View Full Version : Search Engine Poisoning...
SEO poisoning attacks - researched
March 31, 2010 - "Regular readers will have seen numerous recent SophosLabs blogs describing how attackers are poisoning search engine results in order to hit victims with malware. In recent months, these type of Search Engine Optimisation (SEO) attacks have become a route through which fake anti-virus malware is being distributed. One thing common to the attacks is that the SEO pages are hosted within legitimate sites. This makes it harder for the search engines to identify the rogue pages, and exclude them from search results. It also lets the SEO pages piggyback on the reputation of that host site, which may help boost the search engine ranking... SophosLabs have published a new technical paper* that describes how these SEO attacks are being managed, by analyzing a selection of the kits that are being used by the attackers..."
SEO poisoning - 2010 Masters
April 12, 2010 - "For cyber criminals, distributing malware is as easy as increasing the Google page-rank of a malicious landing page. But before cybercriminals can do that, they need to ride on a hot topic that people are currently searching for... take an example of a current hot topic: "2010 Masters"... We have noticed that most search results point to a malicious PHP webpage... If you are unfortunate enough to click on one of these malicious links, it will point you to the usual fake antivirus scanner page and ask you to install a fake antivirus executable. After installation, this rogueware asks you to pay a fee to “disinfect” your machine of bogus malware... To make sure the fake antivirus doesn't get caught by any real malware detection tool, it stops your favorite antivirus and other security monitoring tools from running. It adds a key to the registry, so that instead of executing your antivirus process, the malware will execute a legitimate Windows program SVCHOST.EXE. Furthermore, the fake antivirus edits the Windows hosts file preventing Google, Bing and Yahoo search engines from opening in a browser, instead directing you to a malicious IP address... when doing your online searching, be wary and don't automatically trust search results especially when using Google."
Search Engine results continue to be poisoned
April 26, 2010 - "... poisoning search engine results with links to fake antivirus software is an effective way for attackers to infect users’ machines. As such, we constantly track search results for malicious links... Hackers clearly have a vested interest in ensuring their attacks are effective in poisoning Google results, most likely because of its large market share — Google’s breadth and speed of indexing will also play a role.
• On average at any given hour, 3 out of the top 10 search trends contained at least one malicious URL within the first 70 results.
• On average, 15 links out of the first 70 results were malicious for search terms that were found to be poisoned (had at least one malicious URL).
• On average on any given day, 7.3% of links are malicious in the top 70 results for top search terms.
• The most poisoned search term resulted in 68% of links leading to malicious pages in the first 70 results
• Almost all of the malicious URLs redirect to a fake antivirus page...
While attackers are sometimes more successful in poisoning certain search terms, this is primarily due to luck. They use an automated system to determine which terms to poison... These days, the attackers continue to be effective at poisoning search results. They have an automated infrastructure that is able to automatically collect the latest, most popular search trends and poison the results. So, be careful when clicking on search result links, especially when searching for hot search topics..."
(Screenshots and graphs available at the URL above.)
SEO poisoning attacks - new variants...
July 14, 2010 - "Using search engines and watching videos are two of the top Internet activities that users do on a daily basis. In the threat landscape, this usually translates to threats such as blackhat SEO attacks, malicious pages crafted to look like YouTube pages, and, as we recently found out, attacks that use -both- blackhat SEO and malicious YouTube-like pages. In the recent attack that we saw, query results... were found to initially lead to YouTube-like pages before displaying the all-too-familiar fake malware infection warnings. The results are most likely to be compromised sites, all injected with search keywords that will lure users into visiting them... page may trick the user into thinking that the link that they’ve clicked leads to a video, and that they need to install Adobe Flash Player to view it... the cybercriminals behind this attack have a keen eye for detail; not only did they use a convincing interface for the fake Adobe installer, they also used a URL that strongly suggests that it is an Adobe-related site. This is a very notable change, since blackhat SEO attacks have been known to bring about FAKEAV variants specifically. These changes are just a few that we’ve seen. Blackhat SEO attacks no longer just ride on the popularity of big news, as it did before. SEO poisoning attacks are being deployed every day, tainting searches and bringing forth malware..."
