source
of revenue.

Spyware programs are commercially produced for the purpose of gathering information about
computer users, showing them pop-up ads, or altering web-browser behavior for the financial
benefit of the spyware creator. For instance, some spyware programs redirect search engine
results to paid advertisements. Others, often called "stealware" by the media, overwrite affiliate
marketing codes so that revenue is redirected to the spyware creator rather than the intended
recipient.

Spyware programs are sometimes installed as Trojan horses of one sort or another. They differ in
that their creators present themselves openly as businesses, for instance by selling advertising
space on the pop-ups created by the malware. Most such programs present the user with an end-
user license agreement that purportedly protects the creator from prosecution under computer
contaminant laws. However, spyware EULAs have not yet been upheld in court.

Another way that financially motivated malware creators can profit from their infections is to
directly use the infected computers to do work for the creator. The infected computers are used
as proxies to send out spam messages. A computer left in this state is often known as a zombie
computer. The advantage to spammers of using infected computers is they provide anonymity,
protecting the spammer from prosecution. Spammers have also used infected PCs to target anti-
spam organizations with distributed denial-of-service attacks.
In order to coordinate the activity of many infected computers, attackers have used coordinating
systems known as botnets. In a botnet, the malware or malbot logs in to an Internet Relay Chat
channel or other chat system. The attacker can then give instructions to all the infected systems
simultaneously. Botnets can also be used to push upgraded malware to the infected systems,
keeping them resistant to antivirus software or other security measures.

It is possible for a malware creator to profit by stealing sensitive information from a victim.
Some malware programs install a key logger, which intercepts the user's keystrokes when
entering a password, credit card number, or other information that may be exploited. This is then
transmitted to the malware creator automatically, enabling credit card fraud and other theft.
Similarly, malware may copy the CD key or password for online games, allowing the creator to
steal accounts or virtual items.

Another way of stealing money from the infected PC owner is to take control of a dial-up
modem and dial an expensive toll call. Dialer (or porn dialer) software dials up a premium-rate
telephone number such as a U.S. "900 number" and leave the line open, charging the toll to the
infected user.

[edit] Data-stealing malware


Data-stealing malware is a web threat that divests victims of personal and proprietary
information with the intent of monetizing stolen data through direct use or underground
distribution. Content security threats that fall under this umbrella include keyloggers, screen
scrapers, spyware, adware, backdoors, and bots. The term does not refer to activities such as
spam, phishing, DNS poisoning, SEO abuse, etc. However, when these threats result in file
download or direct installation, as most hybrid attacks do, files that act as agents to proxy
information will fall into the data-stealing malware category.

[edit] Characteristics of data-stealing malware

Does not leave traces of the event

 The malware is typically stored in a cache that is routinely flushed


 The malware may be installed via a drive-by-download process
 The website hosting the malware as well as the malware is generally temporary or rogue

Frequently changes and extends its functions

 It is difficult for antivirus software to detect final payload attributes due to the
combination(s) of malware components
 The malware uses multiple file encryption levels

Thwarts Intrusion Detection Systems (IDS) after successful installation

 There are no perceivable network anomalies


 The malware hides in web traffic
 The malware is stealthier in terms of traffic and resource use

Thwarts disk encryption

 Data is stolen during decryption and display


 The malware can record keystrokes, passwords, and screenshots

Thwarts Data Loss Prevention (DLP)

 Leakage protection hinges on metadata tagging, not everything is tagged


 Miscreants can use encryption to port data

[edit] Examples of data-stealing malware

 Bancos, an info stealer that waits for the user to access banking websites then spoofs
pages of the bank website to steal sensitive information.
 Gator, spyware that covertly monitors web-surfing habits, uploads data to a server for
analysis then serves targeted pop-up ads.
 LegMir, spyware that steals personal information such as account names and passwords
related to online games.
 Qhost, a Trojan that modifies the Hosts file to point to a different DNS server when
banking sites are accessed then opens a spoofed login page to steal login credentials for
those financial institutions.

