CopyPastehas never been so tasty!

Hackers Use Code To Download Viruses To Your Computer

by anonymous

  • 0
  • 0
  • 0

How heart-wrenching is it to find out after adding Google Analytics to your website that the added code contains malicious codes, designed to download viruses on your visitors computers? Well, that is exactly what is happening to many website owners who have added the Google Analytics code to their websites. Now, a lot of us have heard of the computer viruses, bugs, Trojans, and even the increasingly popular malware, but exploit, that may be a new one on many. Exploit is a piece of software, a line of code, or a number of commands, that has evil designs on your computer.

It originates from the French word of the same spelling and it's literal meaning is achievement.One website owner said that on March 16th, three of his website members reported that his UK- based website was attempting to download a virus to their computer. The webmaster and his team then deployed a barrage of investigative measures, which revealed that it was indeed a piece of malicious exploit code hidden within the Google Analytics tracking code that was attempting to download the virus to people's computers. These malicious program producers gain access to an unsuspecting website by using a compromised password and then plant virus-producing exploit codes within the Google Analytics Javascript code block. Therefore, people should not get the wrong impression and start blaming the Google Analytics code for being malicious. It is added code by the perpetrators that is malicious, not the Google code itself. In effect, it is the Google Analytics code that is compromised by the hackers, just wanted to make that clear.

Another method of exploit code is the actual injecting of malicious scripts by websites indulging in such practices. An example of such a website was discussed by the Google support staff in the support forum. The Support Staff gave actual names of the programs and websites suspected of delivering viruses to compromised websites. In the event of a Google Analytics exploit, web-masters should check their server access logs for any kind of suspicious request. These request will most likely be made by the suspected malicious program because computer viruses can be injected into the HTTP request protocol, according to a Google support forum member. The rule of thumb for website owners is to always take extra precautions in password security by changing passwords frequently. A name, date of birth should never be used as a password. In fact, passwords should have letters, numbers, ans special character combinations to make them very difficult to figure out.

Add A Comment: