See: http://killmalware.com/yogadogstudios.com/#
The location line in the header above has redirected the request to: htxp://www.yogadogstudios.com/
Blacklisted: http://www.yandex.com/infected?url=yogadogstudios.com&l10n=en
Flagged URLs found in: htxp://yogadogstudios.com
1: htxp://globalpoweringgathering.com/nl.php?p=1 → http://www.google.com/safebrowsing/diagnostic?site=http://globalpoweringgathering.com/nl.php?p=1
Missed: http://quttera.com/#online url malware scanner 4 hours apparently is too recent to be detected!
Flagged by one: https://www.virustotal.com/nl/url/b9f16c36b6c8d91b968b001cabd631f3f440a64ac2900efbddb4bda2015429bb/analysis/1396185578/
Rightly detected by Sucuri: http://sitecheck3.sucuri.net/results/yogadogstudios.com/
Malware: http://sucuri.net/malware/malware-entry-mwgdd5 & http://sucuri.net/malware/entry/MW:BLK:2
polonus
P.S.
From this analysis by Brian Baskin we see that this malware attack is rather old and dates back from 2011:
http://www.thebaskins.com/main/component/content/article/15-work/56-attackanalysis
This time around there was an attack on contact.php and I mean SQL Injection
vulnerable here was contact.php?id= & user_id etc. is exploitable (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2133)
D