The Faux SEO Spiderweb: Exploring how Black-hat SEO has riddled the Indian Internet Space

Black-hat SEO tactics are compromising the Indian internet space, with cybercriminals exploiting search engine poisoning to infiltrate government, educational, and financial websites. This in-depth analysis uncovers how malicious actors manipulate search rankings using keyword stuffing, cloaking, and backlinking to redirect unsuspecting users to fraudulent gaming and investment platforms. The report highlights the alarming scale of this digital deception, urging authorities to strengthen security measures and users to stay vigilant against manipulated search results. Stay informed and safeguard your online experience against black-hat SEO threats. 🚨 #CyberSecurity #SEO

Noel Varghese
February 14, 2025
Green Alert
Last Update posted on
February 14, 2025
Proactive Monitoring of the Dark Web for your organization.

Proactively monitor and defend your organization against threats from the dark web with CloudSEK XVigil.

Schedule a Demo
Table of Contents
Author(s)
No items found.

Executive Summary

Indian Government websites, Educational Websites and well-known Financial brands have been affected in scale, by SEO Poisoning, leading to user traffic being redirected to sketchy websites promoting rummy, and other investment-focused games. In this advisory, we will be discussing the techniques utilized to mislead Indian Internet users, when performing searches to clear their queries.

Overview

In a recent development, analysts at CloudSEK have discovered the much maligned use of black hat Search Engine Poisoning by threat actors, to push Rummy and Investment focused websites to unsuspecting users. Targets of interest include websites with .gov.in , .ac.in TLD’s and usage of keyword stuffing mentioning well known financial brands in India. Over 150 government portals, most belonging to state governments, have been affected at scale.

What is Search Engine Poisoning?

Search engine poisoning refers to malicious practices aimed at manipulating search engine results to promote harmful or deceptive content. These tactics are typically employed by cybercriminals to redirect users to fraudulent websites, distribute malware, or launch phishing attacks.

Techniques in play:

  • Referrer Header Manipulation - Referrer header manipulation is a technique used by malicious actors to disguise the source of a request. This can be done using script injection into the website’s source code. A tactic that can be classified under cloaking.
  • Cloaking - Cloaking is a technique in which a website shows different content to search engines and human visitors. The purpose of cloaking is to deceive search engines and manipulate rankings by presenting content that is optimized for certain search engines but not visible to users, using a certain user agent.
  • Keyword Stuffing : Cybercriminals target trending keywords or events (e.g., breaking news, popular products) and create malicious websites optimized to rank high in search results.
  • Backlinking - Backlinking in blackhat SEO refers to the practice of obtaining backlinks through manipulative means in order to artificially boost a website's search engine rankings. This can include tactics such as link farming.
  • Underlying system Vulnerabilities - Threat actors can possibly exploit underlying vulnerabilities in  systems such as CMS’ hosting web content to create directories and host content on them like files with .shtml and .html extensions. However we haven't been able to pinpoint the exact vulnerability that is being exploited.

How do Rummy and Investment Focused Games come into the picture?

Rummy games have a rich history and have grown immensely popular in India, both offline and online. The advent of online gaming platforms has further boosted its popularity. With access to smartphones, affordable internet, and the convenience of playing from home, rummy games have found a massive audience in India. 

Additionally, platforms offering cash prizes and tournaments have made it even more enticing. However, while it provides entertainment and opportunities to win, the financial risks can’t be ignored. Many players overestimate their abilities and continue to bet/invest on higher amounts, leading to losses. The desire to recover losses, known as "chasing losses," often traps players in a cycle of increasing bets.

Voicing Concern on Social Media

Ever since the unfolding attack scenario was highlighted on X (formerly Twitter) last year, a handful of similar posts have appeared on platforms such as Linkedin, X and the news outlet TechCrunch.

Figure 1 - Linkedin Post - Source

Figure 2 - X Post - Source

Figure 3 - TechCrunch Article - Source

Technical Analysis

Intertwining Referer Header Manipulation & User Agent Cloaking : Real Time Technique Utilization

Inspection of the source code, on one of the Indian Government websites affected, shows a Javascript snippet. The functionality of the code snippet is as follows:-

  1. It retrieves the referrer of the current document (i.e., the URL of the page that linked to the current page) and converts it to lowercase.
  1. It sets up an array containing strings of User-Agents (in this case, "IPhone." and "Android.").
  1. It loops through the array to check if the referrer contains any of the specified search engine strings.
  1. If a match is found and the user is identified as being on a mobile device (using a regular expression that checks the navigator.userAgent), it redirects the user to "https[:]//yono-allslots[.]com/".