[edit] Data-stealing malware incidents

 Albert Gonzalez is accused of masterminding a ring to use malware to steal and sell more
than 170 million credit card numbers in 2006 and 2007—the largest computer fraud in
history. Among the firms targeted were BJ's Wholesale Club, TJX, DSW Shoe,
OfficeMax, Barnes & Noble, Boston Market, Sports Authority and Forever 21.[14]
 A Trojan horse program stole more than 1.6 million records belonging to several hundred
thousand people from Monster Worldwide Inc’s job search service. The data was used by
cybercriminals to craft phishing emails targeted at Monster.com users to plant additional
malware on users’ PCs.[15]
 Customers of Hannaford Bros. Co, a supermarket chain based in Maine, were victims of
a data security breach involving the potential compromise of 4.2 million debit and credit
cards. The company was hit by several class-action law suits.[16]
 The Torpig Trojan has compromised and stolen login credentials from approximately
250,000 online bank accounts as well as a similar number of credit and debit cards. Other
information such as email, and FTP accounts from numerous websites, have also been
compromised and stolen.[17]

[edit] Vulnerability to malware


Main article: Vulnerability (computing)

In this context, as throughout, it should be borne in mind that the “system” under attack may be
of various types, e.g. a single computer and operating system, a network or an application.

Various factors make a system more vulnerable to malware:

 Homogeneity: e.g. when all computers in a network run the same OS, upon exploiting
one, one can exploit them all.
 Weight of numbers: simply because the vast majority of existing malware is written to
attack Windows systems, then Windows systems, ipso facto, are more vulnerable to
succumbing to malware (regardless of the security strengths or weaknesses of Windows
itself).
 Defects: malware leveraging defects in the OS design.
 Unconfirmed code: code from a floppy disk, CD-ROM or USB device may be executed
without the user’s agreement.
 Over-privileged users: some systems allow all users to modify their internal structures.
 Over-privileged code: some systems allow code executed by a user to access all rights of
that user.

An oft-cited cause of vulnerability of networks is homogeneity or software monoculture.[18] For


example, Microsoft Windows or Apple Mac have such a large share of the market that
concentrating on either could enable a cracker to subvert a large number of systems, but any total
monoculture is a problem. Instead, introducing inhomogeneity (diversity), purely for the sake of
robustness, could increase short-term costs for training and maintenance. However, having a few
diverse nodes would deter total shutdown of the network, and allow those nodes to help with
recovery of the infected nodes. Such separate, functional redundancy would avoid the cost of a
total shutdown, would avoid homogeneity as the problem of "all eggs in one basket".

Most systems contain bugs, or loopholes, which may be exploited by malware. A typical
example is the buffer-overrun weakness, in which an interface designed to store data, in a small
area of memory, allows the caller to supply more data than will fit. This extra data then
overwrites the interface's own executable structure (past the end of the buffer and other data). In
this manner, malware can force the system to execute malicious code, by replacing legitimate
code with its own payload of instructions (or data values) copied into live memory, outside the
buffer area.

Originally, PCs had to be booted from floppy disks, and until recently it was common for this to
be the default boot device. This meant that a corrupt floppy disk could subvert the computer
during booting, and the same applies to CDs. Although that is now less common, it is still
possible to forget that one has changed the default, and rare that a BIOS makes one confirm a
boot from removable media.

In some systems, non-administrator users are over-privileged by design, in the sense that they are
allowed to modify internal structures of the system. In some environments, users are over-
privileged because they have been inappropriately granted administrator or equivalent status.
This is primarily a configuration decision, but on Microsoft Windows systems the default
configuration is to over-privilege the user. This situation exists due to decisions made by
Microsoft to prioritize compatibility with older systems above security configuration in newer
systems[citation needed] and because typical applications were developed without the under-privileged
users in mind. As privilege escalation exploits have increased this priority is shifting for the
release of Microsoft Windows Vista. As a result, many existing applications that require excess
privilege (over-privileged code) may have compatibility problems with Vista. However, Vista's
User Account Control feature attempts to remedy applications not designed for under-privileged
users, acting as a crutch to resolve the privileged access problem inherent in legacy applications.

