Why only MBAM and yandex block this hacking website?

Analysis of the malware on website detected is here: https://www.sophos.com/en-us/threat-center/threat-analyses/viruses-and-spyware/Troj~LockScr-J/detailed-analysis.aspx (detailed analysis credits go to Sophos) -see *

Additionally I report:
Re: -http://pimpam.ru/ (category: hacking)
Detected libraries:
jquery - 1.7.2 : -http://ajax.googleapis.com/ajax/libs/jquery/1.7.2/jquery.min.js
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
jquery-ui-dialog - 1.8.20 : -http://pimpam.ru/js/custom.js
Info: Severity: medium
http://bugs.jqueryui.com/ticket/6016
jquery-ui-autocomplete - 1.8.20 : -http://pimpam.ru/js/custom.js
2 vulnerable libraries detected

Various adware links blocked by script- and adblocker. (-http://c.am15.net/preloader7.js -http://am15.net/sb.php?s=16264 * etc. etc.) and there is also a link to an expired website: -http://yandexapi.net/partner_js.php?site=2&id=236&rev=0

This domain is expired. If you are the domain owner please click here to renew it. yandexapi.net 2016 Copyright. All Rights Reserved.

The Sponsored Listings displayed above are served automatically by a third party. Neither the service provider nor the domain owner maintain any relationship with the advertisers. In case of trademark issues please contact the domain owner directly (contact information can be found in whois).

Privacy Policy

Flagged here: https://urlquery.net/report.php?id=1456340025419
htxp://pimpam.ru/ is in Dr.Web malicious sites list!

Flagged as with malscript is -http://asset.easydmp.net/

Cloaking: There is a difference of 44 bytes between the version of the page you serve to Chrome and the version you serve to GoogleBot. This probably means some code is running on your site that’s trying to hide from browsers but make Google think there’s something else on the page.



		id:'f03e62333576be815a18373cad3e1e6d',
		id:'7d4141b7f471e0bccbfc61519f57b268',
	browser:'Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_3) AppleWebKit/537.31 (KHTML, like Gecko) Chrome/26.0.1410.65 Safari/537.31'
	browser:'Mozilla/5.0 (compatible; Googlebot/2.1; +-http://www.google.com/bot.html)'
"><font color="white">???????????? ???? ?????????????????????? ??????????</font> <img src="images/seodoktor.jpg" alt="???????????? ???? ?????????????????????? ??????????" title="???????????? ???? ?????????????????????? ??????????" border="0"></a></td>
"><font color="white">?????????????????????? ?????????????????? ??????????</font> <img src="images/seodoktor.jpg" alt="?????????????????????? ?????????????????? ??????????" title="?????????????????????? ?????????????????? ??????????" border="0"></a></td> 

System Details:
Running on: nginx/1.2.1
Powered by: PHP/5.4.6-1ubuntu1.8

Web application details:
Google Analytics installed: UA-12835423-1
Outdated Web Server Nginx Found: nginx/1.2.1
Also -http://wapcpa.ru/?type=js&key=e2b5fe88776a4ea with outdated software: HTTP Server: nginx 1.4.6 (Outdated)
PHP Version: 5.4.20 (Outdated)

Malware by link to -http://recreativ.ru/rcode.1af096caf8.js should be removed: https://yandex.com/infected?l10n=en&url=-http://pimpam.ru/

Suspicious = /dvd/mystic Quttera flags this file.
Severity: Suspicious
Reason: Detected encoded JavaScript code commonly used to hide suspicious behaviour.
Details: Detected encoded JavaScript code used to hide suspicious activity
See code attached as harmless image.

polonus

Remarkable is this external link on the above website that has been parked:
-htxp://yandexapi.net/partner_js.php?site=2&id=236&rev=0

Checking: -http://d32ffatx74qnju.cloudfront.net/scripts/js3caf.js
File size: 6469 bytes
File MD5: 8a0601118d2199b57eab96280b6b4db5

-http://d32ffatx74qnju.cloudfront.net/scripts/js3caf.js - Ok
Blocked by adblockers as Ad & Ad-tracking.

Checking: -http://www.google.com/adsense/domains/caf.js
File size: 259.92 KB
File MD5: 184b8481807bbe314ed589e731d8b6e8

-http://www.google.com/adsense/domains/caf.js - Ok

Checking: -http://www.parkingcrew.net/scripts/sale_form.js
File size: 201 bytes
File MD5: ebd55030d452c3f4be009f42c972f831

-http://www.parkingcrew.net/scripts/sale_form.js - archive JS-HTML

-http://www.parkingcrew.net/scripts/sale_form.js/JSFile_1[0][c9] - Ok
-http://www.parkingcrew.net/scripts/sale_form.js - Ok

Checking: -http://yandexapi.net/partner_js.php?site=2&id=236&rev=0
Engine version: 7.0.17.11230
Total virus-finding records: 6888789
File size: 8153 bytes
File MD5: 162965c8d198a6a0e3d7cb64a1300559

-http://yandexapi.net/partner_js.php?site=2&id=236&rev=0 - archive JS-HTML

-http://yandexapi.net/partner_js.php?site=2&id=236&rev=0/JSTAG_1[692][192] - Ok
-http://yandexapi.net/partner_js.php?site=2&id=236&rev=0/JSTAG_2[9f9][33b] - Ok
-http://yandexapi.net/partner_js.php?site=2&id=236&rev=0/JSTAG_3[d84][459] - Ok
-http://yandexapi.net/partner_js.php?site=2&id=236&rev=0/JSTAG_4[121c][28a] - Ok
-http://yandexapi.net/partner_js.php?site=2&id=236&rev=0/JSTAG_5[14e4][f2] - Ok
-http://yandexapi.net/partner_js.php?site=2&id=236&rev=0/JSTAG_6[15e7][ab] - Ok
-http://yandexapi.net/partner_js.php?site=2&id=236&rev=0/JSTAG_7[174d][3a2] - Ok
-http://yandexapi.net/partner_js.php?site=2&id=236&rev=0/JSTAG_8[1b92][152] - Ok
-http://yandexapi.net/partner_js.php?site=2&id=236&rev=0/JSTAG_9[1d22][67] - Ok
-http://yandexapi.net/partner_js.php?site=2&id=236&rev=0/JSTAG_10[1dc7][187] - Ok
-http://yandexapi.net/partner_js.php?site=2&id=236&rev=0 - Ok

and we will see how it still is generating clicks for yandex, google and parking dot crew…

polonus