In this case, "https[:]//yono-allslots[.]com/" redirects to indorummy[.]net, another rummy game website.

Figure 4 - Highlighted Javascript code snippet utilizing referrer header manipulation

To explore if this is really possible, a search was run using the dork “rummy” site:*.gov.in, and the logic of the script was analyzed, using Google Developer Tools, and by changing the device type. 

Figures 5 & 6 - Tweaking the user agent using Google’s Developer Tools utility shows two different webpages after clicking on an affected Government website

The script was working as intended and it goes on to demonstrate how stealthily threat actors are operating, in a way that more than meets the eye.

When checking the script, it is evident that an exception is made for Desktop-based browsers, where users would rather be shown a 404 Error Page, when clicking on similarly doctored results. This is a case of user agent cloaking in practice.

In other cases, it is more direct, wherein a landing page depicting the rummy website in question loads up after the preloader touches 100%. This is aided using redirection, using Javascript and the same content reflects, irrespective of user agent.

Figure 7  - Instance of referrer redirection in a website’s source code

Figure 8 - Preloader on the landing page redirects the user to an investment website

Figure 9 - Inspection of the request highlights that the referrer was a Government Website

How is code being injected into websites?

A possible answer to this would be the exploitation of File Upload functionality within websites combined with Javascript code Injection, possibly utilizing stored XSS in the process. We state this with medium confidence.

As mentioned above, during our analysis when analyzing more websites, it was found that an abundance of files with extensions “.shtml”, “.html” and “.aspx” extensions were seemingly uploaded to non-existent directories, within affected websites (indicated by the search result URL). However we haven't been able to pinpoint the exact vulnerability that is being exploited.

Figure 10 - Highlighted URL shows the presence of a file, with the “.shtml” extension being uploaded to the file server 

As we know, .shtml, or Server Side Includes (SSI) files, are HTML files that include server-side scripting commands that are processed by the web server before being sent to the client's web browser. This can indicate that redirection code could be injected in these files

These files get removed upon reporting - by utilizing Google’s Webmaster Tool,  but get cached and show up as results by Google’s indexing mechanism, often reflecting the redirected website’s content on search results.

Figure 11 - Search results for Kerala Government’s assets, which are wedged with content from rummy game websites

Keyword Stuffing: Real Time Technique Utilization

In a particular case of client query investigation, we uncovered a series of spam websites having the keywords of a National Public Sector Bank and its Banking Application stuffed into the frontpage, promoting rummy games. 

When delving deeper into these websites, it was discovered that the websites were targeting more Indian companies in the financial sector and had utilized the template of other similar websites, geared towards promoting Indonesian casino games.

Figure 12 - Screenshot highlighting similarity of Template Usage  

With an eventual course of progression if not stopped in its tracks, the threat of customers being swindled can loom over other organizations, other varied industries

Website Content targeted towards Key Search Terms

Taking the screenshot provided below as an example, we can see that keywords such as loan and card application, targeted for bank queries have been stuffed into the webpage, making users land on such untrusted pages and proceeding to see text enticing users to partake in rummy games.

Keyword Stuffing: The source of such text are from digital ads commissioned by the bank in question, promotional text from their websites and an amalgamation of common queries from the customer pool, for example, taking queries where customers seek instant personal loans, with low interest rates.

Figure 13 - Webpage containing keywords and search terms targeting a National Bank, with promotion of rummy games

In one particular instance, a template message pushing phishing links from Mobile SMS’ were discovered on a webpage

Figure 13 - Insertion of phishing message on webpage, as part of keyword stuffing

The impersonating domains create webpaths targeting companies, and the page titles are also tailored to match the company name

Figure 14 - Screenshots highlighting  examples of brand names used to garner clicks from page title and webpage content

Below is an example of text stuffing, using a subdomain address belonging to the Government of Telengana, on a similar page pushing rummy games.

Figure 15 - Screenshot highlighting keyword stuffing of Government domain address

Interconnected Web Pages: Referred to as "Link Farms," this involves creating multiple web pages that are linked together to increase incoming links and boost a website's ranking. Upon further checks, it was found that attempts to play these games lead to a website named “teenpattionline.game”/ teenpatti.com , offering a trove of games involving betting to gain rewards.

Inside these games

These rummy games, packaged under various names, follow an approach akin to investment scams, as illustrated below:

Figure 16 - Key Events encountered while playing Rummy Games, especially those which are untrusted

Upon further checks, it was found that attempts to play these games lead to a website named “teenpattionline.game”, offering a trove of games involving betting to gain rewards.

Why do users get enticed by such games?

Benefits offered by games

1. Referral Bonus: For every referral, a user receives a nominal amount ranging from Rs 20 - 80, thereby pulling more individuals to the cusp of gambling and possible financial ruin. New logins from the same device are not counted towards this.

Figure 17 - Game popup encouraging users to refer the platform to other individuals, in return for monetary rewards

2. Login Bonus: These games offer paltry rewards for daily logins, making it an interesting prospect to lure in people’s attention and prompting them to spend daily on games

Figures 18 & 19 - Screenshots from the game portal highlighting the requirement to invest money first, to gain rewards

VIP User Base Structuring

This is a concept seen in most Pig Butchering / Ponzi Scam Models, where users that tend to invest more to get better rewards, are classed under VIP Levels. Higher the VIP Level that you are classed under, higher are the chances of the individual being scammed

Figure 20 - Game Popup highlighting the benefits of upgrading to a higher level, to receive more bonus rewards

Correlation to Color Prediction Scams

During more analysis, a new route to scam individuals out of money could be brewing, with the aid of color prediction games. 

From our previous research on this scam type, games and domains impersonating prominent companies offer opportunities to place bets and receive monetary rewards, for predicting the right color.

The scam is similar to the Ponzi/ pyramid scheme, where the money collected from new players/ investors is used to pay profits to early adopters/investors.

To Note: The possibility of such games being promoted in the future, is merely stated as a possibility, with the existence and fraudulent nature of such games being relevant and being able to siphon large amounts of money.

Figure 21 - Keyword Stuffing instance for Color Prediction Games

Challenges with spam SEO Pages

  • Removing spam SEO pages is difficult due to their sheer volume and the speed at which they are created. Many operate across multiple domains, making it challenging to track and eliminate them completely. 
  • Organizations struggle with spam SEO as it diverts traffic from legitimate content, affecting visibility and revenue. 
  • False positives in spam detection can lead to legitimate content being mistakenly flagged, creating additional risks. Legal action against spam operators is often slow and costly, with little guarantee of success. Moreover, maintaining trust with users becomes difficult as spam undermines brand reputation and credibility

Exploring Backlinking ties

During our analysis on one suspect rummy game website, i.e. indorummy [.]net, it was found that the website had connections to employing back linking services. The website was additionally found to be listed amongst others on Link Farm websites.

Figure 22 - Backlinks found for indorummy[.]net - Source SEOptimer

To provide more context, here’s how these link farms help rummy websites, or any dodgy website utilizing their services:-

Boosting Search Rankings:-

  • Backlinks are a key ranking factor in Google’s algorithm. Having many links from different domains can trick search engines into thinking "indorummy.net" is an authoritative site.
  • This can artificially boost rankings in search engine results pages (SERPs).

Domain Authority (DA) Manipulation:-

  • Some links are from sites offering "DA Increase Services” , which suggests that backlinks were purchased.
  • These services aim to inflate a website’s domain authority (DA) using spammy backlinks.

Increased Indexation & Crawl Frequency

  • Search engines discover new websites through backlinks.
  • Link farms force search engines to crawl "indorummy.net" and similar sites more frequently.
  • Some of the referring sites can possibly help generate fake referral traffic.

Figure 23 - Backlinking Frequency - Source: NeilPatel.com - SEO Analyzer

Insights from the graph:-

  • Sudden Growth: Around November 2024, there was a dramatic spike in both metrics:
  • Backlinks increased to around 33
  • Referring domains grew to approximately 15
  • Sustained Level: After the spike, both metrics appear to have stabilized at their new higher levels through February 2025, suggesting that the growth wasn't just a temporary anomaly.
  • Parallel Growth: The growth in backlinks and referring domains occurred simultaneously, indicating a coordinated SEO effort or a significant event that triggered multiple sites to link to the content at once.

A common Telegram handle was found to be linked within these websites for Backlinking consultation. The handle has since been inactive. Additionally, services on the freelancer platform ‘Fiverr’ have been linked to these websites. The credibility of these listings are questionable.

Figure 24 - Backlinking Contact Advertisement

Figure 25 - Backlinking Advertisements on Fiverr

Infrastructure

With indorummy[.]net and vc99[.]net, amongst its other variants appearing on browsers commonly from poisoned results, our investigation extended to their DNS Records.

What is alarming about this method used by the threat actors is the sheer scale of their infrastructure. We were able to identify 12 associated IP addresses, with multiple domains having the prefix ‘bet’, ‘rummy’, or ‘vip’, pointing towards rummy/investment platforms and siphoning off with people’s hard earned-money. 

NOTE: The 104.21.x.1 range is used by Cloudflare as part of their proxy and DDoS protection service. When a website uses Cloudflare, the A records typically point to Cloudflare's IPs instead of the website's actual server. Cloudflare then routes traffic to the real destination while filtering malicious requests.

The presence of multiple A records in the same IP Range indicates that the domains are using multiple IP addresses for load balancing, redundancy, or performance optimization. For example’s sake, domains sharing the same IP range have been highlighted in the table below:-

Table 1 - Details of ASN’s and websites associated  with the blackhat SEO Campaign

IP ASN Example Domain
104.21.16.1 AS13335 (CloudFlare) rummydeity[.]cc
104.21.32.1 AS13335 (CloudFlare) rummymost[.]com
104.21.48.1 AS13335 (CloudFlare) rummyhowtoplay[.]com
104.21.64.1 AS13335 (CloudFlare) rummyvibe[.]com
104.21.80.1 AS13335 (CloudFlare) rummyjax.in
104.21.96.1 AS13335 (CloudFlare) rummyox26[.]mom
104.21.112.1 AS13335 (CloudFlare) 74rummy[.]com
104.21.29.218 AS13335 (CloudFlare) Crickexlive[.]vip and 99vc[.]net
18.160.46.4 AS16509 (AMAZON-02) indslotscash[.]com
18.160.46.5 AS16509 (AMAZON-02) betweb[.]vip
18.160.46.88 AS16509 (AMAZON-02) vipdiorbet[.]com
18.160.46.121 AS16509 (AMAZON-02) indslots[.]net

One common issue is the presence of lax security measures within these ASNs, making them attractive targets for cybercriminals who exploit vulnerabilities and host malicious content. Additionally, some ASNs allow users to register services anonymously, providing a conducive environment for malicious actors to operate without easy identification. 

Some of the ASNs that we were able to identify associated with the campaign and have been reported for phishing, malware, etc. are as follows:

Table 2 - General Reports for ASN’s

IP ASN Report
104.21.80.1 AS13335 (CloudFlare) https://www.malwareurl.com/ns_listing.php?as=AS13335
18.160.46.121 AS16509 (AMAZON-02) https://www.malwareurl.com/ns_listing.php?as=AS16509

Tentacles of Blackhat SEO, on Malaysian Government Websites

During our research, a Linkedin post came to our attention wherein a similar campaign was unfolding in Malaysia around four months ago, where Government websites were being backlinked to Rummy and Casino websites.

Figure 26 - LinkedIn Post - Source

It further goes on to establish the truth that insecure infrastructure will always be immune to unethical activities, if secure coding practices and failure to safeguard critical infrastructure is not followed. This is not an isolated incident.

Mitigation

For Authorities and related personnel

Security Infrastructure Improvements

  • Implement strict file upload validation and restrictions.
  • Regularly scan for unauthorized HTML/SHTML files.
  • Monitor and restrict script injection capabilities, by embracing input validation.

Website Monitoring

  • Regularly audit website content and backlinks.
  • Set up alerts for unauthorized domain references.
  • Monitor search engine results for suspicious listings.
  • Use Google Search Console to identify and remove malicious backlinks.

For Users

General Security Awareness

  • Verify website URLs before clicking, especially for government sites.
  • Be cautious of search results promoting gaming or betting.
  • Don't trust websites just because they appear in top search results.
  • Use official mobile app stores only.

Financial Protection

  • Never provide banking details to unknown gaming platforms.
  • Be wary of “too good to be true” money making offers.
  • Avoid participating in unregulated gambling activities.

Pubic Awareness

  • Issue public advisories about known scams, to embrace a citizen-first mentality and instill a sense of accountability and awareness.
  • Provide reporting mechanisms for the public.
  • Warn customer base users about SEP-promoted games by distributing advisories on identifying phishing or fraudulent gaming platforms.

References

Appendix

Figure 27 - Links to external Casino sites, on an Indian Government website

Predict Cyber threats against your organization

Related Posts
No items found.

