Juice: A Longitudinal Study of an SEO BotnetDavid Y. Wang, Stefan Savage, and Geoffrey M. VoelkerUniversity of California, San DiegoAbstractBlack hat search engine optimization (SEO) campaignsattract and monetize traffic using abusive schemes. Usinga combination of Web site compromise, keyword stuffingand cloaking, a SEO botnet operator can manipulate searchengine rankings for key search terms, ultimately directingusers to sites promoting some kind of scam (e.g., fake antivirus). In this paper, we infiltrate an influential SEO botnet,GR, characterize its dynamics and effectiveness and identifythe key scams driving its innovation. Surprisingly, we findthat, unlike e-mail spam botnets, this botnet is both modest in size and has low churn—suggesting little adversarialpressure from defenders. Belying its small size, however,the GR botnet is able to successfully “juice” the rankingsof trending search terms and, during its peak, appears tohave been the dominant source of trending search term poisoning for Google. Finally, we document the range of scamsit promoted and the role played by fake anti-virus programsin driving innovation.1IntroductionTraffic is the lifeblood of online commerce: eyeballsequal money in the crass parlance of today’s marketers.While there is a broad array of vectors for attracting uservisits, Web search is perhaps the most popular of these andis responsible for between 10 and 15 billion dollars in annual advertising revenue [1, 2].However, in addition to the traffic garnered by such sponsored search advertising, even more is driven by so-called“organic” search results. Moreover, it is widely held thatthe more highly ranked pages—those appearing at the beginning of search results—attract disproportionately greatervolumes of visitors (and hence potential revenue). Thus, alarge ecosystem has emerged to support search engine optimization or SEO—the practice of influencing a site’s ranking when searching under specific query terms. Many ofthese practices are explicitly encouraged by search engineswith the goal of improving the overall search experience(e.g., shorter load times, descriptive titles and metadata, effective use of CSS to separate content from presentation,etc.) and such approaches are commonly called “white hat”SEO techniques. However, on the other side of the spectrumare “black hat” techniques that explicitly seek to manipulatethe search engine’s algorithms with little interest in improving some objective notion of search quality (e.g., link farms,keyword stuffing, cloaking and so on).Unsurprisingly, such black hat techniques have quicklybeen pressed into the service of abusive advertising—advertising focused on attracting traffic for compromise(e.g., drive-by downloads ), for fraud (e.g., fake antivirus ), or for selling counterfeit goods (e.g., pharmaceuticals or software).1 While a few such incidents wouldnot generate alarm, there is increasingly clear evidence oflarge-scale SEO campaigns being carried out: large numbers of compromised Web sites harnessed in unison to poison search results for attractive search queries (e.g., trending search terms). Indeed, one recent industry report claimsthat 40% of all malware infestations originate in poisonedsearch results . However, the details of how such searchpoisoning attacks are mounted, their efficacy, their dynamics over time and their ability to manage search enginecountermeasures are still somewhat opaque.In service to these questions, this paper examines indepth the behavior of one influential search poisoning botnet, “GR”.2 In particular, we believe our work offers threeprimary contributions in this vein.Botnet characterization. By obtaining and reverse engineering a copy of the “SEO kit” malware installed on compromised Web sites, we were able to identify other botnetmembers and infiltrate the command and control channel.Using this approach we characterize the activities of thisbotnet and its compromised hosts for nine months. We showthat unlike email spamming botnets, this search poisoningbotnet is modest in size (under a thousand compromised1 Indeed, in one recent study of counterfeit online pharmaceuticals themost successful advertiser was not an email spammer, but rather was anSEO specialist .2 Each of the functions and global variables in this botnet are prefixeswith a capital GR. We believe it is an acronym, but at the time of thiswriting we do not know what the authors intended it to stand for.
