polonus
1
polonus
2
The following is hacked via injected javascript malware: http://killmalware.com/indiepromoter.com/
Method, read: http://stackoverflow.com/questions/3391623/decode-some-injected-javascript
As ever missed here: https://www.virustotal.com/nl/url/6c6b60d74c61ee4b5ed77b71e36ff679c4b242470817d69b4e8c0a99aef64351/analysis/1441789207/
Detected at Sucuri’s: ISSUE DETECTED DEFINITION INFECTED URL
Defacement MW:DEFACED:01 -http://www.indiepromoter.com
Defacement MW:DEFACED:01 -http://www.indiepromoter.com/404testpage4525d2fdc
Defacement MW:DEFACED:01 -http://www.indiepromoter.com/404javascript.js
Defacement MW:DEFACED:01 -http://www.indiepromoter.com/404javascript.js
Web site defaced. Details: http://sucuri.net/malware/entry/MW:DEFACED:01
Hacked By H3X KH4N
*Known javascript malware. Details: http://sucuri.net/malware/entry/MW:DEFACED:01?v03
document.write(unescape('%3C%68%74%6D%6C%3E%0A%3C%6 etc. DreamHost abuse.
http://toolbar.netcraft.com/site_report?url=http://208.113.128.53
Quttera detects:
index.html
Severity: Malicious
Reason: Detected malicious PHP content
Details: Website Potentially Defaced
index:
```
[[Hacked By H3X KH4N]]
```
This looks better: http://toolbar.netcraft.com/site_report?url=apache2-fritz.goldenstar.dreamhost.com
OpenSSH 5.9p1 Debian 5ubuntu1.6 (Ubuntu Linux; protocol 2.0)
Service Info: Host: goldenstar.dreamhost.com; OS: Linux; CPE: cpe:/o:linux:linux_kernel
Has fastly tracking: -https://www.fastly.com/ → http://toolbar.netcraft.com/site_report?url=http://goldenstar.dreamhost.com
polonus