Join 10,000+ subscribers

Keep up with the latest news about strains of Malware, Phishing Lures,
Indicators of Compromise, and Data Leaks.

Take action now

Secure your organisation with our Award winning Products

CloudSEK Platform is a no-code platform that powers our products with predictive threat analytic capabilities.

Threat Intelligence

15

min read

The Faux SEO Spiderweb: Exploring how Black-hat SEO has riddled the Indian Internet Space

Black-hat SEO tactics are compromising the Indian internet space, with cybercriminals exploiting search engine poisoning to infiltrate government, educational, and financial websites. This in-depth analysis uncovers how malicious actors manipulate search rankings using keyword stuffing, cloaking, and backlinking to redirect unsuspecting users to fraudulent gaming and investment platforms. The report highlights the alarming scale of this digital deception, urging authorities to strengthen security measures and users to stay vigilant against manipulated search results. Stay informed and safeguard your online experience against black-hat SEO threats. 🚨 #CyberSecurity #SEO

Authors
Noel Varghese
Co-Authors
No items found.

Executive Summary

Indian Government websites, Educational Websites and well-known Financial brands have been affected in scale, by SEO Poisoning, leading to user traffic being redirected to sketchy websites promoting rummy, and other investment-focused games. In this advisory, we will be discussing the techniques utilized to mislead Indian Internet users, when performing searches to clear their queries.

Overview

In a recent development, analysts at CloudSEK have discovered the much maligned use of black hat Search Engine Poisoning by threat actors, to push Rummy and Investment focused websites to unsuspecting users. Targets of interest include websites with .gov.in , .ac.in TLD’s and usage of keyword stuffing mentioning well known financial brands in India. Over 150 government portals, most belonging to state governments, have been affected at scale.

What is Search Engine Poisoning?

Search engine poisoning refers to malicious practices aimed at manipulating search engine results to promote harmful or deceptive content. These tactics are typically employed by cybercriminals to redirect users to fraudulent websites, distribute malware, or launch phishing attacks.

Techniques in play:

  • Referrer Header Manipulation - Referrer header manipulation is a technique used by malicious actors to disguise the source of a request. This can be done using script injection into the website’s source code. A tactic that can be classified under cloaking.
  • Cloaking - Cloaking is a technique in which a website shows different content to search engines and human visitors. The purpose of cloaking is to deceive search engines and manipulate rankings by presenting content that is optimized for certain search engines but not visible to users, using a certain user agent.
  • Keyword Stuffing : Cybercriminals target trending keywords or events (e.g., breaking news, popular products) and create malicious websites optimized to rank high in search results.
  • Backlinking - Backlinking in blackhat SEO refers to the practice of obtaining backlinks through manipulative means in order to artificially boost a website's search engine rankings. This can include tactics such as link farming.
  • Underlying system Vulnerabilities - Threat actors can possibly exploit underlying vulnerabilities in  systems such as CMS’ hosting web content to create directories and host content on them like files with .shtml and .html extensions. However we haven't been able to pinpoint the exact vulnerability that is being exploited.

How do Rummy and Investment Focused Games come into the picture?

Rummy games have a rich history and have grown immensely popular in India, both offline and online. The advent of online gaming platforms has further boosted its popularity. With access to smartphones, affordable internet, and the convenience of playing from home, rummy games have found a massive audience in India. 

Additionally, platforms offering cash prizes and tournaments have made it even more enticing. However, while it provides entertainment and opportunities to win, the financial risks can’t be ignored. Many players overestimate their abilities and continue to bet/invest on higher amounts, leading to losses. The desire to recover losses, known as "chasing losses," often traps players in a cycle of increasing bets.

Voicing Concern on Social Media

Ever since the unfolding attack scenario was highlighted on X (formerly Twitter) last year, a handful of similar posts have appeared on platforms such as Linkedin, X and the news outlet TechCrunch.

Figure 1 - Linkedin Post - Source

Figure 2 - X Post - Source

Figure 3 - TechCrunch Article - Source

Technical Analysis

Intertwining Referer Header Manipulation & User Agent Cloaking : Real Time Technique Utilization

Inspection of the source code, on one of the Indian Government websites affected, shows a Javascript snippet. The functionality of the code snippet is as follows:-

  1. It retrieves the referrer of the current document (i.e., the URL of the page that linked to the current page) and converts it to lowercase.
  1. It sets up an array containing strings of User-Agents (in this case, "IPhone." and "Android.").
  1. It loops through the array to check if the referrer contains any of the specified search engine strings.
  1. If a match is found and the user is identified as being on a mobile device (using a regular expression that checks the navigator.userAgent), it redirects the user to "https[:]//yono-allslots[.]com/".

