Dear Pernaman,
Seems redirected twice: http://isithacked.com/check/www.origin.com
Read: http://www.thisheadx.com/www/origin.com
See: https://aw-snap.info/file-viewer/?protocol=not-secure&tgt=www.origin.com&ref_sel=GSP2&ua_sel=ff&fs=1
0-0-0 iFrame code detected: https://threatintelligenceplatform.com/report/origin.com/iGuY7aQo5O
and new window opening script detected. Configuration warnings and fail.
2 vulnerable jQuery libraries: http://retire.insecurity.today/#!/scan/10c7492a686b60d3d3a84f3eaebe68d654e1936a89a32a19eabf96bb66efab5d
MX and DNS issues: https://threatintelligenceplatform.com/report/origin.com/iGuY7aQo5O
D-Grade and recommendations: https://observatory.mozilla.org/analyze.html?host=www.origin.com
Interpretation of ‘javascript false’ just comes with browser specific coding,
so that should not denote suspicious code nor malicious code even.
It is just coding with a specific non-standard browser in mind.
Read here on StackOverflow about it: https://stackoverflow.com/questions/20535222/what-is-the-difference-between-javascript-and-javascriptfalse-in-ifr
Apart from the improved security issues I pointed out I see no suspicious or malicious code on that website.
polonus (volunteer website security analyst and website error-hunter)