Malware, running as over-privileged code, can use this privilege to subvert the system. Almost
all currently popular operating systems, and also many scripting applications allow code too
many privileges, usually in the sense that when a user executes code, the system allows that code
all rights of that user. This makes users vulnerable to malware in the form of e-mail attachments,
which may or may not be disguised.

Given this state of affairs, users are warned only to open attachments they trust, and to be wary
of code received from untrusted sources. It is also common for operating systems to be designed
so that device drivers need escalated privileges, while they are supplied by more and more
hardware manufacturers.

[edit] Eliminating over-privileged code

Over-privileged code dates from the time when most programs were either delivered with a
computer or written in-house, and repairing it would at a stroke render most antivirus software
almost redundant. It would, however, have appreciable consequences for the user interface and
system management.

The system would have to maintain privilege profiles, and know which to apply for each user
and program. In the case of newly installed software, an administrator would need to set up
default profiles for the new code.

Eliminating vulnerability to rogue device drivers is probably harder than for arbitrary rogue
executables. Two techniques, used in VMS, that can help are memory mapping only the registers
of the device in question and a system interface associating the driver with interrupts from the
device.

Other approaches are:

 Various forms of virtualization, allowing the code unlimited access only to virtual
resources
 Various forms of sandbox or jail
 The security functions of Java, in java.security

Such approaches, however, if not fully integrated with the operating system, would reduplicate
effort and not be universally applied, both of which would be detrimental to security.
[edit] Anti-malware programs
Main article: Antivirus software

As malware attacks become more frequent, attention has begun to shift from viruses and spyware
protection, to malware protection, and programs have been developed to specifically combat
them.

Anti-malware programs can combat malware in two ways:

1. They can provide real time protection against the installation of malware software on a
computer. This type of spyware protection works the same way as that of antivirus
protection in that the anti-malware software scans all incoming network data for malware
software and blocks any threats it comes across.
2. Anti-malware software programs can be used solely for detection and removal of
malware software that has already been installed onto a computer. This type of malware
protection is normally much easier to use and more popular.[citation needed] This type of anti-
malware software scans the contents of the Windows registry, operating system files, and
installed programs on a computer and will provide a list of any threats found, allowing
the user to choose which files to delete or keep, or to compare this list to a list of known
malware components, removing files that match.

Real-time protection from malware works identically to real-time antivirus protection: the
software scans disk files at download time, and blocks the activity of components known to
represent malware. In some cases, it may also intercept attempts to install start-up items or to
modify browser settings. Because many malware components are installed as a result of browser
exploits or user error, using security software (some of which are anti-malware, though many are
not) to "sandbox" browsers (essentially babysit the user and their browser) can also be effective
in helping to restrict any damage done.

[edit] Academic research on malware: a brief overview


The notion of a self-reproducing computer program can be traced back to when presented
lectures that encompassed the theory and organization of complicated automata.[19] Neumann
showed that in theory a program could reproduce itself. This constituted a plausibility result in
computability theory. Fred Cohen experimented with computer viruses and confirmed
Neumann's postulate. He also investigated other properties of malware (detectability, self-
obfuscating programs that used rudimentary encryption that he called "evolutionary", and so on).
His 1988 doctoral dissertation was on the subject of computer viruses.[20] Cohen's faculty advisor,
Leonard Adleman (the A in RSA) presented a rigorous proof that, in the general case,
algorithmically determining whether a virus is or is not present is Turing undecidable.[21] This
problem must not be mistaken for that of determining, within a broad class of programs, that a
virus is not present; this problem differs in that it does not require the ability to recognize all
viruses. Adleman's proof is perhaps the deepest result in malware computability theory to date
and it relies on Cantor's diagonal argument as well as the halting problem. Ironically, it was later
shown by Young and Yung that Adleman's work in cryptography is ideal in constructing a virus
that is highly resistant to reverse-engineering by presenting the notion of a cryptovirus.[22] A
cryptovirus is a virus that contains and uses a public key and randomly generated symmetric
cipher initialization vector (IV) and session key (SK). In the cryptoviral extortion attack, the
virus hybrid encrypts plaintext data on the victim's machine using the randomly generated IV
and SK. The IV+SK are then encrypted using the virus writer's public key. In theory the victim
must negotiate with the virus writer to get the IV+SK back in order to decrypt the ciphertext
(assuming there are no backups). Analysis of the virus reveals the public key, not the IV and SK
needed for decryption, or the private key needed to recover the IV and SK. This result was the
first to show that computational complexity theory can be used to devise malware that is robust
against reverse-engineering.

