SE redirect and more

see: http://killmalware.com/veniceinaqua.it/#
Visitors from search engines are redirected
to: htxp://www.caribsoft-online.biz/templates/rhuk_solarflare_ii/images/index.php
1214 sites infected with redirects to this URL
Missed here: http://quttera.com/detailed_report/veniceinaqua.it
Sucuri flags: ISSUE DETECTED DEFINITION VULNERABLE HEADER
Outdated Web Server Apache Found Vulnerabilities on Apache 2.2 Apache/2.2.14
http://httpd.apache.org/security/vulnerabilities_22.htmlHostname: veniceinaqua.it

IP address: 195.246.192.46 → http://dnstree.com/195/246/192/46/

System Details:
Running on: Apache/2.2.14
System info: (Ubuntu)
Powered by: PHP/5.3.2-1ubuntu4.14
Unable to properly scan your site. Site returning error (40x): HTTP/1.1 404 Not Found
Outdated Web Server Apache Found: Apache/2.2.14

pol

veniceinaqua.it site is down http://www.downforeveryoneorjustme.com/veniceinaqua.it

urlQuery http://urlquery.net/report.php?id=1408909537130 click pic in top right corner’

Agree with you, Pondus, that there is no immediate threat, but the website server configuration is vulnerable,
so every time an exploit could create a re-infection.

pol

Threat also detected by Quttera’s : index
Severity: Suspicious
Reason: Detected suspicious redirection to external web resources at HTTP level.
Details: Detected HTTP redirection to htxp://no-ca.ru/example/status.php.
File size[byte]: 0
File type: Unknown
MD5: 00000000000000000000000000000000
Scan duration[sec]: 0.001000
-< htXp://killmalware.com/ptwenty8.com/
Flagged: http://sitecheck.sucuri.net/results/ptwenty8.com

This attack uses the .htaccess file to redirect users to a site serving malware (or spam). In some cases, the index.php is also modified to do the redirection as well.

pol