Its not funny when a visitor sends email to the webmaster saying Avast is throwing pop up for harvesting trojan horse, while the situation is the gzipped cached version is delivered to the visitors via wp supercache plugin (its WordPress).
./wp-includes/js/l10n.js?ver=20101110 and ./wp-includes/js/jquery.js?ver=1.6.1 was infected. These are core WordPress files, so simply deleted them and added from WordPress repository.
Probably came from CDN we have abandoned few days ago for other serious issue.
@Abhishek459845,
If you’re using WordPress make sure you have the latest updates installed.
There have been some problems with attacks not long ago. http://codex.wordpress.org/Updating_WordPress
Yes, everything is up to date of the WordPress installation. The full installation has been restored from the backup (scanned before updating with it!) today.
Probably that or some variant of the exploit was used.
@bob3160 : I came to know today from Mrs. Corrine, that she knows you since many years! Great.