Quote:
Originally Posted by biskoppen
I think a possible way to stop affiliate code replacements would be for all affiliates to be allowed to make domain aliases for the sites they're promoting...
Example :
You are an affiliate promoting cumfiesta.com .. when you link to the site like this cumfiesta.com?affid=mrcool then these thieves script see that the infected computer is loading the cumfiesta.com domain and then maked the replacement of the affid...
The affiliate could then reg his own domain for this site.. like cumfiestatour.com (nastydollar then need to add this as an alias to cumfiesta.com) then the trojan script can't recognize the domain and can't make any affid replacement..
|
Might work on some, but most will just grab the sale as it hits the processor. If you move signups to the same domain you are gonna need SSL certificates for each alias. Besides, they'll catch on after a while and start adding the domains to the redirect database.
The thing is that the program owners can't be so aggressive in this issue or they risk getting their traffic redirected insted of just sent to an malware affiliate, my bet is many of them are aware of the malware affiliates and some probably shave them pretty hard. It's pretty easy to track what affiliates get malware sales.
When this become as big a problem for mainstream as it is for adult, then we will see improvements, not until then. I'm afraid that the only solution in the end is that microsoft fixes the rootkit problem and puts a really good anti-malware program in windows update.