i-frame detected

Armorcast.com - popped positive on three separate computers, mine and 2 acquaintances.

They are a supplier of resin sci-fi wargaming terrain, and have had no problems in the past.

Well, there are several scripts that are throwing some weird things.

Such as this: eval(String.fromCharCode(118,97,114,32,104,106,103,52,61,(most of script removed to prevent code from being active).

And…

You have to exercise care when posting the actual script or avast could possibly alert on the forum topic, which kind of defeats the purpose, along with breaking any links so they aren’t a) active, b) detected by avast (the old hXXp bit).

This is why I tend to post images of the script.

So I suggest modification like ^script^ and ^/script^ to prevent any possible interpretation of the script within the forums. Humans should see the obvious changes but would stop any possible mis-identification by avast within the forums.

Sorry, when I posted it it didn’t look like avast took it as an actual script, so I thought it was ok. I’ll remove parts of it to disable it.

A little offtopic here: what can we do to prevent this hacking of i-frames? It seems we’re not dealing with just one malicious software here, but an entire loophole on the Internet

Really this security issue is something you should ask your Host, as they have a degree of responsibility here also. If they provide services like PHP, MySQL, WordPress or other content management software it needs to be up to date as older versions could be vulnerable to exploit.

For your part ensure you have strong passwords (that aren’t stored on-line) for your ftp upload or modification of files. Ensure that file permissions (CHMOD) are tightened, so that only the owner is allowed write permission and others only allowed read, etc.