Web sites) and has a low rate of churn (with individual sitesremaining in the botnet for months). Moreover, we document how the botnet code is updated over time to reflectnew market opportunities.Poisoning dynamics. By correlating captured information about the keywords being promoted with contemporaneous Internet searches, we are able to establish the effectiveness of such search poisoning campaigns. Surprisingly,we find that even this modest sized botnet is able to effectively “juice” the ranking of thousands of specific searchterms within 24 hours and, in fact, it appears to have beenthe dominant contributor to poisoned trending search resultsat Google during its peak between April and June 2011.Targeting. By systematically following and visiting the“doorway” pages being promoted, both through redirections and under a variety of advertised browser environments, we are able to determine the ultimate scams beingused to monetize the poisoning activity. We find evidenceof a “killer scam” for search poisoning and document highlevels of activity while the fake antivirus ecosystem is stable (presumably due to the unusually high revenue generation of such scams ). However, after this market experienced a large setback, the botnet operator explores a rangeof lower-revenue alternatives (e.g., pay-per-click, drive-bydownloads) but never with the same level of activity.Finally, in addition to these empirical contributions, ourpaper also documents a methodology and measurement approach for performing such studies in the future. Unlikeemail spam which delivers its content on a broad basis,search poisoning involves many more moving parts including the choice of search terms and the behavior of the searchengine itself. Indeed, our analyses required data from threedifferent crawlers to gather the necessary information: (1)a host crawler for identifying and monitoring compromisedWeb sites, (2) a search crawler to identify poisoned searchresults and hence measure the effectiveness of the poisoning, and (3) a redirection crawler that follows redirectionchains from doorway pages linked from poisoned search results to identify the final landing pages being advertised.The remainder of this paper is structured as follows. InSection 2, we walk through an example of a search poisoning attack and explain how our study builds on prior work.In Section 3 we describe the GR SEO botnet in detail, followed by a description of Odwalla, the system we built tomonitor and probe its activities in Section 4. Finally, we describe our analyses and findings in Section 5, summarizingthe most cogent of these in our conclusion.2BackgroundAs background, we start with an example of a searchpoisoning attack and then discuss previous work that hasexplored the effects of search engine poisoning.(1)!Attacker!Doorway!GET !/index.html!(2)!(5)!Scams!GET !/index.html!(4)!(3)!Search Engine!Web Crawler!“volcano”!User!Figure 1: A typical search poisoning attack.2.1An ExampleFigure 1 shows the steps of a typical search poisoningattack, which baits users into clicking through a search result to be redirected to a scam. In this example, we presuppose that due to exogenous factors there is sudden interest in terms related to volcanoes (e.g., an eruption somewhere). The scam proceeds as follows: (1) The attackerexploits a vulnerability on a Web site and installs an SEOkit (Section 3), malware that runs on the compromised siteand changes it from a legitimate site into a doorway under the attacker’s control. (2) Next, when a search engine Web crawler requests the page http://doorway/index.html, the SEO kit detects the visitor as a crawlerand returns a page related to volcanoes (the area of trending interest) together with cross links to other compromisedsites under the attacker’s control. (3) The search engineindexes this page, and captures its heavy concentration ofvolcano terms and its linkage with other volcano-relatedsites. (4) Later a user searches for “volcano” and clicksthrough a now highly ranked search result that links tohttp://doorway/index.html. (5) Upon receivingthis request, the SEO kit detects that it is from a user arriving via a search engine, and attempts to monetize the clickby redirecting the user to a scam such as fake AV.2.2Previous WorkPrevious work, dating back well over a decade, has studied cloaking mechanisms and Web spam in detail [12, 19,20, 21]. Recently, interest has focused on measuring thephenomenon of search result poisoning and the resultingnegative user experience, together with various methods fordetecting poisoned search results as a step towards undermining the attack. In this paper we extend this line of workby characterizing the coordinated infrastructure and organization behind these attacks from the attacker’s point of view,
