A new negative SEO attack method has been discovered. What makes this exploit particularly bad is that it is virtually impossible to detect an attacker. If you don't know which website you're attacking, there's no way to recover. So far, Google has remained silent about how Google intends to proceed to close this exploit in a way that ranks and unranks web pages. It is worth noting that this exploit has been observed, but has not been tested and validated. If this exploit were real, it could significantly confuse Google's search results.
How the attack was discovered A legitimate cross-site attack was discovered by Bill Hartzer of Hartzer Consulting. A company approached him about a sudden drop in rankings. In the process of checking the backlinks, Herzer found a link to a strange site. However, the client did not link to that site. After investigating other sites, he came up color correction services with a negative SEO site. If the attack site was not linked to the third page, Hartzer would not have been able to identify the attack website. Hartzer was able to discover the attack site thanks to a new index from SEO data mining company Majestic, which contains legitimate data. ( Editor's Note: Herzer is a Majestic brand ambassador.)
Google Exploit: Canonical Negative SEO advertisement Continue reading below How Canonical Negative SEO works The attack works by copying the entire "head" section of the victim's web page into the head section of the spam web page that contains the legitimate tag. Legitimate tags notify Google that this spam page is the victim's web page. Next, Google will probably assign all the content ( and negative spam score ) from the spam webpage to the victim's webpage . advertisement Continue reading below What does Rel = Canonical's Google support page say? This is Google's own support page on how Google handles rel = canonical.