Google - malicious search results...
July 30, 2010 - "According to a newly released report by Barracuda Labs, based on a two-month study reviewing more than 25,000 trending topics and 5.5 million search results, Google remains the most popular search engine used by malicious attackers, relying on poisoned keywords. The company, which also sampled Yahoo Search, Bing, and Twitter, contributes Google’s leading position to the fact that Google remains the market share leader in online search, and consequently the most targeted search engine..."
New Massive BlackHat SEO Attacks
August 1st, 2010 - "... websites hacked and used in a new campaign of blackhat seo attack with the objective to -redirect- all users to very dangerous websites that spread the infamous and well known rogue security software and the other dangerous threats such as TDSS rootkit and Zeus..."
(Hijacked keywords and summary of malicious domains at the URL above.)
Halloween SEO poisoning...
2010-10-30 - "Attackers are targeting people searching for last-minute ideas on Halloween costumes... CyberDefender identified a fake anti-virus Trojan downloader infecting pages that come up when searching for Halloween costumes. When users land on these infected pages, the fake anti-virus installer hijacks the user’s Web browser and initiates a malicious process, CyberDefender said. The infected PC becomes sluggish and slow-performing while exposing personal data, according to the company. One form, identified by Panda Labs*, displays a fake video player page and asks the user to download a codec in order to play the video. Popular search terms reflect what users are interested in at that time, making it a lucrative target. Criminals often create pages that are highly search engine optimized, with keywords reflecting currently popular search terms... Called SEO poisoning, hackers create these pages that Google and other search engines pick up thinking they are legitimate, and return them when users type in the search terms..."
"... top 5 most targeted phrases:
1. Halloween costumes
2. Halloween decorations
3. Halloween ideas
4. Adult Halloween costumes
5. Free pumpkin pattern ..."
SEO Poisoning - Election results...
Last Updated: 2010-11-02 21:36:09 UTC - "We have seen a couple of instances of search result poisoning for election related search terms..."
01 Nov 2010 - "... some search terms related to the ongoing event return sites employing black hat SEO... some of the infected sites already come with a warning. However, there are still a handful of Web sites that do not have warning messages attached to them. Search terms used in this attack include:
2010 midterm election
midterm election results
midterm election 2010
midterm election latest polls
midterm election 2010
midterm election season
midterm election latest polls gallup
At the time of writing, the black hat SEO'd sites appear benign, only redirecting users to what appears to be a blank page. A closer look at the code reveals that the page contains a URL to a rogue AV site... If you copy and paste this URL in your browser, it will redirect you to the rogue AV download page which prompts the user to download inst.exe, identified by 10 of 43 VirusTotal engines*..."
File name: inst.exe
Submission date: 2010-11-01 17:02:16 (UTC)
Result: 10/43 (23.3%)
2 Nov 2010 - "... we spotted further activity on what appeared to be blank pages from the Black Hat SEO... This particular attack is browser-aware, as the threats are specific to the browser being used... As of the time of writing and publishing this blog, the coverage for the file download prompts for both IE Flash Update* and Firefox Flash update** was about 27.9%* as confirmed by VirusTotal."
(Screenshots available at the URL above.)
File name: v11_flash_AV.exe
Submission date: 2010-11-02 15:22:59 (UTC)
Result: 12/43 (27.9%)
File name: firefox-update.exe
Submission date: 2010-11-02 15:23:10 (UTC)
Result: 12/43 (27.9%)
SEO poisoned search results - Prince William / Kate Middleton
16 Nov 2010 - "... attackers have the process down to a science. They monitor breaking news, trending topics, and buzz words, then automatically manipulate search results based on what's happening in the world... searching for news and buzz words is now more dangerous than searching for adult content, with approximately 22.4% of all searches for current news leading to malicious search results..."
