Hi jorge.cacho.h,
I scanned your site to-day at jsunpack with these results as striking. The use of the packed code does not mean that it is malicious per se,
but any av solution generic/heuristic detection may alert on it.
Go here to watch the analysis: http://jsunpack.jeek.org/?report=96d7c245c7301cea793af79e695eb6db6f76bd60
Further insecurities (no malware threats, but exploitable insecurities)
Header returned by request for: hxtp://www.grisel.info → 54.229.222.178
Excessive header information here:
Server: Apache/2.2.22 (Debian)
X-Powered-By: PHP/5.4.4-14+deb7u4 *
Set-Cookie: e2df55d47db7fa297e6998f0681a3f5a=fogerlag79apu9h9t09l9hi1s3; path=/
Your site is not an asp.net site, but consider these scan results anyway for general insecurities found: https://asafaweb.com/Scan?Url=www.grisel.info
- found the version of PHP to have numerous vulnerabilities. The vulnerabilities in question are as follows: PHP Vulnerability: CVE-2012-2688 - Critical PHP Vulnerability: CVE-2013-1635 - Critical PHP Vulnerability: CVE-2011-4718 - Severe PHP Vulnerability: CVE-2013-2110 - Severe PHP Vulnerability: CVE-2013-4635 - Severe PHP Vulnerability - now you understand why you should not let your headers talk too loudly as I can find these, attackers can also find these now easily from the excessive header info…
polonus