![]() |
Bunch of new thiefware testing 4 U
A guy at the zoo is running a bunch of sponsor tests on an infected machine.
http://www.gfy.com/showthread.php?t=722960 attn: Hoes.com This post show something happening on your site http://www.gfy.com/showpost.php?p=12236585&postcount=39 |
Does a Zango pop-up at a site mean that that particular domain is somehow sponsoring that pop? Or does it mean that the scumware is targetting that domain for some other reason?
|
Maybe both, or maybe they are popping because of a sponsor link on the page.
Apparently Hoes isn't the only LL/TGP that it is happening on. Until sponsors put in place backend checks for this shit, canning individual affiliates using it isn't going to accomplish much. I believe there is a way for sponsors to get on an excluded list also, so perps can't send traffic to their sites, or use their trademarks/domains. Remember these low lifes can even steal your typein/SERP traffic, thus causing you to payout to them, what should have been 100% profit signups. |
Quote:
|
Quote:
|
Quote:
Or worse they actually buy into the "voluntary install" crap and actually believe that this is a service to them and not a huge disservice. |
Quote:
Just as an example, adwaresucks is getting about 180k unique visitors/month. And it doesn't seem to be dropping. |
Sexsearch.com.. seems to be a big supporter of Zango traffic.
"Contact us let's make a deal... We'll sell you your stolen traffic back at a discount!" Good shit... Am I correct on this thinking or am I way off base here? I am sometimes wrong.... |
Quote:
|
That's what I mean too Useless. If you look at the pop ups, they are for different programs. If you were running the same programs, they would pop up on your sites too.
When I tested adwaresucks, I used link-o-rama with my machine infected to see how it worked. It wasn't a link-o-rama keyword that caused it...it was a sponsors program. |
Quote:
|
I think if someone does buy a keyword for a specific site, it would only work for a very short time. With Greenie using the htaccess file, zango users get redirected to adwaresucks. So, any link-o-rama keyword is worthless.
|
I just read the thread again and I think they are just using tommys and hoes for testing. I am surprised that they aren't using some sort of htaccess file to take care of that.
|
Oh yeah, if anyone is worried about their site being targeted, they can create an htaccess file here
http://adwaresucks.com/webmasters/ And since nobody makes a dime from adwaresucks, you can change the target site to anyplace you like. Or even create your own zango page on our server using css. |
Quote:
Not that my site has been targeted or is big enough to become a target, but I have used your htaccess fix and now I won't worry. :D |
Here are some more about people using this stuff:
http://www.gofuckyourself.com/showthread.php?t=728914 Note this: http://www.sophos.com/security/analyses/trojzlobpe.html Quote:
|
Looking into these counter measures in Dealing with Zango (via .htaccess), can't they simply cloak the user agent to avoid this in future versions?
It is a good idea what you are doing and it is great that it works for now, but I don't think this defense will hold for long. If I can think up this simple way to get around it, I'm sure the team of programmers they undoubtedly have could too. :( |
Hey Jim: |waves|
Did you catch this site mentioned by Adam from Wild Cash? http://stopbadware.org/ You might want to hook him up with http://adwaresucks.com/ |
How come these fuckwits are allowed to get away with it?
I've noticed flashcash sites using AFF in an exit console, seems unusual to me so is that part of all this? |
All times are GMT -4. The time now is 08:32 AM. |
Powered by vBulletin® Version 3.8.1
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
© Greenguy Marketing Inc