Author Topic: Phishing site with detection for Html.Win32.Script.1500878?  (Read 1087 times)

0 Members and 1 Guest are viewing this topic.

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33905
  • malware fighter
Phishing site with detection for Html.Win32.Script.1500878?
« on: October 19, 2015, 04:03:45 PM »
See: https://www.virustotal.com/nl/url/c02b49d49337be925aabc3e9fa5c3e593e9361f13dbe8303a8d8f60210225cc0/analysis/1445262967/
A FP? -> https://www.virustotal.com/nl/file/75843dc42ad64ec890b370147516ce8a4a45b2651338e704a004c6eeaa9c3f40/analysis/1434489730/
Malware site: http://quttera.com/labs-data-url/v001921.home.net.pl
See: http://www.domxssscanner.com/scan?url=http%3A%2F%2Freputationdatabase.com%2Fpublic%2Fjs%2Fservices%2Fget_reviews.js
Flagged: http://urlquery.net/report.php?id=1445263100041

Sucuri flags: ISSUE DETECTED   DEFINITION   INFECTED URL
Website Malware   php-error-error-establishing-a-database-connection   -http://v001921.home.net.pl/cmssklepsuperdziecko/ ( View Payload )
Site error detected. Details: http://sucuri.net/malware/php-error-error-establishing-a-database-connection
<b>Warning</b>:  mysql_connect() [<a href='function.mysql-connect'>function.mysql-connect</a>]: Can't connect to local MySQL server through socket '//www.sklep-superdziecko.pl' (2) in <b>/cmssklepsuperdziecko/includes/functions/database.php</b> on line <b>21</b><br />

polonus
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!