Browser JS Guard detects threat at website...

Where? : htxp://ninjafirewall.com/
What? Hidden iframe(s) Redirections
UnAuthorized Redirections
Encoded JavaScript
Threat:: Encoded JavaScript Malware
Malicious content is::
document.write(String.fromCharCode(60,102,111,114,109,32,110,97,109,101,61,34,117,102,111,114,109,34,32,109,101,116,1 -* this is a spam web-exploit - *my remark, pol (<form name=“uform” met etc.)

Netcraft risk rating 1/10 red: http://toolbar.netcraft.com/site_report?url=http://ninjafirewall.com

Same threat script detected and flagged by Browser JSGuard here: htxp://www.stentorian.com/antispam/mailform.html
Indicating there is a hidden JavaScript module in this other file info credits from “Spam Delenda Est”

polonus (volunteer website security analyst and website error-hunter)

This also comes flagged: htxp://www.robholland.com/CharCode.html
Translate keyboard characters into JavaScript ASCII Character Code

polonus

ninjafirewall.com.htm
https://www.virustotal.com/nb/file/41733115d48fbd5f0d6908e523a78b68f0e3685c6767b4944b52ec9d12722fd4/analysis/1432908840/

www.robholland.com.htm
https://www.virustotal.com/nb/file/61eadeea9b6fd33c664eb35c1988a49be95b0d86a1ace9f58e58a75b1df16ad5/analysis/1432909084/

Trend Micro sees it on injafirewall.com as a low risk file, probably could be a harmless feedback script that is heuristically flagged for suspicious obfuscation: http://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/heur_htjs.pacryp
But I won’t take risks with is until known for what it is.

polonus