skip to main content
10.1145/3038912.3052590acmotherconferencesArticle/Chapter ViewAbstractPublication PageswwwConference Proceedingsconference-collections
research-article
Public Access

Pinning Down Abuse on Google Maps

Published:03 April 2017Publication History

ABSTRACT

In this paper, we investigate a new form of blackhat search engine optimization that targets local listing services like Google Maps. Miscreants register abusive business listings in an attempt to siphon search traffic away from legitimate businesses and funnel it to deceptive service industries---such as unaccredited locksmiths---or to traffic-referral scams, often for the restaurant and hotel industry. In order to understand the prevalence and scope of this threat, we obtain access to over a hundred-thousand business listings on Google Maps that were suspended for abuse. We categorize the types of abuse affecting Google Maps; analyze how miscreants circumvented the protections against fraudulent business registration such as postcard mail verification; identify the volume of search queries affected; and ultimately explore how miscreants generated a profit from traffic that necessitates physical proximity to the victim. This physical requirement leads to unique abusive behaviors that are distinct from other online fraud such as pharmaceutical and luxury product scams.

References

  1. Google. Understanding consumers' local search behavior. https://think.storage.googleapis.com/docs/how-advertisers-can-extend-their-relevance-with-search_research-studies.pdf, 2014.Google ScholarGoogle Scholar
  2. Google. Enrich Google Maps with your local knowledge. https://www.google.com/mapmaker, 2016.Google ScholarGoogle Scholar
  3. Google. Guidelines for representing your business on Google. https://support.google.com/business/answer/3038177?hl=en, 2016.Google ScholarGoogle Scholar
  4. Google. Show people you're open for business. https://www.google.com/business/, 2016.Google ScholarGoogle Scholar
  5. Google. Verify a local business on Google. https://support.google.com/business/answer/2911778?hl=en, 2016.Google ScholarGoogle Scholar
  6. Shuang Hao, Kevin Borgolte, Nick Nikiforakis, Gianluca Stringhini, Manuel Egele, Michael Eubanks, Brian Krebs, and Giovanni Vigna. Drops for Stuff: An Analysis of Reshipping Mule Scams. In Proceedings of the Conference on Computer and Communications Security, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Kyle Iboshi. "Pyramid Scheme of Locksmiths" Clogs Portland Market. http://www.kgw.com/news/investigations/pyramid-scheme-of-locksmiths-clog-portland-market/56421738, 2016.Google ScholarGoogle Scholar
  8. Nektarios Leontiadis, Tyler Moore, and Nicolas Christin. Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade. In Proceedings of the USENIX Security Symposium, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. David Segal. Fake Online Locksmiths May Be Out to Pick Your Pocket, Too. http://www.nytimes.com/2016/01/31/business/fake-online-locksmiths-may-be-out-to-pick-your-pocket-too. html, 2016.Google ScholarGoogle Scholar
  10. Kurt Thomas, Chris Grier, Vern Paxson, and Dawn Song. Suspended Accounts In Retrospect: An Analysis of Twitter Spam. In Proceedings of the Internet Measurement Conference, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Kurt Thomas, Dmytro Iatskiv, Elie Bursztein, Tadek Pietraszek, Chris Grier, and Damon McCoy. Dialing Back Abuse on Phone Verified Accounts. In Proceedings of the Conference on Computer and Communications Security, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, and Vern Paxson. Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse. In Proceedings of the USENIX Security Symposium, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Cadie Thompson. Android bot spotted urinating on Apple in Google Maps. http://www.cnbc.com/2015/04/24/android-bot-spotted-urinating-on-apple-in-google-maps. html, 2015.Google ScholarGoogle Scholar
  14. David Y. Wang, Matthew Der, Mohammad Karami, Lawrence Saul, Damon McCoy, Stefan Savage, and Geoffrey M Voelker. Search + Seizure: The Effectiveness of Interventions on SEO Campaigns. In Proceedings of the Internet Measurement Conference, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. David Y. Wang, Stefan Savage, and Geoffrey M. Voelker. Cloak and Dagger: Dynamics of Web Search Cloaking. In Proceedings of the ACM Conference on Computer and Communications Security, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Zhi Yang, Christo Wilson, Xiao Wang, Tingting Gao, Ben Y. Zhao, and Yafei Dai. Uncovering Social Network Sybils in the Wild. ACM Transactions on Knowledge Discovery from Data (TKDD), 2014 Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Pinning Down Abuse on Google Maps

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Other conferences
              WWW '17: Proceedings of the 26th International Conference on World Wide Web
              April 2017
              1678 pages
              ISBN:9781450349130

              Copyright © 2017 Copyright is held by the International World Wide Web Conference Committee (IW3C2).

              Publisher

              International World Wide Web Conferences Steering Committee

              Republic and Canton of Geneva, Switzerland

              Publication History

              • Published: 3 April 2017

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article

              Acceptance Rates

              WWW '17 Paper Acceptance Rate164of966submissions,17%Overall Acceptance Rate1,899of8,196submissions,23%

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader