Spammers exploit open redirects on US government websites

Spammers exploit open redirects on US government websites

GOV. Image from ShutterstockWould you trust a URL which ends with .gov?

US government websites have been left with egg on their faces, after spammers exploited sloppily coded redirect code to redirect gullible internet users into visiting “make money fast” websites.

There are plenty of situations where it can be helpful for a website to redirect users elsewhere on their own site, or to affiliated websites.

But no-one wants to make it easy for spammers and cybercriminals to trick users into believing they are visiting one website, but in fact take them some place where they will be scammed or – worse – have their computer infected.

Unfortunately, there are plenty of open redirects out there, waiting to be exploited.

For instance, at the time of writing, anyone can create a link which exploits an open redirect on a US .gov website to point to wherever they wish.

In the following example, the link ends up at Naked Security:

In that example, just looking at the link means it’s easy to tell that you are going to end up at Naked Security. But what if you shortened the link with a URL-shortener such as

Then you can provide a link which looks like

It’s not so easy to tell that it’s going to end up at Naked Security now, is it?

According to researchers at Symantec, spammers are using precisely this technique to redirect gullible net users into click on what look like legitimate .gov URLs.

The scammers’ shell game is enabled by an agreement between and that enables .gov or .mil URLs to be shortened into supposedly trustworthy URLs.

The trend began on 12 October. Analysis shows that as of 18th October, 43,049 clicks were redirected to spam domains through these shortened URLs.

One such: “San Francisco Mom Earns $7,219/Month Part-Time”!

A typical work-at-home scam webpage

After two hops and a total of three URLs, your final destination is a work-at-home scam designed to look like a financial news network website.

Spammers have attempted to add legitimacy to this particular come-on by adding links in the menu bar to the actual financial news site that the scam is spoofing.

But the links in the article itself actually lead to a site where the spammers try to reel in the gullible, offering to hook us up to $87/hour work-at-home jobs with no prior experience or skills required.

Click-throughs have spiked. Spam accounted for 15.1 percent of all URLs as of 18 October, according to researchers.

US citizens are the most likely to fall for these spam messages, with those desperate for $87/hour jobs (or curious security researchers) accounting for 61.7% of click-throughs. is now displaying a warning message when it sees what it thinks may be an unauthorised shortened link using a open redirect. warning

Although welcome, this isn’t really the best fix for the problem of open redirects on US government websites.

Instead, I would recommend that website owners follow the guidance offered by Google about open redirects, such as checking that the ultimate URL is approved, and considering a whitelist of approved destinations.

As always, be suspicious of unsolicited emails, and don’t click on attachments that unexpectedly pop into your inbox.

While no malware has yet been detected via these .gov redirects, it’s easy to picture how attacks could easily cloak themselves in a legitimate looking .gov URL to serve up something even worse than a phony work-at-home scheme.

Update: A spokesman for the GSA’s Office of Citizen Services and Innovative Technologies, which houses the program, offered the following quote to Naked Security:

"GSA is aware of the issue and has worked closely with, our collaborator, to quickly resolve the problem. GSA has removed the affected domains. In addition, we've contacted the web managers of the sites and we're working with them to assist in removing the vulnerability. We will continue to monitor the sites until the issue is resolved."

Gov with magnifier image from Shutterstock.