And also look here: http://sitecheck.sucuri.net/scanner/?scan=http%3A%2F%2Fwww.aquamail-peseux.ch%2F
Known javascript malware: Known javascript malware.
Details: http://sucuri.net/malware/entry/MW:SPAM:SEO
t=‘’;}}x[l-a]=z;}document.write(‘<’+x[0]+’ ‘+x[4]+’>.‘+x[2]+’{‘+x[1]+’}</‘+x[0]+’>');}dnnViewState();
Joomla outdated for: Joomla Version 2.5.x for: htxp://www.aquamail-peseux.ch//language/en-GB/en-GB.ini
Javascript check: Suspicious
guage=“javascript”> function dnnviewstate() { var a=0,m,v,t,z,x=new array(‘9091968376’,‘8887918192818786347374918784939277359287883421333333338896’,‘778787’,'9499
Read about this here: http://vel.joomla.org/articles/844-spotting-spam-code-in-malicious-extensions.html (see Example 2)
Cloaking Black Hat SEO → https://productforums.google.com/forum/#!msg/webmasters/1ML9zaOTNIo/5AHEfXiecQMJ posted by 2 authors.
polonus
@Silki
See here with Fetch under scripts as to what script has to be cleansed for the site to no longer being alerted: http://fetch.scritch.org/%2Bfetch/?url=http%3A%2F%2Fwww.aquamail-peseux.ch%2F&useragent=Fetch+useragent&accept_encoding=
look under scripts for the one starting with
function dnnViewState() ////{ var a=0,m,v,t,z,x=new Array(////
/// broken by me, pol.
D