Scanned pages/files
Request | Server response | Status |
http://creditcardsbenefits.net/ | 500 timeout Content-Length: 30 Content-Type: text/plain | clean |
http://creditcardsbenefits.net/test404page.js | HTTP/1.1 301 Moved Permanently Cache-Control: no-cache, must-revalidate, max-age=0 Connection: close Date: Wed, 03 Sep 2014 07:56:26 GMT Pragma: no-cache Location: http://www.creditcardsbenefits.net/test404page.js Server: LiteSpeed Content-Encoding: none Content-Length: 0 Content-Type: text/html; charset=UTF-8 Expires: Wed, 11 Jan 1984 05:00:00 GMT Last-Modified: Wed, 03 Sep 2014 07:56:26 GMT X-Pingback: http://www.creditcardsbenefits.net/xmlrpc.php | clean |
http://www.creditcardsbenefits.net/test404page.js | 404 Not Found Content-Length: 28225 Content-Type: text/html | suspicious |
Malicious code - confirmed by antiviruses (see below) window.scrollBy(0, 1) window.resizeTo(0,0) window.moveTo(0,0) setTimeout("move()", 1); var mxm=100 var mym=50 var mx=0 var my=0 var sv=50 var status=1 var szx=0 var szy=0 var c=255 var n=0 var sm=30 var cycle=2 var done=2 function move() { if (status == 1) document.fgColor=(255-c)*65536 if (c > 128) {status=8} } if (status == 8) { window.moveTo(0,0) sx=screen.availWidth sy=screen.availHeight window.resizeTo(sx,sy) status=9 } var timer=setTimeout("move()",0.3) } Antivirus reports:
Deface/Content modification. The following signature was found: Hacked By BByHackTM <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><title>Hacked By BByHackTM</title> <marquee class="kyazi" onmouseover="this.stop()" onmouseout="this.start()">Hacked By BByHackTM</marquee> <meta content="MSHTML 6.00.2900.2180" name="GENERATOR"></head> <body text="16777215" bgcolor="#000000" onload="writetext()" oncontextmenu="return false" onselectstart="return false" ondragstart="return false"> <script> ...[34927 bytes skipped]... | ||
http://www.creditcardsbenefits.net/ | 200 OK Content-Length: 28225 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) window.scrollBy(0, 1) window.resizeTo(0,0) window.moveTo(0,0) setTimeout("move()", 1); var mxm=100 var mym=50 var mx=0 var my=0 var sv=50 var status=1 var szx=0 var szy=0 var c=255 var n=0 var sm=30 var cycle=2 var done=2 function move() { if (status == 1) document.fgColor=(255-c)*65536 if (c > 128) {status=8} } if (status == 8) { window.moveTo(0,0) sx=screen.availWidth sy=screen.availHeight window.resizeTo(sx,sy) status=9 } var timer=setTimeout("move()",0.3) } Antivirus reports:
|
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: creditcardsbenefits.net
Result:
HTTP/1.1 500 timeout
Content-Type: text/plain
GET / HTTP/1.1
Host: creditcardsbenefits.net
Result:
HTTP/1.1 500 timeout
Content-Type: text/plain
Second query (visit from search engine):
GET / HTTP/1.1
Host: creditcardsbenefits.net
Referer: http://www.google.com/search?q=creditcardsbenefits.net
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: creditcardsbenefits.net
Referer: http://www.google.com/search?q=creditcardsbenefits.net
Result:
The result is similar to the first query. There are no suspicious redirects found.
Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=creditcardsbenefits.net
Result: This site is not currently listed as suspicious.
Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://creditcardsbenefits.net/
Result: creditcardsbenefits.net is not infected or malware details are not published yet.
Result: creditcardsbenefits.net is not infected or malware details are not published yet.