and the strategies an attacker takes both in monetizing usertraffic as well as responding to intervention.For example, Wang et al. recently measured the prevalence of cloaking as seen organically by users in Websearch results over time for trending and pharmaceuticalqueries . Cloaking is a “bait and switch” techniquewhere malware delivers different semantic content to different user segments, such as SEO content to search enginesand scams to users, and is one of the essential ingredientsfor operating a modern black hat SEO campaign. Similarly,Lu et al. developed a machine learning approach for identifying poisoned search results, proposing important featuresfor statistical modeling and showing their effectiveness onsearch results to trending terms . During the same timeperiod, Leontiadis et al.  and Moore et al.  also measured the exposure of poisoned search results to users, andused their measurements to construct an economic modelfor the financial profitability of this kind of attack. Despitethe common interest in search result poisoning, these studies focus on how cloaking was utilized to manipulate searchresults and its impact on users, whereas our work focusesmore on the mechanisms used by and the impact of an entire SEO campaign coordinated by an attacker via a botnet.The work of John et al. is the most similar to the study wehave undertaken . Also using an SEO malware kit, theyextrapolated key design heuristics for a system, deSEO, toidentify SEO campaigns using a search engine provider’sWeb graph. They found that analyzing the historical linksbetween Web sites is important to detecting, and ultimatelypreventing, SEO campaigns. Our work differs in that, whilewe study a similar SEO kit, we focus on the longitudinaloperation of SEO campaigns as organized by an SEO botnet operator: what bottlenecks, or lack thereof, an operator faces, and what factors, such as interventions, appear tohave influenced the operator’s behavior over time.3The GR BotnetIn this section we present the architecture of the GR botnet responsible for poisoning search results and funnelingusers, as traffic, to various scams. We start by introducingits SEO malware kit, and then present a high-level overviewof its architecture, highlighting specific functionality foundin the SEO kit and the evolution of the source code.3.1SEO KitAn SEO kit is software that runs on each compromisedWeb site that gives the botmaster backdoor access to the siteand implements the mechanisms for black hat search engineoptimization. We obtained an SEO kit after contacting numerous owners of compromised sites. After roughly 40 separate attempts, one site owner was willing and able to sed Web Sites!HTTP GET!HTTP GET!User!Search Engine!Web Crawler!Figure 2: A user and a search engine Web crawlerissue a request to a compromised Web site inthe botnet. The site will (1) contact the directoryserver for the address of the C&C, and then (2)contact the C&C for either the URL for redirectingthe user, or the SEO content for the Web crawler.us the injected code found on their site. Although we cannot pinpoint the original exploit vector on the compromisedWeb site, there have been many recent reports of attackerscompromising Web sites by exploiting Wordpress and othersimilar open source content management systems .The SEO kit is implemented in PHP and consists of twocomponents, the loader and the driver. The loader is initially installed by prepending PHP files with an eval statement that decrypts base64 encoded code. When the firstvisitor requests the modified page, causing execution of thePHP file, the loader sets up a cache on the site’s local disk.This cache reduces network requests, which could lead todetection or exceeding the Web site host’s bandwidth limits. Then the loader will contact a directory server using anHTTP GET request to find the location of a command-andcontrol server (C&C) as either a domain name or IP address.Upon contacting the C&C server, the loader downloads thedriver code which provides the main mechanisms used forperforming black hat SEO.3.2Botnet ArchitectureFigure 2 shows the high-level architecture of the botnet.The botnet has a command and control architecture builtfrom pull mechanisms and three kinds of hosts: compromised Web sites, a directory server, and a command andcontrol server (C&C).3.2.1Compromised Web SitesCompromised Web sites act as doorways for visitors and arecontrolled via the SEO kit installed on the site. The SEO