November 16, 2010 - "The British royal family announced today that Prince William will marry his long-time girlfriend Kate Middleton next year. Every news source on the planet is gushing and the dark side of the Internet is taking advantage of the news coverage. Surf with care. A Google search for “Kate Middleton” results in a poisoned link..."
17 Nov 2010 - "Ever noticed a magnifying glass next to your Google search results lately? It is actually a new service that Google launched last week called Instant Previews. This service allows users to see what a page looks like before going to it by hovering or clicking the magnifying glass next to the Google search results. Simple? Yes. Secure? Not so much. Our research shows that the images shown in Instant Previews is not updated as frequently as anyone might assume. Therefore, we don't think this feature would help users as much in making an informed decision on judging whether a link is indeed malicious or not... We reported some Black Hat SEO'd websites from searches relating to Prince William's engagement yesterday. Using Google's Instant Preview on the malicious search results may lead users into believing that the links they're clicking on is actually safe when in fact it's not..."
17 November 2010 - "... The process of manipulating search results - black hat search engine optimisation - has been going on for at least three or four years and is increasingly becoming automated. Hackers affiliated with scareware outfits in the Ukraine, Russia and elsewhere carry out the coding work."
Infected searches (chart)...
17 Nov 2010 - Filed under: Rogue AV, Blackhat SEO
SEO poisoning subject: Korea...
Nov. 23, 2010 - "News outlets all over the world are talking about the recent cross-border clash between North and South Korea... Within -hours- of the incident, certain Korea-related search terms were already poisoned... This malware redirects users to different pages based on their browser..."
SEO poison missed by Google...
January 21, 2011 - "Attacks that use search engine optimization to push malicious pages into the top rankings on search engine results are on the rise in 2011, but new research from zScaler* suggests that efforts to identify and block the pages are paying meager dividends. A blog post by Web security firm zScaler* notes that Google's own data shows it spots just more than one in two malicious links served up by its search engine. Google reports that they are flagging 52 percent of all malicious links rendered by their search engine. When it comes to malicious links that lead to malware infected pages, Google flags a slightly higher 57 percent. Still, this only accounts for 44 percent of all spam across the Web..."
Be Careful What You Search For ...
18 Jan 2011
Massive Blackhat SEO Malware Campaign Launched
January 25, 2011 - "On January 23rd, thousands of machine generated attack sites were registered through GoDaddy via DNSPod name servers. These sites generally include a name of 5 characters in length, and utilize the .info TLD. The sites combine black hat SEO poisoning with virulent malware infections. At least one anti-virus vendor has labeled the infections as "not disinfectable". The structure of these sites take two forms. The attack sites utilize a technique known as wild card DNS. This enables an infinite number of subdomains to be created for a single domain name. Sites like pgkqy.info... refer to as the hounds, contain over 6000 links to the attack sites. The hounds' content (6000 links) consists of 200 links to the subdomains of 30 different attack domains... The hounds' large number of links serve to boost the search engine rankings of the attack sites. The attack sites themselves are littered with keywords and phrases designed to poison search engine results, and lure the unwary. These include references to celebrity sex scandals, teenage sex, and so forth. The attack sites also contain machine generated text consisting of numerous paragraph length narratives (in English and Mandarin). Inserted among these narratives are out of context messages, which resemble coded messages... One of the sites distributing malware to the visitors of the attack sites (code1.2bj.cc) has previously distributed malware deemed "exact, not disinfectable" by F-Prot. In that incident, anti-virus detection rates were approximately 50%... both hound site dsqof .info and attack site bjpwn .info are at 126.96.36.199. -All- are utilizing f1g1ns1 .dnspod .net as a DNS server. We will pinpoint more hostile IP addresses as time permits. You can pursue further investigation with the use of this file:
- http://doc.emergingthreats.net/bin/viewfile/Main/RussianBusinessNetwork?rev=1;filename=includes_skynet.txt ..."
