Author Topic: MW:REDIR:FAKEAV533 still present on website?  (Read 1181 times)

0 Members and 1 Guest are viewing this topic.

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33900
  • malware fighter
MW:REDIR:FAKEAV533 still present on website?
« on: October 01, 2016, 12:40:08 AM »
A conditional redirection was detected on the web site, sending users to a domain pushing the Fake V to anyone visiting the compromised site.

It is according to this scan: https://aw-snap.info/file-viewer/?tgt=http%3A%2F%2Famanin.net%2F&ref_sel=GSP2&ua_sel=ff&fs=1
Location: -http://senetrpals.ru/olafz?11
Note: This line has redirected the request to -http://senetrpals.ru/olafz?11
but Content that was returned by your request for the URL: -http://amanin.net/
Note: Content displayed is from the redirect location, the URL -http://senetrpals.ru/olafz?11
CGI hack? -> e.g. -http://amanin.net/././././././././././././././  re: 亜麻仁油 効果のすべて
Drown exploit: https://test.drownattack.com/?site=dns0.heteml.jp

pol
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!