See: http://urlquery.net/report.php?id=1447002415277
Various malware incidents reported, see fortiguard’s detections.
CMS malcode - vulnerable library detected: Detected libraries:
jquery-migrate - 1.2.1 : -http://acb.ng/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.2.1
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
jquery - 1.11.2 : (active1) -http://acb.ng/wp-includes/js/jquery/jquery.js?ver=1.11.2
jquery.prettyPhoto - 3.1.6 : (active1) -http://acb.ng/wp-content/themes/surreal/theme/compressed/theme.min.js?ver=1437073200
(active) - the library was also found to be active by running code
1 vulnerable library detected → -http://www.domxssscanner.com/scan?url=http%3A%2F%2Facb.ng
Possible malware site [ Advisory provided by Google ]
IP listed as PHISH: http://permalink.gmane.org/gmane.comp.security.phishings/64957
CMS insecuirties: WordPress Version
4.2.5
Version does not appear to be latest 4.3.1 - update now.
WordPress Plugins
The following plugins were detected by reading the HTML source of the WordPress sites front page.
contact-form-7 latest release (4.3)
http://contactform7.com/
js_composer
WordPress Theme
The theme has been found by examining the path /wp-content/themes/ theme name /
SurrealTF 1.3.3http://themeforest.net/user/bitfade
Warning User Enumeration is possible (user Login) & Directory Indexing Enabled (uploads)
External link risk status: http://toolbar.netcraft.com/site_report?url=http://revocube.com
Known javascript malware. Details: http://sucuri.net/malware/entry/MW:JS:GEN2?web.js.malware.fake_jquery.001
6/66 detection ratio: http://safe-browsing.inetworktools.com/en/sb-o/acb.ng/
polonus