The likely candidates on that list were all reported to Google Safe Browsing by security expert, Willem de Groot.
I did not check them all, but here is another one where cloaking is being detected, meaning the site appears differently to Google and Googlebot.
Just to demonstrate we have similar patterns here and same junks of heavily obfuscated suspicious javascript, we checked here: http://isithacked.com/check/shop.bjork.com
And again cloaking detected. There is a difference of 60802 bytes between the version of the page you serve to Chrome and the version you serve to GoogleBot.
The scan found some potential problems in the code, this should pop you down to the line. Where the obfuscated script resides damaging Magento.
on
line 58:
on
line 60:
on
line 62:
on
line 64:
and on
line 65:
I advise Magento shop website owners to do a free scan against MageReport (3.).
It will certainly make you aware of your present (in)security situation.
polonus (website security analyst and website error-hunter)
Update: From the Willem de G. list 176 webshop websites were found by F-Secure to be really malicious.
But the number of insecure vulnerable Magento websites are considerate.
Let us look at another example.
A scan at MageReport: https://www.magereport.com/scan/?s=https://en.titoloshop.com/
detected 2 vulnerabilities. The admin/downloader is unprotected, and should be protected through installing hypernode emergency filter.
Also security patch 9788 risk rating High against admin account hack vulnerability was not being installed.
Then we have other insecurity on the website. Excessive erver header info proliferation: nginx/1.10.1 with Comodo secure server CA.