(Note "RussianBusinessNetwork" in the URL...)
SEO poisoning - Google Image search...
21 Apr 2011 - "... Websense... has detected that Google Image search returns poisoned pictures when searching on celebrity child "Presley Walker". We first found on Monday that all the image search results took users to a notorious exploit kit – Neosploit. Later, it changed to redirecting users to rogue AV sites. As we publish this blog, the search results are -still- poisoned and are leading to Neosploit again... From the chain, we see the third URL is the malicious site holding the exploit code. We found that all the exploited sites are hosted on the same IP 188.8.131.52, and interestingly, they constructed it with the same path named TF19, which looks like a pattern of this campaign. At last it will trigger appropriate vulnerabilities targeted by this exploit kit according to the user's operating system and browser... we see it downloaded a PDF file that targeted -three- Adobe Reader vulnerabilities. This PDF file is heavily obfuscated and has a relatively low VirusTotal detection*... Neosploit is a well-known exploit kit in the black market. The authors reportedly stopped supporting and updating the exploit kit due to financial problems, but variants of Neosploit have been updated frequently. The variants may contain MDAC (CVE-2006-0003), ActiveX (CVE-2008-2463, CVE-2008-1898), and three Adobe Reader (Collab.getIcon, Util.Printf, Collab.collectEmailInfo) vulnerabilities, among others..."
File name: neosploit.pdf
Submission date: 2011-04-19 08:16:48 (UTC)
Result: 6/40 (15.0%)
Blackhat SEO and Osama Bin Laden
May 2, 2011 - "As always, when big news appear in the press the bad guys start blackhat SEO campaigns in popular search engines trying to lure users to install Rogueware. It's not different this time, with the top news about Osama's Bin Laden death being everywhere. The bad guys were quite fast and started to poison searches results in Google Images. Some of the search results are now leading users to malicious pages..."
May 2, 2011
May 2, 2011
(See previous post in this thread!)
Blackhat SEO, Osama Bin Laden’s death, Rogue AV
May 3rd, 2011 || 0day, New Domains, rogue antivirus - "... Searches on “Osama Bin Laden Body” * are leading users to malicious rogueware domains:
antivirus. cz. cc/fast-scan/ and pe-antivirus. cz. cc/fast-scan/hese
... domains will be blocked on the next update but you shouldn’t wait..."
May 2, 2011 - "... went from seeing fewer than 1,000 URLs containing the terms 'osama', 'usama' or 'laden' on Sunday afternoon, to a peak of over 4 million** by 10am PST on Monday morning..."
File name: file-2191417_
Submission date: 2011-05-03 15:01:19 (UTC)
Result: 35/41 (85.4%)
Osama malware scams spread to Facebook
3 May 2011
May 3, 2011
May 3, 2011
02 May 2011
02 May 2011
WebbyAwards hacked - compromised w/Blackhat SEO
May 4, 2011 - "The WebbyAwards web site (www .webbyawards .com) is currently hacked and compromised with Blackhat SEO. If you try to search for it on Google you will get a warning saying that “This site may be compromised” * ... if you look at the source code of the page, you will see thousands of hidden spam links in there (about selling Windows vista, buying office, etc) pointing to gl.iit .edu:8080, www .korea .edu, www .gefassembly .org, www .ncsconline .org and car .dost .gov .ph. Yes, all “important” and high PR sites (one university, two .gov sites, etc)... We have no details on how it was compromised yet, but we will keep you posted (if we hear back from them)..."
