Inside the Machine: How Crypto Scammers
Hijack Bing & DuckDuckGo
An investigative report with live SEMrush data exposing two parallel SEO attack operations pushing crypto phishing sites to the top of Bing and DuckDuckGo search results. 10 domains. 2 attack vectors. 100,000+ potential victims per month.
All data in this report was collected via SEMrush API and phishdestroy.io for cybersecurity research purposes. Domain names are published to warn users, not to promote them.
The Two Attack Vectors
Our investigation uncovered two completely different, parallel operations running simultaneously to push phishing sites to the top of Bing and DuckDuckGo results.
Vector A: The Yahoo SERP Injection Attack
This is arguably the most technically elegant black-hat SEO attack we have documented in 2026. It exploits a fundamental flaw in how Bing evaluates link authority — specifically, its inability to distinguish between genuine editorial links and dynamically generated search result pages from trusted domains.
The Mechanism — Step by Step
Step 1 — Generating the trusted carrier URL. Attackers craft URLs on Yahoo’s mobile search endpoints across multiple international subdomains: no.search.yahoo.com (Norway), fr.search.yahoo.com (France), mx.search.yahoo.com (Mexico), pl.search.yahoo.com (Poland), gr.search.yahoo.com (Greece), qc.search.yahoo.com (Quebec), chfr.search.yahoo.com (Swiss French), co.search.yahoo.com (Colombia). These pages carry Yahoo’s inherited Authority Score: 23–24.
Step 2 — Embedding the phishing anchor. Each URL contains a completely random, innocent search query — “pele+fifa”, “Jean-Paul+Sartre”, “Radio+Stars”, “jucheck.exe” — but the anchor text reads: curvefi.co Curve Finance. The randomized queries ensure no pattern-matching by spam filters.
Step 3 — Forced crawl & indexation. Attackers push Bingbot to crawl these URLs using mass ping services, forum/blog comment injections, and automated crawl triggering tools.
Google’s algorithm: “This is a dynamic search page. No link equity transfer.”
Bing’s algorithm: “yahoo.com links to curvefi.co with anchor ‘Curve Finance DEX’. Ranking signal accepted. ✓”
Result: phishing site climbs to TOP 3 for “Curve Finance” on Bing and DuckDuckGo.
Raw SEMrush Evidence — curvefi.co
| AS | Source Domain | Anchor Text |
|---|---|---|
| 24 | chfr.search.yahoo.com | www.curvefi.co Curve Finance |
| 24 | co.search.yahoo.com | curvefi.co Curve Finance |
| 24 | fr.search.yahoo.com | curvefi.co Curve Finance |
| 24 | mx.search.yahoo.com | www.curvefi.co Curve Finance |
| 24 | no.search.yahoo.com | www.curvefi.co Curve Finance |
| 24 | pl.search.yahoo.com | www.curvefi.co Curve Finance |
| 23 | gr.search.yahoo.com | www.curvefi.co Curve Finance |
| 23 | qc.search.yahoo.com | curvefi.co Curve Finance |
The brutal irony: The site has zero organic keywords, zero traffic in SEMrush’s database — yet it appears in Bing/DDG results for “Curve Finance” because of Yahoo’s borrowed authority.
Vector B: The Coordinated PBN Network
This is where the investigation gets truly alarming. Five separate phishing sites — rabbys.at, dexscreener.at, monero-wallet.at, trezorsuite.at, and keplr.me — all share an identical set of backlink sources. This is not coincidence. This is a single organized criminal operation running multiple phishing campaigns from one infrastructure.
The Smoking Gun — Shared Infrastructure
| PBN Donor Domain | AS | rabbys | dexscr | monero | trezor |
|---|---|---|---|---|---|
lewievuittton.com | 65 | ✓ | ✓ | ✓ | ✓ |
lyricamed.us.com | 61 | ✓ | ✓ | ✓ | ✓ |
creatfx.com | 60 | ✓ | ✓ | ✓ | ✓ |
jba.com.jo | 56 | ✓ | ✓ | ✓ | ✓ |
jornaldevinhedo.com | 56 | ✓ | ✓ | ✓ | ✓ |
jasaaspalhotmix.com | 54 | ✓ | ✓ | ✓ | ✓ |
magna-eg.com | 50 | ✓ | ✓ | ✓ | ✓ |
markjohnsonbuilders | 50 | ✓ | ✓ | ✓ | ✓ |
nextplayflix.com | 49 | ✓ | ✓ | ✓ | ✓ |
The top PBN donor (AS 65) is itself a typosquat of Louis Vuitton. This PBN donor is a scam site propping up other scam sites — criminal infrastructure all the way down.
Phishing Domain Profiles
| Domain | Impersonates | Keywords | Top Target | Volume |
|---|---|---|---|---|
dexscreener.at | DexScreener | 64 | “dexscreener” #42 | 60,500/mo |
rabbys.at | Rabby Wallet | 15 | “rabby wallet” #51 | 5,400/mo |
trezorsuite.at | Trezor Suite | 7 | “trezor suite” #32 | 4,400/mo |
aster-dex.at | Aster DEX | 13 | “aster交易所” #25 | 3,600/mo |
monero-wallet.at | Monero Wallet | 4 | “xmr wallet online” #26 | 210/mo |
keplr.me | Keplr Wallet | 0 | Comment spam stealth | N/A |
bscscan.cfd | BSCScan | 0 | Bulk spam links | N/A |
curvefinance.co | Curve Finance | 0 | Yahoo injection only | N/A |
curvefi.co | Curve Finance | 0 | Yahoo injection only | N/A |
app-crv.net | Curve app | 0 | Mixed techniques | N/A |
Users searching “trezor suite download” are actively looking to install wallet software. A phishing site at position #3–5 on DuckDuckGo means users downloading malware thinking it’s a hardware wallet interface. This is not theoretical — it is happening right now.