In this case, "https[:]//yono-allslots[.]com/" redirects to indorummy[.]net, another rummy game website.

Figure 4 - Highlighted Javascript code snippet utilizing referrer header manipulation

To explore if this is really possible, a search was run using the dork “rummy” site:*.gov.in, and the logic of the script was analyzed, using Google Developer Tools, and by changing the device type. 

Figures 5 & 6 - Tweaking the user agent using Google’s Developer Tools utility shows two different webpages after clicking on an affected Government website

The script was working as intended and it goes on to demonstrate how stealthily threat actors are operating, in a way that more than meets the eye.

When checking the script, it is evident that an exception is made for Desktop-based browsers, where users would rather be shown a 404 Error Page, when clicking on similarly doctored results. This is a case of user agent cloaking in practice.

In other cases, it is more direct, wherein a landing page depicting the rummy website in question loads up after the preloader touches 100%. This is aided using redirection, using Javascript and the same content reflects, irrespective of user agent.

Figure 7  - Instance of referrer redirection in a website’s source code

Figure 8 - Preloader on the landing page redirects the user to an investment website

Figure 9 - Inspection of the request highlights that the referrer was a Government Website

How is code being injected into websites?

A possible answer to this would be the exploitation of File Upload functionality within websites combined with Javascript code Injection, possibly utilizing stored XSS in the process. We state this with medium confidence.

As mentioned above, during our analysis when analyzing more websites, it was found that an abundance of files with extensions “.shtml”, “.html” and “.aspx” extensions were seemingly uploaded to non-existent directories, within affected websites (indicated by the search result URL). However we haven't been able to pinpoint the exact vulnerability that is being exploited.

Figure 10 - Highlighted URL shows the presence of a file, with the “.shtml” extension being uploaded to the file server 

As we know, .shtml, or Server Side Includes (SSI) files, are HTML files that include server-side scripting commands that are processed by the web server before being sent to the client's web browser. This can indicate that redirection code could be injected in these files

These files get removed upon reporting - by utilizing Google’s Webmaster Tool,  but get cached and show up as results by Google’s indexing mechanism, often reflecting the redirected website’s content on search results.

Figure 11 - Search results for Kerala Government’s assets, which are wedged with content from rummy game websites

Keyword Stuffing: Real Time Technique Utilization

In a particular case of client query investigation, we uncovered a series of spam websites having the keywords of a National Public Sector Bank and its Banking Application stuffed into the frontpage, promoting rummy games. 

When delving deeper into these websites, it was discovered that the websites were targeting more Indian companies in the financial sector and had utilized the template of other similar websites, geared towards promoting Indonesian casino games.

Figure 12 - Screenshot highlighting similarity of Template Usage  

With an eventual course of progression if not stopped in its tracks, the threat of customers being swindled can loom over other organizations, other varied industries

Website Content targeted towards Key Search Terms

Taking the screenshot provided below as an example, we can see that keywords such as loan and card application, targeted for bank queries have been stuffed into the webpage, making users land on such untrusted pages and proceeding to see text enticing users to partake in rummy games.

Keyword Stuffing: The source of such text are from digital ads commissioned by the bank in question, promotional text from their websites and an amalgamation of common queries from the customer pool, for example, taking queries where customers seek instant personal loans, with low interest rates.

Figure 13 - Webpage containing keywords and search terms targeting a National Bank, with promotion of rummy games

In one particular instance, a template message pushing phishing links from Mobile SMS’ were discovered on a webpage

Figure 13 - Insertion of phishing message on webpage, as part of keyword stuffing

The impersonating domains create webpaths targeting companies, and the page titles are also tailored to match the company name

Figure 14 - Screenshots highlighting  examples of brand names used to garner clicks from page title and webpage content

Below is an example of text stuffing, using a subdomain address belonging to the Government of Telengana, on a similar page pushing rummy games.

Figure 15 - Screenshot highlighting keyword stuffing of Government domain address

Interconnected Web Pages: Referred to as "Link Farms," this involves creating multiple web pages that are linked together to increase incoming links and boost a website's ranking. Upon further checks, it was found that attempts to play these games lead to a website named “teenpattionline.game”/ teenpatti.com , offering a trove of games involving betting to gain rewards.