queries. And by late October 2011, the SEO kit started poisoning Mac OEM queries, also long-tail search terms.Image Search. One of the surprising findings from theSEO kit code is the amount of effort placed in poisoningGoogle Image Search. The doorways first started redirecting user traffic from Google Image Search in October 2010.In July 2011, the indexers hotlinked images from Bing tohelp build the SEO page and shortly thereafter the doorways began proxying images instead of hotlinking. By August 2011, the SEO kit began morphing the images, such asinverting them, to avoid duplicate detection. And currently,since March 2012, the SEO kit only redirects traffic fromGoogle Image Search.4MethodologyWe use data from three crawlers to track the SEO botnet and monitor its impact: (1) a botnet crawler for trackingcompromised Web sites in the botnet and downloading SEOdata from the C&C server, (2) a search crawler that identifies poisoned search results in Google, enabling us to evaluate the effectiveness of the botnet’s black hat SEO, and (3) aredirection crawler that follows redirection chains from thedoorway pages linked from poisoned search results to thefinal landing pages of the scams the botmaster uses to monetize user traffic. Table 2 summarizes these data sets, andthe rest of this section describes each of these crawlers andthe information that they provide.4.1Odwalla Botnet CrawlerWe implemented a botnet crawler called Odwalla totrack and monitor SEO botnets for this study. It consistsof a host crawler that tracks compromised Web sites and aURL manager for tracking URL to site mappings.Host Crawler. The host crawler tracks the compromisedWeb sites that form the SEO botnet. Recall from Section 3.2.1 that the SEO kit provides a backdoor on compromised sites for the botmaster through the HTTP request’sUser-Agent field. While this backdoor provides accessto many possible actions, the default response is a simplediagnostic page with information about the compromisedWeb site such as:Version: v MAC 1 (28.10.2011)Cache ID: v7mac cacheHost ID: example.comThese fields show the basic configuration of the SEO kit:the version running on the compromised site, the version ofthe cache it is running, and the compromised site’s hostname. The diagnostic page also reports a variety of additional information, such as the relative age of the SEOkit (for caching purposes), various capabilities of the Webhost (e.g., whether certain graphics libraries are installed),and information about the requestor and request URL (e.g.,whether the visitor arrived via Google Search). While themajority of this information allows the botmaster to debugand manage the botnet, we use the diagnostic page to bothconfirm a site’s membership in the botnet and monitor thestatus of the compromised site.The host crawler maintains a set of potentially compromised sites together with site metadata, such as the representative probe URL for a site and the last time it confirmedthe site as compromised. The probe URL is the URL thatthe host crawler visits for each potentially compromisedsite. Since a given site may have many URLs that link todifferent pages, all managed by the same SEO kit, the hostcrawler maintains one active probe URL per site to limitcrawl traffic. As URLs expire, a URL manager (describedbelow) provides alternate probe URLs for a site. The hostcrawler visits each probe URL twice, once to fetch the diagnostic page and once to fetch the SEO page—the pagereturned to search engines—containing the cross links.The last time the site was detected as compromised influences the crawling rate. The host crawler visits all sites thatwere either previously confirmed as compromised, usingthe diagnostic page mechanism described above, or newlydiscovered from the cross links. It crawls these sites at afour-hour interval. For the sites that were not confirmed ascompromised, for example because it could not fetch the diagnostic page, the host crawler visits them using a two-dayinterval as a second chance mechanism. If it does not detecta site as compromised after eight days, it removes the sitefrom the crawling set. This policy ensures that we have nearreal time monitoring of known compromised sites, whilelimiting our crawling rate of sites where we are uncertain.We used three methods to bootstrap the set of hosts forOdwalla to track. First, in October 2011 and then again inJanuary 2012, we identified candidate sites using manualqueries in Google for literal combinations of search termstargeted by the SEO botnet. Since the terms formed unusualcombinations, such as “herman cain” and “cantaloupe”,typically only SEO pages on compromised sites containedthem. Second, since these pages contained cross links toother compromised sites for manipulating search rankingalgorithms, we added the cross links as well. Interestingly,these cross links were insufficient for complete bootstrapping. We found multiple strongly connected components inthe botnet topology, and starting at the wrong set of nodescould potentially only visit a portion of the network. Finally, we modified the SEO kit to run our own custom botsthat infiltrated the botnet. These custom bots issued requeststo the C&C server to download targeted search terms andlinks to other hosts in the botnet, providing the vast majority of initial set of bots to track. Once bootstrapped, the host
