Phishy patterns, could well be malware related!

Code landing at -http://lamviectrenmang.co advert campaign, see: http://www.domxssscanner.com/scan?url=https%3A%2F%2Fbancopostaimpresaonline.poste.it%2Fbpiol%2Fjs%2Fbanner.js
Site is vulnerable to the Poodle attack!
Extensive server header info proliferation detected: IBM_HTTP_Server/6.1.0.25 Apache/2.0.47 Win32 exploitable by SSL Key Renegotation.
This external link is blocked by uMatrix: -http://webtrendslive.com/
Link not available:- http://mybank.alliance-leicester.co.uk/
This is an external spam link → -myonlineaccounts2.abbeynational.co.uk*;client.uralsibbank.ru
Interesrting Array going to an exploit kit…TSPY_ZBOT.AUY infested website!
Report for detection!

polonus (volunteer website security analyst and website error hunter)