Online Threat Alerts (OTA)
An anti-cybercrime community alerting the public.

Spamming Websites - sharebutton.org, free-social-buttons.xyz, sharebutton.to and cdn.script.to

The websites: "www.sharebutton.to", "www.sharebutton.org", "www.free-social-buttons.xyz" and "cdn.script.to" are used for referrer spam, or spam or referrer bombing. Referrer spam (also known as log spam or referrer bombing is a kind of spamdexing (spamming aimed at search engines). The technique involves making repeated web site requests using a fake referrer URL to the site the spammer wishes to advertise. Sites that publish their access logs, including referer statistics, will then inadvertently link back to the spammer's site. These links will be indexed by search engines as they crawl the access logs. This technique does not harm the affected sites, just pollutes their statistics.

Advertisements

This type of spamming benefits the spammer because the free link improves the spammer site's search engine ranking owing to link-counting algorithms that search engines use.

A new spam is happening in the digital world, especially in Google Analytics data Called Ghost Spam & Referral Spams with 100% bounce rate. Ghost spam traffic directly interacts with Google Analytics data with measurement protocol system where as referral spam directly influences website traffic. As a result spammers try to increase traffic to their websites.

As with e-mail spam, referrer spam may be filtered or blocked. A website operator may mitigate referrer spam by preventing search engine spiders from crawling the site logs by moving them to a non-public area such as a password-protected area, by using a robot exclusion file, or by appending the nofollow value to the links.

It is found that while some referrer spam pollutes analytics statistics directly, some spammers actually hit the web server. Filtering referrer spam from analytics tools will hide it from the reports but can still continue to consume server bandwidth.to save server bandwidth spammers can be blocked using for example a .htaccess file.

Some information in this article was taken from wikipedia.org.

Related article:

Check the comment section for additional information, or share what you know or ask a question about this article, by clicking the 'View or Write Comment' button below.

Note: Some of the information in samples on this website may have been impersonated or spoofed.

Share this article with others.
Advertisements
Write / View Comments (0)
View on Online Threat Alerts (OTA)
Help Maintain Online Threat Alerts (OTA)