Cyber criminals surfing the Google Wave

High demand for Google Wave invites hasn't gone unnoticed by the criminal community.

Google Wave

Cyber criminals are targeting people interested in Google Wave with email scams and websites filled with affiliate-based advertising.

Security analyst Rik Ferguson told IT PRO that he first noticed a scam on Twitter. Users that click the link were sent to a website that promised a Google Wave invite within the hour, but only if they gave up their Twitter username and email address.

The site had the domain name www.google.com-wave-com.info, which wasn't a real Google address but would be capable of fooling some people.

Ferguson noticed users on the Google Wave support forum were worried about similar activity, highlighting a scam which took a user through pages of special offers before they were invited to surrender details.

Ferguson said that the simple message for people looking for Google Wave was that they couldn't really expect organisations or people who weren't in the position to offer the invite to be able to provide it.

"These are completely independent websites, not affiliated and not sanctioned, clearly with their advertising agenda," he said.

"Whether it's Google Wave, or something else that you really want, don't be taken in by false promises because that's really all they are. Google Wave is all about community and collaboration," Ferguson said. "If you have a friend who gives you an invite and you don't know anyone who's using it, then you're going to get very limited value out of it."

Security firm Websense also noted that Google searches on terms related to Google Wave were leading to rogue anti-virus, thanks to criminals using SEO poisoning techniques.

The tactic isn't new, as criminals targeted Snow Leopard when it came out last month.

Featured Resources

The ultimate law enforcement agency guide to going mobile

Best practices for implementing a mobile device program

Free download

The business value of Red Hat OpenShift

Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShift

Free download

Managing security and risk across the IT supply chain: A practical approach

Best practices for IT supply chain security

Free download

Digital remote monitoring and dispatch services’ impact on edge computing and data centres

Seven trends redefining remote monitoring and field service dispatch service requirements

Free download

Recommended

Iranian hacking group continues to target US citizens
hacking

Iranian hacking group continues to target US citizens

18 Oct 2021
Ennoconn and Google Cloud enter a strategic alliance
Cloud

Ennoconn and Google Cloud enter a strategic alliance

14 Oct 2021
Google Workspace adds Jira and AppSheet integrations
collaboration

Google Workspace adds Jira and AppSheet integrations

13 Oct 2021
Google Cloud reveals edge-focused Distributed Cloud portfolio
cloud computing

Google Cloud reveals edge-focused Distributed Cloud portfolio

13 Oct 2021

Most Popular

Best Linux distros 2021
operating systems

Best Linux distros 2021

11 Oct 2021
Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans
Laptops

Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans

11 Oct 2021
Windows 11 has problems with Oracle VirtualBox
Microsoft Windows

Windows 11 has problems with Oracle VirtualBox

5 Oct 2021