Scammers - Google Images - malware
May 6, 2011 - "A picture may be worth a thousand words, but a single tainted digital image may be worth thousands of dollars for computer crooks who are using weaknesses in Google’s Image Search to foist malicious software on unsuspecting surfers. For several weeks, some readers have complained that clicking on Google Images search results directed them to Web pages that pushed rogue anti-virus scareware via misleading security alerts and warnings. On Wednesday, the SANS Internet Storm Center posted a blog entry* saying they, too, were receiving reports of Google Image searches leading to fake anti-virus sites. According to SANS, the attackers have compromised an unknown number of sites with malicious scripts that create Web pages filled with the top search terms from Google Trends. The malicious scripts also fetch images from third-party sites and include them in the junk pages alongside the relevant search terms, so that the automatically generated Web page contains legitimate-looking content. Google’s Image Search bots eventually will index this bogus content. If users are searching for words or phrases that rank high in the current top search terms, it is likely that thumbnails from these malicious pages will be displayed beside other legitimate results... Rogue anti-virus scams almost invariably rely on malicious scripts that can be blocked by the excellent Noscript add-on for Firefox, which lets you decide which sites should be allowed to run scripts.
If you happen to stumble upon one of these fake anti-virus security alerts, stay calm and avoid the urge to click your way out of it. Instead, simply hit Ctrl-Alt-Delete (Task Manager), select the browser process you are using (firefox.exe, iexplore.exe, etc.) and shut it down..."
Last Updated: 2011-05-04 08:04:42 UTC
If someone was told there's a minefield out there, and also the area where it was located, why would anyone choose to go through it anyway? 'Don't know, but they do.
Common sense dictates avoidance, at least - look for another way to get whatever it is you're looking for. There are -always- alternatives...
... until things calm down and they get a handle on fixing the problem.
SEO poisoning @ MS Safety and Security Center ...
July 08, 2011 - "The MS Safety and Security Center (leads to)... porn redirects, and sleazy porn sites invariably lead to malware... blackhat SEOs are seeding illegimate search results within the Microsoft search results... It's Zugo*,a Bing-branded search toolbar with a history of being installed through exploits and other misleading/deceptive means... hope this all gets cleaned up soon..."
File name: XvidSetup_US.exe
Submission date: 2011-07-12 15:19:35 (UTC)
Result: 2/43 (4.7%)
11 July 2011
SEO poisoning - hijacked sites serve up exploits ...
September 12, 2011 - "... nasty SEO poisoning scam over the last few days, targeting 9/11 related search terms (alongwith anything else they can get their hands on) to attempt the infection of vulnerable PCs. They use a combination of the Black Hole Exploit Kit and an interesting "on the fly" SEO poisoning tactic to try and drop infections onto the target PC... an example VirusTotal link* to one of the pieces of Malware being used - as you can see, 21/44 currently detect it. As with most attacks of this nature, you can expect to see multiple domains, files and search terms used to lure potential victims. Speaking of search terms, the people behind this are doing some interesting things with their poisoned search results... Keeping your system patched and your security software up to date is a good place to start with regards to avoiding these kinds of attacks, in addition to running a Limited User Account and (perhaps) some browser based script blocking tools such as NoScript..."
(More detail at the sunbeltblog URL above.)
File name: file.vxe
Submission date: 2011-09-09 00:24:22 (UTC)
Result: 21/44 (47.7%)
Another round of bad ads in Bing
September 19, 2011 - "We're seeing some more bad adverts popping up in Bing - just like the original attack, these results are served with very basic search terms so it's pretty easy to stumble into one of the bad URLs... when searching for "Flash player download"... the end-user arrives at malaysiaaktif(dot)com/flash and the fake Flash Player file is served up from dl-softonic(dot)net (a slight change from the original URL used to push the files which flatlined a few days ago*)... be careful when searching for basic tools, programs and files in Bing until these rogue adverts have a healthy dose of "put in jail and throw away the key" applied to them..."
(Screenshots available at the sunbeltblog URL above.)
Blackhat SEO - mass spam Infection ...