Inside these games

These rummy games, packaged under various names, follow an approach akin to investment scams, as illustrated below:

Figure 16 - Key Events encountered while playing Rummy Games, especially those which are untrusted

Upon further checks, it was found that attempts to play these games lead to a website named “teenpattionline.game”, offering a trove of games involving betting to gain rewards.

Why do users get enticed by such games?

Benefits offered by games

1. Referral Bonus: For every referral, a user receives a nominal amount ranging from Rs 20 - 80, thereby pulling more individuals to the cusp of gambling and possible financial ruin. New logins from the same device are not counted towards this.

Figure 17 - Game popup encouraging users to refer the platform to other individuals, in return for monetary rewards

2. Login Bonus: These games offer paltry rewards for daily logins, making it an interesting prospect to lure in people’s attention and prompting them to spend daily on games

Figures 18 & 19 - Screenshots from the game portal highlighting the requirement to invest money first, to gain rewards

VIP User Base Structuring

This is a concept seen in most Pig Butchering / Ponzi Scam Models, where users that tend to invest more to get better rewards, are classed under VIP Levels. Higher the VIP Level that you are classed under, higher are the chances of the individual being scammed

Figure 20 - Game Popup highlighting the benefits of upgrading to a higher level, to receive more bonus rewards

Correlation to Color Prediction Scams

During more analysis, a new route to scam individuals out of money could be brewing, with the aid of color prediction games. 

From our previous research on this scam type, games and domains impersonating prominent companies offer opportunities to place bets and receive monetary rewards, for predicting the right color.

The scam is similar to the Ponzi/ pyramid scheme, where the money collected from new players/ investors is used to pay profits to early adopters/investors.

To Note: The possibility of such games being promoted in the future, is merely stated as a possibility, with the existence and fraudulent nature of such games being relevant and being able to siphon large amounts of money.

Figure 21 - Keyword Stuffing instance for Color Prediction Games

Challenges with spam SEO Pages

  • Removing spam SEO pages is difficult due to their sheer volume and the speed at which they are created. Many operate across multiple domains, making it challenging to track and eliminate them completely. 
  • Organizations struggle with spam SEO as it diverts traffic from legitimate content, affecting visibility and revenue. 
  • False positives in spam detection can lead to legitimate content being mistakenly flagged, creating additional risks. Legal action against spam operators is often slow and costly, with little guarantee of success. Moreover, maintaining trust with users becomes difficult as spam undermines brand reputation and credibility

Exploring Backlinking ties

During our analysis on one suspect rummy game website, i.e. indorummy [.]net, it was found that the website had connections to employing back linking services. The website was additionally found to be listed amongst others on Link Farm websites.

Figure 22 - Backlinks found for indorummy[.]net - Source SEOptimer

To provide more context, here’s how these link farms help rummy websites, or any dodgy website utilizing their services:-

Boosting Search Rankings:-

  • Backlinks are a key ranking factor in Google’s algorithm. Having many links from different domains can trick search engines into thinking "indorummy.net" is an authoritative site.
  • This can artificially boost rankings in search engine results pages (SERPs).

Domain Authority (DA) Manipulation:-

  • Some links are from sites offering "DA Increase Services” , which suggests that backlinks were purchased.
  • These services aim to inflate a website’s domain authority (DA) using spammy backlinks.

Increased Indexation & Crawl Frequency

  • Search engines discover new websites through backlinks.
  • Link farms force search engines to crawl "indorummy.net" and similar sites more frequently.
  • Some of the referring sites can possibly help generate fake referral traffic.

Figure 23 - Backlinking Frequency - Source: NeilPatel.com - SEO Analyzer

Insights from the graph:-

  • Sudden Growth: Around November 2024, there was a dramatic spike in both metrics:
  • Backlinks increased to around 33
  • Referring domains grew to approximately 15
  • Sustained Level: After the spike, both metrics appear to have stabilized at their new higher levels through February 2025, suggesting that the growth wasn't just a temporary anomaly.
  • Parallel Growth: The growth in backlinks and referring domains occurred simultaneously, indicating a coordinated SEO effort or a significant event that triggered multiple sites to link to the content at once.

A common Telegram handle was found to be linked within these websites for Backlinking consultation. The handle has since been inactive. Additionally, services on the freelancer platform ‘Fiverr’ have been linked to these websites. The credibility of these listings are questionable.