Another growing area of computer virus research is to mathematically model the infection
behavior of worms using models such as Lotka–Volterra equations, which has been applied in
the study of biological virus. Various virus propagation scenarios have been studied by
researchers such as propagation of computer virus, fighting virus with virus like predator codes,
[23][24]
effectiveness of patching etc.

[edit] Grayware
Grayware[25] (or greyware) is a general term sometimes used as a classification for applications
that behave in a manner that is annoying or undesirable, and yet less serious or troublesome than
malware.[26] Grayware encompasses spyware, adware, dialers, joke programs, remote access
tools, and any other unwelcome files and programs apart from viruses that are designed to harm
the performance of computers on your network. The term has been in use since at least as early
as September 2004.[27]

Grayware refers to applications or files that are not classified as viruses or trojan horse programs,
but can still negatively affect the performance of the computers on your network and introduce
significant security risks to your organization.[28] Often grayware performs a variety of undesired
actions such as irritating users with pop-up windows, tracking user habits and unnecessarily
exposing computer vulnerabilities to attack.

 Spyware is software that installs components on a computer for the purpose of recording
Web surfing habits (primarily for marketing purposes). Spyware sends this information to
its author or to other interested parties when the computer is online. Spyware often
downloads with items identified as 'free downloads' and does not notify the user of its
existence or ask for permission to install the components. The information spyware
components gather can include user keystrokes, which means that private information
such as login names, passwords, and credit card numbers are vulnerable to theft.
 Adware is software that displays advertising banners on Web browsers such as Internet
Explorer and Mozilla Firefox. While not categorized as malware, many users consider
adware invasive. Adware programs often create unwanted effects on a system, such as
annoying popup ads and the general degradation in either network connection or system
performance. Adware programs are typically installed as separate programs that are
bundled with certain free software. Many users inadvertently agree to installing adware
by accepting the End User License Agreement (EULA) on the free software. Adware are
also often installed in tandem with spyware programs. Both programs feed off each
other's functionalities: spyware programs profile users' Internet behavior, while adware
programs display targeted ads that correspond to the gathered user profile.

[edit] Web and spam


<iframe
src="http://example.net/out.ph
p?s_id=11" width=0 height=0 />
If an intruder can gain access to a website, it can be hijacked with a single HTML element. [29]

The World Wide Web is a criminals' preferred pathway for spreading malware. Today's web
threats use combinations of malware to create infection chains. About one in ten Web pages may
contain malicious code.[30]

[edit] Wikis and blogs

Innocuous wikis and blogs are not immune to hijacking. It has been reported[by whom?] that the
German edition of Wikipedia has recently been used as an attempt to vector infection. Through a
form of social engineering, users with ill intent have added links to web pages that contain
malicious software with the claim that the web page would provide detections and remedies,
when in fact it was a lure to infect.[31]

Just in 2010, big hosting providers (GoDaddy, Network Solutions, etc) were hacked[32] and every
site hosting in there became a path to malware and spam.

[edit] Targeted SMTP threats

Targeted SMTP threats also represent an emerging attack vector through which malware is
propagated. As users adapt to widespread spam attacks, cybercriminals distribute crimeware to
target one specific organization or industry, often for financial gain.[33]

[edit] HTTP and FTP

Infections via "drive-by" download are spread through the Web over HTTP and FTP when
resources containing spurious keywords are indexed by legitimate search engines, as well as
when JavaScript is surreptitiously added to legitimate websites and advertising networks.[34]

You might also like