But in the Menus you can select the Source code View, Then you can go to the search function
in the menus and scan for the code which is seen in this link:
See: Joomla Version 1.5.18 - 1.5.26 for: htxp://nellosbar.com/media/system/js/caption.js
Joomla Version 1.5.18 to 1.5.26 for: htxp://nellosbar.com/language/en-GB/en-GB.ini
Malware at hand: http://labs.sucuri.net/db/malware/malware-entry-mwspamseo
See code matches for connect dot facebook dot net/en_GB/all.js’;d.getElementsByTagName(‘head’)[0].appendChild(js);}(document));
via http://jsunpack.jeek.org/?report=d2680d38405ab803dfd65e6053a9fb109b354ea5 (Open in browser with NS and RP extensions active and in a VM/sandbox, for security researchers only)
It is on info: [decodingLevel=0] found JavaScript
error: undefined variable Cufon
error: undefined function Cufon.replace
error: line:8: SyntaxError: missing = in XML attribute:
error: line:8:
error: line:8: …^
file: 79888368431993a29081ae7a45a2cf56bc94f12f: 10510 bytes
Decoded Files
7988/8368431993a29081ae7a45a2cf56bc94f12f from nellosbar.com/ (10510 bytes, 431 hidden) →
SEO Spam from htxp://semenaxhowto.com/ & htxp://aboutvigrx.com/ & hxtp://volumepillshelper