September 21, 2011 - "... blackhat SEO attack that was infecting many WordPress sites with spam... the attack consists of contacting the domain wplinksforwork .com to get a list of links to be displayed on the compromised sites... sites compromised (if they have display errors enabled), have this message in their footer... we checked on Google to see how many they have found lately with this error and it is an astonishing number of almost 50k pages... At the time of our first analysis, most of the hacked sites had outdated versions of WordPress installed. Some of them were not, but we assume they upgraded after the fact, and never cleaned up the spam from their themes (yes, it hides in themes and in the database). So, if you keep WordPress updated, you’re likely safe. In any case, you can check via our free scanner to verify:
Domain name: wplinksforwork .com ...
More bad ads in Bing
September 29, 2011
More... Rogue ads on Bing (and Yahoo)
October 13, 2011 - "... Microsoft needs to get a handle on ad placements on Bing. Ok, so Bing isn't the most widely used search engine, but remember that Yahoo plays a part here as well. In this case, we're talking Sirefef (ZeroAccess aka Max++), probably the nastiest piece of malware circulating on the 'net right now. Sirefef kills any attempt to remove it, and is nearly impossible to clean (short of booting onto a rescue disk and performing cleanup actions, or reformatting). So just search for "adobe flash"... (That same search term will look identical on Yahoo, since Yahoo displays Bing ads and search results.) Which leads to an innocent-looking "download flash" page... the page isn't actually "GetAdobeFlash.com". Instead, it redirects to a directory on a compromised trucking site (arulbrothers .com), downloading a file from torreandaluz (dot) com/flash/Flash Player 10 Setup.exe . So let's download that Flash Player and run it through VirusTotal*..."
File name: Flash Player 10 Setup.exe
Submission date: 2011-10-13 12:04:15 (UTC)
Result: 17/43 (39.5%)
Olympic scams in Google AdWords ...
1 Feb 2012 - "... a Google search for "olympic tickets" resulted in top-of-the-page placement of sponsored sites for vendors selling tickets without permission from Olympic authorities, which is a criminal offense in the U.K. under the London Olympic Games and Paralympic Games Act 2006... The prominent display of sponsored ads tends to confer on them a sense of legitimacy. Users may assume that Google has approved the businesses, or at least stands behind them in some way. But in response to a complaint from a would-be Olympic ticket purchaser, Google said, "While Google AdWords provides a platform for companies to advertise their services, we are not responsible for, nor are we able to monitor the actions of each company"... One URL yielded 500 backlinking URLs in categories such as Adult Material, Gambling, Proxy Avoidance, Potentially Unwanted Software, Suspicious Embedded Links, and Malicious Embedded Links. A set of 375 backlinks for another URL found that 104 (27.73%) included various kinds of objectionable content, including security risks (the remaining URLs either had no backlinks or had backlinks for legitimate sites such as News and Media, Business and Economy, and so on)... With Google searches as with everything else, do your own "due diligence" before making a transaction, even if the business is at the top of the page. In the case of London Olympics tickets, the official website includes the handy ticketing website checker* that we used to determine if a URL is recognized as an authorized vendor..."
Feb 3, 2012 - "... Google remains the subject of an inquiry by both the EU's competition authority and the U.S. Federal Trade Commission into how the company ranks its search results..."
Cyber Monday - Beware of Cyber Criminals
Nov 20, 2012 - "Black hat search engine optimization (SEO) attacks will be rampant this week leading up to Cyber Monday, so beware!... Throughout the year, cyber criminals -target- the most commonly searched keywords, phrases and topics and taint search engine results. They -poison- apparently relevant links, which appear higher than legitimate results, leading unsuspecting victims to malicious sites. This time of year, black hat SEO attacks typically scam those searching for Thanksgiving recipes, holiday shopping sales and gift guides. Search engines have learned cyber criminal tactics and weed out malicious links. But don’t let other SEO tricks ruin your holiday festivities... What’s the bottom line? If a deal looks too good to be true, you’re probably right! You know this already, but with fierce competition among retailers to offer the lowest price, you may be tempted to click a malicious link. If a link seems even a little suspicious, verify it first. Beyond search engines, protect yourself on social media and email as well. Expand short links with a tool like Untiny* to make sure they’re authentic. If you’re accidentally redirected to a rogue site, of course, don’t download any software or fill out any surveys..."
