Author Topic: How Dangerous Is "relellre.4pu.com"  (Read 4024 times)

0 Members and 1 Guest are viewing this topic.

Offline baumgrenze

  • Jr. Member
  • **
  • Posts: 28
How Dangerous Is "relellre.4pu.com"
« on: September 29, 2012, 06:11:18 AM »
I tried opening this website

http://www.fpcwhiteville.org/

Several times it was blocked by Avast with the warning "Malicious URL Blocked."

avast! Network Shield has blocked a harmful site

Object:  http://relellre.4pu.com
Infection: URL:Mal
Process: C:\Program Files\SeaMonkey\seamonke.exe

Just now it was allowed to open. Last time I tried there was an attempted redirect to "http://relellre.4pu.com"

Has anyone any idea how harmful this site might be?

Thanks,

baumgrenze

Offline CraigB

  • Avast Überevangelist
  • Serious Graphoman
  • *****
  • Posts: 10761
  • No support PM's thanks
Re: How Dangerous Is "relellre.4pu.com"
« Reply #1 on: September 29, 2012, 07:21:28 AM »
Please dont post live malicious links as there is always bound to be someone that will click on these, change http to hxxp

Online Pondus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 34729
« Last Edit: September 29, 2012, 11:02:08 AM by Pondus »
Chief Wiggum: Uh, no, you got the wrong number. This is 9-1…2.


Offline polonus

  • Avast Überevangelist
  • Maybe Bot
  • *****
  • Posts: 30694
  • malware fighter
Re: How Dangerous Is "relellre.4pu.com"
« Reply #3 on: September 30, 2012, 07:28:02 PM »
Like to thank Pondus for reporting this, our friend, !Donovan, for his in-depth analysis of the malcode at hand.
See: http://websiteanalystsresource.wordpress.com/2012/09/29/updated-51la-malware-no-antivirus-detects/
I will add some additional information why the site has been hacked in the first place and got infected through blackhat-seo-spam,.
This malware is mostly coming from China.
Read on (links thanks to Sucuri info, article by  fioravante souza, and zen-cart-wiki and off-course !Donovan's article).

Again a victim from an outdated WP version that made the site vulnerable to a PHP eval hack.
How it was being performed read here: http://blog.unmaskparasites.com/2012/05/18/careless-webmasters-as-wordpress-hosting-providers-for-spammers/
and here: http://blog.sucuri.net/2012/08/sitecheck-got-blackhat-seo-spam-warning.html
About recovering from hacks: http://www.zen-cart.com/wiki/index.php/Recovering_From_Hacks  (info available from Zen Cart® project)
OK, first priority in all these cases is to keep the website software fully updated, patched and checked,

polonus
« Last Edit: September 30, 2012, 08:15:25 PM by polonus »
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!