Author Topic: Unmask Parasites became worse to scan with here for htaccess hack!  (Read 1754 times)

0 Members and 1 Guest are viewing this topic.

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33904
  • malware fighter
See: http://killmalware.com/cardem.com/#
Read about this issue here: http://blog.unmaskparasites.com/2009/04/07/using-wget-to-detect-hijacked-search-engine-traffic/
Info credits: redleg
What when we search through? Re: http://www.unmaskparasites.com/web-page-options/?url=http%3A//great-antispyware.info/0/go.php%3Fsid%3D2  (especially see the 72 mentions)
Critical malware detected: http://sitecheck.sucuri.net/results/cardem.com
Custom errors fail and warnings: https://asafaweb.com/Scan?Url=cardem.com
Quttera's flag it: http://quttera.com/detailed_report/cardem.com
Reason:   Detected suspicious redirection to external web resources at HTTP level.
Details:   Detected HTTP redirection to hxtp://great-antispyware.info/0/go.php?sid=2.
Potentially Suspicious files: 134 Replaces text with by in string

polonus
« Last Edit: October 28, 2014, 05:11:23 PM by polonus »
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33904
  • malware fighter
Re: Unmask Parasites became worse to scan with here for htaccess hack!
« Reply #1 on: October 28, 2014, 05:19:16 PM »
Re: http://www.unmaskparasites.com/security-report/?page=www.hollisterfrancesonline.com
Redirect is there: Redirects:   302 -> htxp://www.servingnotice.com/afserp10/index.html  but not flagged as
Hidden/Malicious iFrame

polonus
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33904
  • malware fighter
Re: Unmask Parasites became worse to scan with here for htaccess hack!
« Reply #2 on: October 28, 2014, 10:07:13 PM »
Another SE visitors redirect here: http://killmalware.com/taiziyulecheng2014a.com/#
Mentioned but not flagged here: http://www.unmaskparasites.com/security-report/
and http://www.unmaskparasites.com/security-report/
Sucuri's flags the malware: ISSUE DETECTED   DEFINITION   INFECTED URL
Website Malware   MW:HTA:7   htxp://taiziyulecheng2014a.com - suspicious redirection to external web resources at HTTP level.
PHP vulnerable: http://www.scip.ch/en/?vuldb.9971
The SE visitor redirect campain: http://evuln.com/labs/redirect/www.116188.com/

pol
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!