No, we’re not talking about XXX sites, gambling and sketchy pharmaceutical spam. But even good Web sites can go bad. In fact, legitimate sites are often a much more lucrative target for hackers simply because they are trusted by millions of users all over the world. All hackers have to do is use the application on the site to distribute malicious code.
Sometimes it’s as simple as posting a malicious link to the site and redirecting users to a malware site. Other times, they will install malicious code into the Web application or third-party content in a SQL injection attack and then sit back and reap the benefits of the high volumes of traffic
Description: Site hosting
Global rank in malware hosting: 14
uCoz is a free web hosting with a built-in content management system. The modules of the uCoz CMS can be used together to build a fully featured website, or separately, for example as an online shopping platform, blog, webforum etc. As of July 10, 2012, there are more than one million websites created in the uCoz system. uCoz is among the top sites for Russian-speaking users according to Alexa Internet.
Description: General hosting, web services, various other services
Global rank in malware hosting: 12
The site provides you with direct access to Amazon.com’s technology platform and product data. Web services are self-contained functions that can be published and invoked across the web using XML-based protocols. Using Amazon’s Web Services, you can build dynamic, highly-effective web sites and web applications. The site is subsidiary of Amazon.com. It enable you to run virtually everything in the cloud: from enterprise applications and big data projects to social games and mobile apps, offered over the Internet by Amazon.com.
Following swiftly on the heels of the social networking giant Facebook is Twitter, and its popularity has not gone unnoticed by hackers. The micro-blogging site is a rich playing field for malicious attacks, which usually come in the form of infected URLs that download malware onto users’ computers. Meanwhile, hackers routinely exploit the trust users have by spoofing users’ profiles and then tricking contacts into opening an infected link via some social engineering scheme.
Description: File hosting
Global rank in malware hosting: 10
4shared.com offers online file sharing and storage – 15 GB free web space with easy registration. The site shows File upload progressor, and it offers multiple file transfer, fast download.
It stands to reason that the most visited site on the Internet would also be a prime target for hackers. Google is routinely exploited by attackers who use search engine poisoning techniques to get malicious sites up to the top of the search page rankings. Then hackers count on the fact that users who type in search terms naturally gravitate toward the links at the top of the site.
Meanwhile, hackers have also targeted Gmail users and popular Google apps, such as Google Docs, which have been vulnerable to attacks that aim to access users’ personal and financial information for identity theft purposes.