naverex dot net redirects and redirects via obfuscated javascript malware!

Re: https://www.abuseipdb.com/check/213.169.82.196 potentially still actively engaged in abusive activities.
Problems detected here: https://aw-snap.info/file-viewer/?protocol=not-secure&ref_sel=GSP2&ua_sel=ff&chk-cache=&fs=1&tgt=bnx2e317eC5ue3Q%3D~enc

Known javascript malware: malware.generic_jsobfuscator?1.2 and vulnerablities in server software and PHP.
Re: https://sitecheck.sucuri.net/results/https/naverex.net/index
Redirect to: -http://hurevyays.tk/index/?8mMwj2&extra_param_1=201
redirect to: hxtps://doesok.top/latest a PHISHING destionation. suspicious top domain…
hidden iFrame



Note: This block of obfuscated script looks suspicious, looks like it writes an iframe/script call src=htxps://59-57813.s.cdn13.com/drawtexture.htmlappendChildbody → Content after the < /html> tag should be considered suspicious;
Autonomous System Risk ASN: 40824 WZ Communications 9 on uCDN carrier…

polonus (volunteer website security analyst and website error-hunter)