Spammers hack into popular websites that have high rankings on search engines like Google and then insert keyword rich links and redirects to other websites. This type of spam cloaking is the new trend.
What is Spam cloaking?
Cloaking is a spamming technique in which the content presented to the search engine spider is different from the content presented to regular users.
This is done by delivering content based on the user-agent HTTP header of the user requesting the page, the IP address of a user or the referring page:
* When a user is identified as a search engine spider, a server-side script delivers a different version of the web page.
The search engine spider can be identified based on the IP address and on the user-agent HTTP header.
* When a user comes from a particular page (for example a Google search result page), the web server delivers a different version of the page than users get when they enter the URL of the page directly in the browser.
These methods can be combined. A web page can be cloaked based on the IP address, the user-agent, referring web page or any combination of these three factors.
How do spammers abuse your website?
Many websites have security holes. Spammers use them to hack into your server and to change the content of your web pages. They can do the following with your pages:
* They insert keyword rich links to spammer sites on your web pages. These links are only visible to Google’s indexing spider. For Google, it looks as if your website is endorsing the spammer website with a link.
* They redirect your website visitors to their own pages. Google gets your regular page. People who visit your web pages after clicking on your website listing on Google’s search results will be redirected to the spammer website.
How can you find out if spammers abuse your site?
* Search Google for “site:yourdomain.com” (replace yourdomain.com with your own domain). Browse through the search result pages and check the titles and descriptions that Google uses for your web pages. Click on a listing to make sure that visitors are directed to the correct page.
Use these tips to find out if hackers have changed the content of your web pages. To make sure that hackers cannot abuse your website, use the latest version of your content management system (CMS) and install the latest security updates.