OdwallaDaggerTrajectoryTime RangeOctober 1011 – June 2012April 2011 – August 2011April 2011 – August 2011Data CollectedDiagnostic pages and cross linksfrom nodes of SEO campaign.Cloaked search results in trendingsearches over time.Redirect chains from cloakedsearch results in trending searches.Data PerspectiveSEO Campaign botmaster.Users of search engines.Users of search engines.ContributionCharacterize support infrastructureof SEO campaign.Assess efficacy of SEO campaign.Analyze landing scams.Table 2: The three data sets we use to track the SEO botnet and monitor its impact.crawler used the cross links embedded in the SEO pages returned by compromised sites to identify new bots to track.URL Manager. The host crawler tracks compromisedsites using one probe UR
identify SEO campaigns using a search engine provider's Web graph. They found that analyzing the historical links between Web sites is important to detecting, and ultimately preventing, SEOcampaigns. Ourworkdiffersinthat, while we study a similar SEO kit, we focus on the longitudinal operation of SEO campaigns as organized by an SEO bot-
acai juice, black currant juice from concentrate (water, black currant juice concentrate), lemon juice from concentrate (water, lemon juice concentrate), chicory (root fiber), raspberry juice from concentrate (water, raspberry juice . aÇai 10 superblend .
In addition, Juice HACCP regulations also specify requirements for imported juice. The juice importers must comply with one of the following requirements: Ensure that all juice imported by them has been processed in compliance with the Juice HACCP regulations. Import juice from a co
Vanilla Ice-cream, Milk, Banana 35 Cookie Milk Shake Chocolate Ice-cream, Milk, Cookies 35 MOCKTAILS Cranberry Chill Cranberry Juice, Pineapple Juice, Orange Juice, Ginger Ale 45 Virgin Mojito Mint, Sprite, Lime Juice 45 Fruits Mocktail Mango Juice, Pineapple Juice, Orange Ju
2 ounces grapefruit juice ½ ounce lemon juice ½ ounce lime juice ½ ounce simple syrup Slice of grapefruit 1 sprig fresh rosemary Directions Combine baijiu, triple sec, simple syrup, grapefruit juice, lemon juice, and lime juice into a cocktail shaker and fill ice cubes. Shake well. Strain mixture into a
21-JUICE, 4oz Apple 100% 21-JUICE, 4oz Grape 100% 21-JUICE, 4oz Orange 100% 21-JUICE, 4oz FruitPunch100% 21-JUICE, 4oz AppleCherry100% 21-JUICE, 4oz Org Pnpple100% 20-RAISINS Indiv. Box 20-CRAISINS Indiv. 20-APPLESAUCE, CUP 21-CHICKEN & WAFFLE SAND IW 21-DONUTS, MINI POWDERED SUGAR 21-CEREAL, 2 oz CheeriosHonNut 21-CEREAL, 2 oz Cinn Ric Chx
Kellogg's Sugar Frosted Flakes Post Alpha-Bits Quaker Cap'n Crunch peaches pears grapefruit banana banana banana apple, red delicious apple, mcintosh apple, yellow delicious pear, red/green anjou orange, navel peach/nectarine orange juice - 100% orange juice - 100% orange juice - 100% cranberry-apple juice grape juice pineapple-grapefruit juice
PCA: hypothesis-free approach to analyze longitudinal trends in myopia progression. Hopefully, this presentation can suggest some ideas on how longitudinal data can be used for prediction, and how dimension reduction techniques can be used in longitudinal data analysis. Longitudinal Prediction Feb 3, 2015 33 / 33
A Primer on Longitudinal Data Analysis in Education Longitudinal data analysis in education is the study of student growth over time. A longitudinal study is one in which repeated observations of the same variable(s) are recorded for the same individuals over a period of time. This type of research is known by many names (e.g.,
Longitudinal Data In health science, longitudinal studies are frequently designed to investigate changes over time. In contrast to cross-sectional data wherein measurements are required at only a single time point, longitudinal data have repeated measurements of outcome through a period of
(LMMs) for repeated measures/longitudinal or clustered data In this example, we demonstrate the use of Proc Mixed for the analysis of a clustered‐longitudinal data set The data we will use is derived from the Longitudinal Study of American Youth (LSAY, ICPSR 30263).
