Thanks for confirming this. !Donovan. Sometimes website scanners just do not go deep enough to come up with this.
Zscaler was right in the analysis, but thanks to one of the reports of Quttera’s scan and checking on those external links this could be established.
The historic iFrame malware entry dates back to 2012 and is a variant of a known type: http://labs.sucuri.net/?malware&entry=2012-06-05

And again there is another scanner to confirm the status: “infected”
DrWeb’s url scanner: giving a JSTAG infection with JS.IFrame.462 (by Blackhole malcreants):

Checking:htxp://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js
File size:70.48 KB
File MD5:10092eee563dec2dca82b77d2cf5a1ae

htxp://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js - archive JS-HTML

htxp://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js/JSTag_1[aded][6c01] - Ok
htxp://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js/JSTag_2[d2f4][46fa] - Ok
htxp://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js - Ok

Checking:htxp://lanke.historielag.org//media/system/js/caption.js
File size:1963 bytes
File MD5:38ba23053bea8a521cd624b6ad88e475

htxp://lanke.historielag.org//media/system/js/caption.js - Ok

Checking:htxp://lanke.historielag.org//templates/pure_white/lib/js/moomenuv.js
File size:4964 bytes
File MD5:0890e9f73dd752ac180d04173c061899

hxtp://lanke.historielag.org//templates/pure_white/lib/js/moomenuv.js - Ok

Checking:htxp://lanke.historielag.org//media/system/js/mootools.js
File size:72.69 KB
File MD5:f6490edc31bf9c25ba507f41ce614def

htxp://lanke.historielag.org//media/system/js/mootools.js - Ok

Checking:htxp://lanke.historielag.org//templates/pure_white/lib/js/tooltips.js
File size:310 bytes
File MD5:7376a0ee3a38fbee84a33d690fe9d236

htxp://lanke.historielag.org//templates/pure_white/lib/js/tooltips.js - archive JS-HTML

htxp://lanke.historielag.org//templates/pure_white/lib/js/tooltips.js/JSFile_1[0][136] - Ok
htxp://lanke.historielag.org//templates/pure_white/lib/js/tooltips.js - Ok

Checking:htxp://lanke.historielag.org//modules/mod_ariimageslider/mod_ariimageslider/js/jquery.nivo.slider.js
File size:6503 bytes
File MD5:34f13466e069c37e59845a0257b38f57

htxp://lanke.historielag.org//modules/mod_ariimageslider/mod_ariimageslider/js/jquery.nivo.slider.js - archive JS-HTML

htxp://lanke.historielag.org//modules/mod_ariimageslider/mod_ariimageslider/js/jquery.nivo.slider.js/JSFile_1[0][1967] - Ok
htxp://lanke.historielag.org//modules/mod_ariimageslider/mod_ariimageslider/js/jquery.nivo.slider.js - Ok

Checking:htxp://lanke.historielag.org//modules/mod_ariimageslider/mod_ariimageslider/js/jquery.noconflict.js
File size:81 bytes
File MD5:5acebfebdced7e7dc4a937989533549a

htxp://lanke.historielag.org//modules/mod_ariimageslider/mod_ariimageslider/js/jquery.noconflict.js - Ok

Checking:htxp://www.statcounter.com/counter/counter.js
File size:9028 bytes
File MD5:389f1acf246618ba207b9122dfbc57a8

htxp://www.statcounter.com/counter/counter.js - Ok

Checking:htxp://lanke.historielag.org/
Engine version:7.0.5.6250
Total virus-finding records:4380605
File size:15.08 KB
File MD5:7225edc8484edbbe97a8104f340b76e9

htxp://lanke.historielag.org/ - archive JS-HTML

htxp://lanke.historielag.org//JSTAG_1[780][ae] - Ok
htxp://lanke.historielag.org//JSTAG_2[de4][521] infected with JS.IFrame.462
htxp://lanke.historielag.org//JSTAG_3[3993][61] - Ok

pol