Shorten link= htxp://t.co/bdk7ckgWEz
Long link= htxp://kitchenland-lv.com/wp-content/plugins/search-and-replace/lythwkal.php?huujm
Well, I am not quite sure if this is real, as all the scans isn’t conclusive (return a 403 forbidden error). I can’t access the site though the shorten link either. There seem to be no blacklist yet (probably due to it can’t be access directly this way or the content have been removed).
I asked if this is phishing because I get some notification saying that this site is phishing some university id and password.
WP seems OK on site, only check WP-plug-in “q-and-a 1.0.6.2” - no update given, could be left CMS software 8)
error was encountered while trying to use an ErrorDocument to handle the request
HTTP Server: Apache HTTP Server 2.2.29
Operating System: Gentoo Linux
PHP Version: 5.3.29-pl0-gentoo (Outdated)
This seems OK: http://toolbar.netcraft.com/site_report?url=http://kitchenland-lv.com
Check these also: Linked iFrames
Compromised sites will often contain embedded iframes that can also deliver malicious code to visitors of the web site. Check any discovered iframes and ensure they are legitimate.