See
(script) wXw.yogurtpos.com/wp-content/themes/c3_3.0/js/jquery-1.3.2.min.js
status: (referer=yogurtpos dot com/)saved 57254 bytes 3dc9f7c2642efff4482e68c9d9df874bf98f5bcb
info: ActiveXDataObjectsMDAC detected Microsoft.XMLHTTP
info: [decodingLevel=0] found JavaScript
error: line:3: SyntaxError: invalid flag after regular expression:
error: line:3: filter(function(){return this.name&&!this.disabled&&(this.checked||/select|textarea/i.test(this.nodeName)||/text|hidden|password|search/i.test(this.type))}).map(function(E,F){var G=o(this).val();return G==null?null:o.isArray(G)?o.map(G,function(I,H){retur
error: line:3: ^
error: undefined function T.insertBefore
error: undefined variable T
See the detected instances of Phishing:
https://urlquery.net/report/02e46e20-695e-4f23-9d0e-1a15bc0e564fQuttera has it ->
https://quttera.com/detailed_report/yogurtpos.comWordPress version outdated: Upgrade required.
Outdated WordPress Found: WordPress under 4.8WordPress version outdated: Upgrade required.
Outdated WordPress Found: WordPress under 4.9
Malware history here is a complete list:
Threat Name: Web Attack: Ransomlock Website
Location: hxtp://yogurtpos.com/wp-includes/images/smilies/alits/halte.html
Threat Name: Trojan.Malscript
Location: hxtp://yogurtpos.com/GoogleDrive-verfications/phone.html
Threat Name: Trojan.Malscript
Location: hxtp://yogurtpos.com/GoogleDrive-verfications/Gmaildocs.html
Threat Name: Direct Link To Trojan.Malscript
Location: htxp://yogurtpos.com/GoogleDrive-verfications/gmail.php
Threat Name: Direct Link To Trojan.Malscript
Location: htxp://yogurtpos.com/GoogleDrive-verfications/
polonus (volunteer website security analyst and website error-hunter)