Attackers increasingly are engaging in "IP cloaking" to infect Web visitors, where they bypass malware detection systems by serving them clean pages while they drop malware on visitors to the site, according to a new report by Google's security team.
"Over the years, we have seen more malicious sites engaging in IP cloaking. To bypass the cloaking defense, we run our scanners in different ways to mimic regular user traffic," said Lucas Ballard and Niels Provos of the Google Security Team, in a blog post
Google's research is based on more than four years of data gathered from its Safe Browsing API service. Google's Safe Browsing API is an online database that contains known malware-rigged Web pages and phishing sites. Chrome, as well as Mozilla's Firefox and
Apple's Safari browsers, use the database, as well.