Figure 24 - Backlinking Contact Advertisement

Figure 25 - Backlinking Advertisements on Fiverr

Infrastructure

With indorummy[.]net and vc99[.]net, amongst its other variants appearing on browsers commonly from poisoned results, our investigation extended to their DNS Records.

What is alarming about this method used by the threat actors is the sheer scale of their infrastructure. We were able to identify 12 associated IP addresses, with multiple domains having the prefix ‘bet’, ‘rummy’, or ‘vip’, pointing towards rummy/investment platforms and siphoning off with people’s hard earned-money. 

NOTE: The 104.21.x.1 range is used by Cloudflare as part of their proxy and DDoS protection service. When a website uses Cloudflare, the A records typically point to Cloudflare's IPs instead of the website's actual server. Cloudflare then routes traffic to the real destination while filtering malicious requests.

The presence of multiple A records in the same IP Range indicates that the domains are using multiple IP addresses for load balancing, redundancy, or performance optimization. For example’s sake, domains sharing the same IP range have been highlighted in the table below:-

Table 1 - Details of ASN’s and websites associated  with the blackhat SEO Campaign

IP ASN Example Domain
104.21.16.1 AS13335 (CloudFlare) rummydeity[.]cc
104.21.32.1 AS13335 (CloudFlare) rummymost[.]com
104.21.48.1 AS13335 (CloudFlare) rummyhowtoplay[.]com
104.21.64.1 AS13335 (CloudFlare) rummyvibe[.]com
104.21.80.1 AS13335 (CloudFlare) rummyjax.in
104.21.96.1 AS13335 (CloudFlare) rummyox26[.]mom
104.21.112.1 AS13335 (CloudFlare) 74rummy[.]com
104.21.29.218 AS13335 (CloudFlare) Crickexlive[.]vip and 99vc[.]net
18.160.46.4 AS16509 (AMAZON-02) indslotscash[.]com
18.160.46.5 AS16509 (AMAZON-02) betweb[.]vip
18.160.46.88 AS16509 (AMAZON-02) vipdiorbet[.]com
18.160.46.121 AS16509 (AMAZON-02) indslots[.]net

One common issue is the presence of lax security measures within these ASNs, making them attractive targets for cybercriminals who exploit vulnerabilities and host malicious content. Additionally, some ASNs allow users to register services anonymously, providing a conducive environment for malicious actors to operate without easy identification. 

Some of the ASNs that we were able to identify associated with the campaign and have been reported for phishing, malware, etc. are as follows:

Table 2 - General Reports for ASN’s

IP ASN Report
104.21.80.1 AS13335 (CloudFlare) https://www.malwareurl.com/ns_listing.php?as=AS13335
18.160.46.121 AS16509 (AMAZON-02) https://www.malwareurl.com/ns_listing.php?as=AS16509

Tentacles of Blackhat SEO, on Malaysian Government Websites

During our research, a Linkedin post came to our attention wherein a similar campaign was unfolding in Malaysia around four months ago, where Government websites were being backlinked to Rummy and Casino websites.

Figure 26 - LinkedIn Post - Source

It further goes on to establish the truth that insecure infrastructure will always be immune to unethical activities, if secure coding practices and failure to safeguard critical infrastructure is not followed. This is not an isolated incident.

Mitigation

For Authorities and related personnel

Security Infrastructure Improvements

  • Implement strict file upload validation and restrictions.
  • Regularly scan for unauthorized HTML/SHTML files.
  • Monitor and restrict script injection capabilities, by embracing input validation.

Website Monitoring

  • Regularly audit website content and backlinks.
  • Set up alerts for unauthorized domain references.
  • Monitor search engine results for suspicious listings.
  • Use Google Search Console to identify and remove malicious backlinks.

For Users

General Security Awareness

  • Verify website URLs before clicking, especially for government sites.
  • Be cautious of search results promoting gaming or betting.
  • Don't trust websites just because they appear in top search results.
  • Use official mobile app stores only.

Financial Protection

  • Never provide banking details to unknown gaming platforms.
  • Be wary of “too good to be true” money making offers.
  • Avoid participating in unregulated gambling activities.

Pubic Awareness

  • Issue public advisories about known scams, to embrace a citizen-first mentality and instill a sense of accountability and awareness.
  • Provide reporting mechanisms for the public.
  • Warn customer base users about SEP-promoted games by distributing advisories on identifying phishing or fraudulent gaming platforms.

References

Appendix

Figure 27 - Links to external Casino sites, on an Indian Government website