Website hacked, defaced and with malware?

See: http://killmalware.com/inspiraction.com/#
malcode: http://urlquery.net/report.php?id=1483033452895 → -ads.avocet.io malcode…
removal info: http://www.sitealyzer.net/en/p/sb/remove-ads.avocet.io/

Insecure redirect (Google Safebrowsing alerted) → -https://wXw.codingfun1.blogspot.com/
Certificate
Error: Wrong certificate installed.
The domain name does not match the certificate common name or SAN.
Warnings
RSA remove cross certificates
The certificate chain contains a cross root (primary intermediate) certificate that should be remove
*.googleusercontent.com certificate hosted at (not found): -http://qb-in-f132.1e100.net/
with insecure Identifier: unique IDs about your web browsing habits have been insecurely sent to third parties.

93=rehbtz6ern6glt2h5iXXXXXXXplfwr6bauubbz0ct2iwr6xrtknm9-fdizkix4u4bvvbhuuiujctm3XXXXXXX6hfstxfpoeuawl62fx0q3iluzvm1sqtlaaj95_ -cwdlj www.google.com nid
Your privavcy is endangered and private info might be stolen…

Custom errors:Fail and three warnings: https://asafaweb.com/Scan?Url=inspiraction.com
F-status: https://observatory.mozilla.org/analyze.html?host=inspiraction.com
retirable jQuery library 1.11: http://retire.insecurity.today/#!/scan/2937d7c0ca000cfe268bfb41e05e62110d9beac12b0fa2945d4085ba9ab672ac
Re: http://toolbar.netcraft.com/site_report?url=http%3A%2F%2Finspiraction.com%2F
IP info: https://www.reasoncoresecurity.com/ip-address-81.88.60.34.aspx

polonus (volunteer website security analyzer and website error-hunter)

Update: ongoing campaign…

Malcode detected here: http://urlquery.net/report.php?id=1483201174203
On that malcode IP: https://www.threatminer.org/host.php?q=54.229.210.231
and
re: https://www.threatcrowd.org/domain.php?domain=khamsat.com

On that infested Indonesion domain website: https://observatory.mozilla.org/analyze.html?host=www.remangaindo.com
C-status here: https://sritest.io/#report/c110b6f6-b7f4-48bd-b6a6-c1707fd0a8a0

-http://www.remangaindo.com
Detected libraries:
jquery-migrate - 1.4.1 : -http://www.remangaindo.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.4.1
jquery - 1.12.4 : (active1) -http://www.remangaindo.com/wp-includes/js/jquery/jquery.js?ver=1.12.4
Info: Severity: medium
https://github.com/jquery/jquery/issues/2432
http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/
(active) - the library was also found to be active by running code
1 vulnerable library detected

On that particular malcode in link: https://webcookies.org/cookie/domain/ads.avocet.io/51194
and re: https://ipinf.ru/domains/?host=ads.avocet.io

On the cleansing: https://forums.malwarebytes.com/topic/188900-need-help-with-yourconnectivitynet/?page=2#comment-1065886 (Do not use cleansing info as this was meant for a particular user on a particular system, copying the routine or performing without guidance of a qualified remover could put your computer at risk or even ruin it.
Victims with likewise problems are asked to go here https://forum.avast.com/index.php?topic=53253.0
and present the logs required there…

polonus