Unknown malware? Virtual clickers?

See: https://www.virustotal.com/en/url/34ab85f35dfc240d64c8bd1124fe142c328652eda3d0e0419f0de8007d9aca07/analysis/1417034619/
Blacklisted links: http://quttera.com/detailed_report/stefigs.blogspot.com#collapseEight
Unable to properly scan site → http://urlquery.net/report.php?id=1417034842854
Earlier IDS alerts: http://urlquery.net/report.php?id=1417034290092
Listed here: https://www.securiteinfo.com/attaques/hacking/sites_web_corrompus.shtml
IP detections: http://totalhash.com/network/ip:74.125.228.203
Code not found: http://linkeddata.informatik.hu-berlin.de/uridbg/index.php?url=http%3A%2F%2F1.bp.blogspot.com%2F-48hmyjofbkm%2Fvfixva0zz_i%2Faaaaaaaakz0%2Frwjolklgrpu%2Fs1600%2Ffreedom-ugr-003-box.jpg&useragentheader=&acceptheader=
External link: https://virtualclickers.uwo.ca/PasswordBestPractices.htm
Failed response: htxps://www.blogger.com/static/v1/jsbin/1467437049-lbx__fr.js = OK →
http://www.isithacked.com/check/https%3A%2F%2Fwww.blogger.com%2Fstatic%2Fv1%2Fjsbin%2F1467437049-lbx__fr.js

pol

Malware Poodle attack came from 54.231.12.248 urlQuery Client ET POLICY SSLv3 outbound connection from client vulnerable to POODLE attack
for 74.125.232.203
see: http://apkscan.nviso.be/report/show/9541f90ca5a6da61ac2524f7cbee1cbf

pol