See: Trojans detected:
Object: -http://fortysixtyphoto.com/category/tutorials/page/2/
SHA1: 6bbbb5900934a516e65d6db258fa91e8809b98a7
Name: TrojWare.JS.Agent.caa
Read on this infection here: http://stayaway2.blogspot.com/search/label/TrojWare.JS.Agent.caa
6 detect: https://www.virustotal.com/nl/url/cf8a00680867ff5d696f5a38f5ed7677933dc888411b95b954849d0fb1ba395f/analysis/#additional-info
Infested with SEO-Spam: ISSUE DETECTED DEFINITION INFECTED URL
SEO Spam MW:SPAM:SEO?s -http://fortysixtyphoto.com
SEO Spam MW:SPAM:SEO?s -http://fortysixtyphoto.com/404testpage4525d2fdc
SEO Spam MW:SPAM:SEO?s -http://fortysixtyphoto.com/404javascript.js
SEO Spam MW:SPAM:SEO?s -http://fortysixtyphoto.com/authors/
SEO Spam MW:SPAM:SEO?s -http://fortysixtyphoto.com/contact/
SEO Spam MW:SPAM:SEO?s -http://fortysixtyphoto.com/shop/
Known Spam detected. Details: http://sucuri.net/malware/entry/MW:SPAM:SEO?s
By paddloPayday loans
*Known javascript malware. Details: http://sucuri.net/malware/entry/MW:SPAM:SEO?g12 t='';}}x[l-a]=z;}document.write('<'+x[0]+' '+x[4]+'>.'+x[2]+'{'+x[1]+'}');}dnnViewState(); /index.html Severity: Malicious Reason: Detected encoded JavaScript code commonly used to hide malicious behaviour. Details: Malicious obfuscated JavaScript threatASdditionally found:
Possible Frontend SPOF from:
css3-mediaqueries-js.googlecode.com - Whitelist
(99%) -
assets.pinterest.com - Whitelist
(0%) -
polonus