Multivariate longitudinal analysis for actuarial applications We intend to explore actuarial-related problems within multivariate longitudinal context, and apply our proposed methodology. NOTE: Our results are very preliminary at this stage. P. Kumara and E.A. Valdez, U of Connecticut Multivariate longitudinal data analysis 5/28
DNA Extraction C – 21 Chemistry in the K–8 Classroom Grades 4–8 2007, OMSI Or—papaya or pineapple juice: Use 1 cup of fresh, frozen (diluted as directed), or canned juice. Make sure juice contains raw, uncooked fruit juice. Notes and Hints Keep the isopropyl alcohol very cold—use the freezer or ice bucket. Give to students as close to the start of the activity as possible.
juice samples, in case of both cultivars, ICSV 93046 and CSH 22SS (Table 2). It is concluded that temperature of 15-18 C would be ideal for storage of fresh sweet sorghum juice after crushing. Table 2. Storage conditions of fresh sweet sorghum juice of two different cultivars, ICSV 93046 and CSH 22SS, at different time and temperature intervals.
Training and certification in Juice HACCP . Juice and cider pasteurization for wholesale . Best Practice . Farm personnel that control cider production are trained and certified in Juice HACCP as required through 21 CFR 120.
2001. This rule requires all juice processors, other than those only selling retail from their farm stand or farmers market, to implement a plan for Hazard Analysis Critical Control Point or “HACCP.” Retailers (juice processors that sell their juice
Ciroc Peach, Malibu Coconut Rum, Triple Sec and Fresh Lime Juice Zombie 13 Cruzan Light, Cruzan Single Barrel, Cruzan 151, Triple Sec, Crème de Cassis, Fresh Lime Juice, Fresh Pineapple Juice and Guava Juice CoronaRita 12 Nearly double the size, Sauza Blue Tequila, Patron Citronge Orange Liqueur and Fresh Sour Mix, topped with an ice cold .
infused Choya Umeshu, Hibiscus Sucker Punch 60 “SNEAKY jungle juice” Bacardi Carta Blanca, Wray & Nephew Over Proofed Rum, Aperol, Pimento Dram, Pineapple Juice, Cranberry Juice, Lime Juice, Pomegranate #Mamatai 65 “Tropical, exotic, lush” Bacardi Carta Blanca, Sailor Jerry, Ly
Juice Cleanse Recipes Hey there! You’re in for a juicy treat. After I completed my 10-day homemade juice cleanse, I got some requests to compile all of my recipes into one document. Here it is - all 10 recipes with minimal images - perfect for printing out and bringing to the grocery store. Use these recipes to create your own juice cleanse
Juice ):8 DC Slice the beet into pieces small enough to t through the tube and run through the juicer (no need to peel). Core the apple you can leave the peel on. Slice it into quarters, or pieces small enough to t through the tube and run them through the juicer. Run the carrot through the juice no need to peel. Add the lemon juice, and
juice with a composite of the top 20 most commonly consumed whole fruit. Model 2 replaced individual 100% fruit juice with the same fruit. The data showed replacing 100% fruit juice with whole fruit resulted in no difference in energy intake and no difference in 85% of nutrients (17 out of 20). Of the three nutrients affected -- vitamin