This may be the same one that was noted a couple of weeks ago, although the "fake" URL was given as "googkle.com" in official reports that have been around.
The AV people are treating this as what's called a "typosquat" ruse. There have been a number of cases where someone has registered a URL that's one letter different than a legitimate one, in hopes of catching "accidental" mistypings. Sometimes it's just a joke, as in the spoof of Whitehouse.gov - the real one, and Whitehouse.com - a porn site. A red-hat.com spoof of Redhat.com recently caught a few Linux users.
The googkle.com thing is a particularly nasty one, if the initial malware download is achieved, since it starts a sequence of popups and misdirects leading to a whole web of malware sites, each of which adds new malware programs and "features." Initial round(s) of infection once it gets started include 2 backdoors, 2 Trojan droppers, a proxy Trojan, a spy Trojan, and a Trojan downloader to be used in subsequent rounds. If the infections are not stopped, the Trojan downloader will get a file that blocks access to several AV site, then issues a fake virus warning. When you try to contact one of the blocked AV sites, you're redirected to another fake site that "promises virus protection, but that adds another round of infections. Multiple fake sites that the toolbars and popups redirect you to actually install an adware installer, toolbar.exe, which in turn installs the spyware toolbar "Perez."
WinXP SP2 should have blocked the exploits used in the initial infection steps, and hence WinXP SP2 users shouldn't have to worry. Microsoft asserts that "users of supported software" who have current updates should also be immune, but it must be noted that Win98 is NOT supported software in this context.