White paper analyzes growing number of machines controlled by hackers that reroute Internet traffic from infected computers to fraudulent Web sites ... for example, someone attempting to get to Google is redirected to a spoof site loaded with malicious code or to a wall of ads whose profits flow back to the hackers. Summary here: