See: http://killmalware.com/crosswiresolutions.com/#
var vclk_options = {sid:65918,media_id:2,media_type:2,version:"1.3",pfc:900000};
Web site defaced. Details: http://sucuri.net/malware/entry/MW:DEFACED:01
Hacked By Darkshadow
Results from scanning URL: htxp://ajax.cloudflare.com/cdn-cgi/nexp/dok2v=919620257c/cloudflare.min.js
Number of sources found: 22
Number of sinks found: 11 DOM XSS vuln. Shared javascript compromise.
polonus
Update - still there and detected as: TrendMicro-HouseCallTROJ_GEN.F47V0724
KasperskyUDS:DangerousObject.Multi.Generic → http://killmalware.com/crosswiresolutions.com/#
See it missed here: https://www.virustotal.com/nl/url/26bc0125354f3291afce04f8e45f5ab9a6b383712152dbb458383243bda71b4a/analysis/
Defacement: Web site defaced. Details: http://sucuri.net/malware/entry/MW:DEFACED:01
Hacked By Darkshadow
Possible Frontend SPOF from:
ajax.cloudflare.com - Whitelist
(82%) -
cdn.fastclick.net - Whitelist
(50%) -
http://toolbar.netcraft.com/site_report?url=http://crosswiresolutions.com
WOT Trustworthiness: Very Poor
WOT Privacy: Very Poor
WOT Child Safety: Very Poor → https://mysitestats.org/www/crosswiresolutions.com
polonus
Update. Another one detected here: http://killmalware.com/jasonmgraham.com/
Missed here: https://www.virustotal.com/en/url/e045fbaec6bdfbf07e54ad23b2a85fde43e7ffdd099ea50e1ae7ef0288e3f463/analysis/#additional-info
Flagged: index.html
Severity: Malicious
Reason: Detected malicious PHP content - javascript
Details: Website Potentially Defaced
GoDaddy abuse.
polonus
polonus
February 11, 2016, 11:49pm
4