"... the "free lunch" or more to the point 'free gift card' or 'free hugely popular consumer electronic device' is offered in return for the simply filling in an online survey or completing a qualifying purchase in order to secure that vastly more expensive item. Commonly these scams utilize emails and social network posts claiming to be from popular brands informing you that 'You have received a gift card from us' or 'Giveaway'. The links of course, if not leading you to malicious websites that could potentially compromise your machine, lead you through a series of sites to harvest your personal information and/or entice you into purchasing memberships, ebooks and other items all in order to secure that great freebie. Once harvested, your data at best could be passed to marketing organizations to further target you, or at worst for identity fraud..."
"Enter a URL to see if it contains malicious content.
A free service..."
132 counterfeit sites seized in Cyber Monday blitz
Nov 26, 2012 - "U.S. and European authorities seized 132 domain names in a counterfeit goods crackdown linked to Cyber Monday, the online bargain day, the head of U.S. Immigration and Customs Enforcement said. The sites, many linked to organized crime, were selling fake goods that ranged from National Football League jerseys and Nike Inc shoes to Adobe Systems Inc software, he said... ICE agents seized 101 domain names in the United States and 31 were taken over by officers in Britain, Romania, Belgium, France and Denmark and by Europol, the European Police Office, ICE Director John Morton said... The Cyber Monday seizures raise the total number of U.S. sites taken over to 1,630 since ICE began its anti-counterfeit campaign in June 2010..."
MSN Messenger - now SEO malware ...
March 19, 2013 - "Microsoft recently announced the shutdown of its popular IM client MSN Messenger, which will be replaced by Skype, but its end represents the beginning of malicious attacks posing as the installer of the software. Cybercriminals already started to use this fact in their attacks, registering malicious domains, buying sponsored links on search engines, tricking users to download and install a malware masquerade as the MSN installer. MSN Messenger is still very popular in several countries; Microsoft informed that the service has more than 100 million users worldwide, approximately 30.5 million of them in Brazil. As an escalated migration of all users is planned, it's getting harder to find the installer of the program and this is the window of opportunity exploited by Brazilian cybercriminals aiming to infect users looking for the software. In a simple search on Google for "MSN messenger" the first result displayed is sponsored link of a malicious domain aiming to distribute the -fake- installer, which is actually a Trojan banker...
... download of the fake MSN installer:
Other malicious domains created with the same purpose, some of them already deactivated, are as follows:
We believe this is the first of several expected attacks that use the end of MSN Messenger as bait. As we approach April 8, the day chosen by Microsoft to permanently shutdown the service (April 30th in Brazil), we advise all users to -avoid- looking for the MSN installer and migrate their account(s) to Skype. And the sooner the better to avoid becoming victims of attacks like this."
Bing Ads lead to Blackhole powered Sirefef malware
March 25, 2013 - "... found rogue adverts in Bing, leading end-users to pages serving up Sirefef Malware via the Blackhole Exploit Kit. The searches weren’t obscure or particularly complicated – in the below example we’re searching for 7Zip:
... The above would lead end-users to a .pk site (.pk is Pakistan, in case you were wondering) which appeared to be serving up content related to the Neutrino exploit kit. We reported the ads to Microsoft who seem to have killed off the relevant adverts, but end-users should be advised that there may well be more of them out there. Additionally, some of the exploit sites are coming in and out of rotation – that is to say, some of them will lead nowhere for a while, only to come back to life serving up more badness. At least some of this is targeting users by region – some pages wouldn’t load until the researchers examining them changed their location. Bad ads come around every so often in most search engines, and checking a site out before deciding to click an unfamiliar sponsored link may save you a lot of trouble further down the line. The most straightforward of searches can quickly lead you to a site trying to exploit your PC, and a splash of caution will do you the world of good."
- Chris Boyd