Margaret Rouse is an award-winning technical writer and teacher known for her ability to explain complex technical subjects simply to a non-technical, business audience. Over…
Proxy hacking is a technique used to attack authentic and original Web pages by replacing them with proxies or clones in an index of a search engine and in the results page. The usual motive of the assailant is to take advantage of their competitor’s site to make money on advertisements or place redirections such as links to direct the users viewing the site to malicious or deceitful phishing websites or websites that may contain viruses and Trojans.
Proxy hacking can also be refered to as proxy hijacking
In proxy hacking, the assailant makes a replica of the original Web page on a proxy server and uses different ways such as keyword stuffing and linking of the replicated site from other external sites to raise its search engine ranking even more than the original site. Because the replica ranks higher than the original site, search engines tend to remove the original site, seeing it as just a duplicate site.
Proxy hacking cannot be stopped entirely, but it can be minimized by limiting network connections from free and open proxy servers which are usually used for shady purposes.
Techopedia’s editorial policy is centered on delivering thoroughly researched, accurate, and unbiased content. We uphold strict sourcing standards, and each page undergoes diligent review by our team of top technology experts and seasoned editors. This process ensures the integrity, relevance, and value of our content for our readers.
Margaret is an award-winning technical writer and teacher known for her ability to explain complex technical subjects to a non-technical business audience. Over the past twenty years, her IT definitions have been published by Que in an encyclopedia of technology terms and cited in articles by the New York Times, Time Magazine, USA Today, ZDNet, PC Magazine, and Discovery Magazine. She joined Techopedia in 2011. Margaret's idea of a fun day is helping IT and business professionals learn to speak each other’s highly specialized languages.
What are Tactics, Techniques, and Procedures (TTPs)? Tactics, techniques, and procedures (TTPs) are the strategic plans, methodologies, and actions an...
Margaret RouseTechnology Expert
What is AI Jacking? AI jacking is a new cybersecurity term that explains a specific kind of cyberattack targeting artificial...
Maria WebbTechnology journalist
What is a QR Code Phishing? QR code phishing, also known as quishing, is a type of cyberattack that involves...
Trending NewsLatest GuidesReviewsTerm of the Day