Below you’ll find a sortable table – by vector, risk-level, and potential impact – of all the Negative SEO (NSEO) attack vectors listed on our site. Check back regularly for updates, since this is a growing resource that’s designed to expand as the field of NSEO/Reverse SEO evolves.
Bad Links
Build bad links with the intent of triggering a link manipulation flag/penalty, including “Masquerade Posting” (guest posting, impersonating the target) |
2 | 1 |
---|---|---|
Boost the Bad
Find “Bad Press” against your target and perform link building for it, with the intent of it floating up the SERPS. |
6 | 6 |
Canonical Confusion
Copy the target’s content and publish it across multiple sites/sources. The intent is to impact their rankings and traffic. Google may then also not select the victim’s original version as its primary result. |
6 | 6 |
Canonical Link Attack
Link to multiple variant URIs of your target’s high-value pages. Change case, append false parameters/values, etc. This wastes Google’s resources and crawl allocation, among other effects. |
6 | 5 |
Canonical Pollution Attack
Copy content from target, ideally including markup, styling etc. Modify the content to include safe search trigger terms, etc. Republish variants in multiple places and canonicalize back to your target’s original version. G will consolidate the content and attribute it to the original, causing “consequences.” |
4 | 5 |
Click Abuse
Assuming for a moment that Google actually pays attention to what “Users” do in the SERPS… How “people²” are avoiding your site and/or abandoning it in favor of another competitor could be used against your target quite easily. Note: This approach would require scale and time. |
2 | 2 |
Comment Pollution
Abuse comments on your target’s site. This can be used to trigger safe-search, so the target site only shows in SERPS for a much smaller percentage of searches. |
6 | 6 |
Content Hijacking
Make a page on your site, then use a 302 Redirect, or a Canonical Link to point to a target URI for a period of time, before revoking the 302. Technically, Google will associate rankings with the temporary origin. |
1 | 1 |
DDoS & Service Attacks
Mass requests, heavy requests (big image uploads, hotlinking etc.) The idea is to slow/crash the server. |
4 | 5 |
Directory Edits
Google Business Profiles (and some other directories) permit edits and/or “suggestions” to listings. These can seriously disrupt your target’s business activities and income. |
6 | 7 |
DMCA Attack
Copy the target’s content, then file DMCAs against them. The intent is to get their site out of the SERPS. |
6 | 7 |
Fake Reviews (bad)
Create fake negative reviews to deter your target’s prospects. This will also reduce overall scores/ratings etc. |
4 | 6 |
Fake Reviews (good)
Create overly positive reviews with the intent of getting the account hit for manipulation. |
4 | 5 |
Fanning the Flames
Jumping in on complaints, negative comments and reviews etc. and stirring the |
5 | 7 |
Google Bombing
An old type of Negative SEO reputation attack which uses derogatory link-text to get the victim’s site or profile to rank for search terms which negatively affect his/her reputation. |
1 | 1 |
Hack Attacks
Exploits, brute force attacks, account abuse, social engineering, XSS, basically anything that permits access to your target’s server, database, or rendered content, for misuse. |
3 | 7 |
Impersonation
Create social profiles and/or community accounts, and impersonate the target or their staff. Bad conduct and disgusting responses can lead to a severely damaged reputation. Worse, certain platforms will de-rank businesses for such content. |
4 | 5 |
Link Removal Requests
Contact sites, asking them to remove links to your target. The idea here is to weaken the victim’s authority. |
4 | 6 |
Multiply the Bad
Find “Bad Press” against your target and distribute it, reference it in communities etc. This will increase the quantity of relevant results on sites that tend to rank well. |
6 | 7 |
Name or Brand Jacking
Obtaining a similar domain name and either siphoning traffic or misrepresenting the target website. |
4 | 5 |
Negate Reviews
Flag the target’s positive reviews as spam, with the intent of getting them removed and lowering the overall quality score. |
4 | 5 |
Report Reviews
Flag an account for review manipulation tactics. This approach works well alongside the “FakeReviews(Good)” approach. |
4 | 5 |
Suggestion Triggers
Conceptually, if certain searches and user patterns occur at volume within a window of time, it will likely cause Google to reassess user intent and/or what is being sought, leading the search engine to suggest a competing item and/or website. |
2 | 2 |
The Sitemap / HREFLANG Siphon
Theoretically, you could ping Google a sitemap that was redirected, with HREFLANG data for URIs… and Google would associate the destination with the original URIs, thus abusing their canonical system. |
0 | 0 |
Venomous Phoenix
Deliciously Simple: Take a dropped domain that’s been hit by a Google’s Algorithmic markdown, or better still, a manual action – revive it with some trashy AI content, then 301 it to the target. |
7 | 6 |
¹ Apologies, Darth NA had had a bit too much coffee when we were compiling this list.
² Or the Indian/Bangladeshi Click Farm you hired…