The AI-Powered Article Farm
The aster-dex.at variant uses a hybrid approach, combining Yahoo injection with AI-generated blog content placed on compromised or purpose-built sites across Vietnam, Italy, Indonesia, and Switzerland.
The blog articles all have near-identical titles: “Why Token Swaps and Liquidity Pools Still Trip Up Even Seasoned DEX Traders”, “Why Automated Market Makers Still Surprise Traders”. These are AI-generated articles placed on sites with AS 21–36, all linking to aster-dex.at.
Comment Spam Infiltration
keplr.me takes a different approach entirely — pure comment spam on unrelated high-authority sites. Fake user names like “ZackaryThymn”, “Fritzkah”, “Jamesboach” inject crypto wallet anchors into philosophy education sites (filozofija.edu.rs, AS 45), employee engagement platforms (bavave.com, AS 63), and arts festivals (lea-festival.com, AS 50).
The Bottom of the Barrel: Automated Tool Spam
bscscan.cfd uses the crudest possible method: paid bulk backlink packages from sites literally named rankongoogle.agency and linksjump.click. All sources have AS = 0. The .cfd TLD is a known spam indicator. Yet on Bing, even this partially works — volume of low-quality links can influence rankings on brand-new domains with no negative history.
Why Bing & DuckDuckGo Are Specifically Vulnerable
| Feature | Bing | |
|---|---|---|
| Dynamic page detection | No link equity from search result pages | Yahoo search pages treated as editorial content |
| Spam ML maturity | 15+ years SpamBrain training data | Less mature; PBN AS 50–65 still works |
| Brand protection | Aggressive; curvefinance.co flagged quickly | .at/.co TLD scams survive longer |
| AI content farms | Detection deployed 2023+ | AI farms on .vn, .it still earn passing scores |
| Phishing blocking | Safe Browsing blocks known domains fast | SmartScreen misses newly registered scam domains |
DDG uses Bing’s index as its primary data source, inheriting all of Bing’s vulnerabilities. Privacy-focused users who prefer DDG are often crypto-savvy — making them higher-value targets. DDG has no independent spam reporting mechanism; reports go to Bing.
Keyword Targeting Strategy
The keyword profiles reveal surgical precision in target selection. Operators target not just primary brand terms but typosquats (“rabbi wallet”, “rubby wallet”, “dexscrenner”) and even Chinese-language queries (“aster交易所” ranking #25).
| Target Keyword | Monthly Volume | Scam Domain | Position |
|---|---|---|---|
| dexscreener | 60,500 | dexscreener.at | #42 |
| rabby wallet | 5,400 | rabbys.at | #51–71 |
| trezor suite | 4,400 | trezorsuite.at | #32–85 |
| aster dex | 3,600 | aster-dex.at | #63 |
| dexscrenner typo | 2,400 | dexscreener.at | #45 |
| aster交易所 Chinese | 1,000 | aster-dex.at | #25 |
| trezor suite download | 260 | trezorsuite.at | #54 |
| rabbi wallet typo | 210 | rabbys.at | #54 |
| xmr wallet online | 210 | monero-wallet.at | #55–69 |
Historical Context: The Trust Wallet / DuckDuckGo Problem
These attacks are not new. The problem was significantly more severe when wallets like Trust Wallet used DuckDuckGo as their default in-app search engine. Users searching for DeFi protocols from within their wallet were served phishing results as the #1 result — with zero complex SEO required. The combination of a privacy-focused search engine with weaker spam detection and a crypto wallet with a built-in browser created a perfect storm for phishing.
Even after Trust Wallet switched away from DDG as the default, the underlying vulnerability persists. Any user who manually chooses DuckDuckGo for privacy — a demographic that heavily overlaps with crypto users — remains exposed to these exact attacks today. The scam operations documented in this report have been running variations of this technique for several years, adapting as search engines slowly patch individual vectors.
How to Protect Yourself
REAL Curve Finance → curve.fi (NOT .co, .net) •
DexScreener → dexscreener.com (NOT .at) •
Rabby → rabby.io (NOT .at, .me) •
Trezor Suite → suite.trezor.io (NOT trezorsuite.at) •
Keplr → keplr.app (NOT .me) •
BSCScan → bscscan.com (NOT .cfd)
- NEVER connect your wallet from a search result
- Bookmark legitimate sites directly
- Use DDG’s
!bangshortcut:!g curve financeforces Google search - Install MetaMask’s phishing detection extension
- Check any domain at PhishDestroy before connecting
Recommendations to Microsoft/Bing
- Dynamic page detection: Classify search result pages (Yahoo, Baidu, Google) and strip link equity from outbound links
- Coordinated PBN detection: When 9 domains link to 5 different sites with identical patterns, flag as manipulation
- Brand impersonation layer: Detect TLD substitution attacks (
dexscreener.at≈dexscreener.com) - .AT domain monitoring: Enhanced scrutiny for newly registered .at domains in crypto SERPs
- DuckDuckGo fast-track: Create dedicated spam removal API that DDG can access directly
Conclusion
This is not opportunistic spam. This is a professionally organized, multi-brand, multi-vector SEO operation specifically engineered to exploit the gap between Google’s and Bing’s spam detection capabilities. Every user who searches for “Trezor Suite download” on DuckDuckGo today may see a wallet-draining phishing site before they see the real one. The technical fix exists. The question is whether Bing will implement it.


