Malicious hack on website not detected? Trojan.Script.StartPage.fakt malware.

See: http://killmalware.com/orgstore.com/#
Missed: https://www.virustotal.com/nl/url/df7b2006c98154ac970439b2e0334f4e5cadb0a66226b0beaa26c430912bbeed/analysis/
Given as unable to be properly scanned: https://sitecheck.sucuri.net/results/orgstore.com
Missed by Quttera’s also: http://quttera.com/detailed_report/orgstore.com
For code see: http://www.newffr.com/backup_html//html/img/www.ifrance.com_argentdonne_page2.htm_
Netcraft Website Risk Status 9 red out of 10: http://toolbar.netcraft.com/site_report?url=http://82.196.5.35
External link to Girl Geeks Spam detected via -users2.titanichost.com
External link to Crack site: hxtp://khalidmoro.free.fr/ ??? → http://toolbar.netcraft.com/site_report?url=Www.KhaLidmoro.coMhttps://www.youtube.com/user/2MoroCco
registered as no website: http://whois.domaintools.com/khalidmoro.com
bad zone at NS1.AMENWORLD.COM main dns report: http://www.dnsinspect.com/amenworld.com/1438900232
Nameserver version info proliferation: Name Servers Versions
WARNING: Name servers software versions are exposed:
81.88.63.39: “Served by POWERDNS 3.1 $Id: packethandler.cc 2579 2012-04-26 11:28:04Z peter $”
81.88.63.47: “Served by POWERDNS 3.1 $Id: packethandler.cc 2579 2012-04-26 11:28:04Z peter $”
Exposing name server’s versions may be risky, when a new vulnerability is found your name servers may be automatically exploited by script kiddies until you patch the system. Learn how to hide version.
Found mail servers with inconsistent reverse DNS entries.
WARNING: Found mail servers which are not accepting emails to abuse@amenworld.com address:

Mail issues also here at scan site: =orgstore.comhttp://www.dnsinspect.com/orgstore.com/1438900547
relatied domain registrar: htxp://www.1und1.de/?ac=uc.schlund

polonus (volunteer website security analyst and website error-hunter)