Scanned pages/files
Request | Server response | Status |
http://mydreamtoreality.com/ | 200 OK Content-Length: 1368 Content-Type: text/html | suspicious |
Hidden iFrame found. size: 0x0 src: http://diklatregbukittinggi.kemendagri.go.id/keeno%20~%20at%20dusk%20~%20lying.mp3?autostart=true&show_artist=true <iframe width="0" scrolling="no" height="0" frameborder="no" src="http://diklatregbukittinggi.kemendagri.go.id/keeno%20~%20at%20dusk%20~%20lying.mp3?autostart=true&show_artist=true"> Deface/Content modification. The following signature was found: Hacked By Yusa <html>
<center> <title>HELLO WORLD</title> <link href='http://fonts.googleapis.com/css?family=Ubuntu+Mono:400,700' rel='stylesheet' type='text/css'> <base target='_blank'/> <body onLoad="writetext()" style="background:#ffffff;"> <div style="height:230px;"></div> <font size="10" style="color:#FF0000;font-family:Algerian;">Hacked By Yusa</font><br><br><font face="Ubuntu Mono" size="6" color="#FF0000"></font><font face="Algerian" size="6" color="black"> Indonesian Defacer Rulez </font><br><br> <font face="Algerian" size="3" color="Black">Security so low.. please fix it!</font><br><br> <font face="Algerian" size="5" color="red"> GREETING FOR : Pak Haxor - sn00.py - Rec0ded ...[851 bytes skipped]... | ||
http://blogskins.ir/tools/java/no-rightclick.js | 200 OK Content-Length: 443 Content-Type: application/javascript | clean |
http://blogskins.ir/tools/java/no-select.js | 200 OK Content-Length: 232 Content-Type: application/javascript | clean |
http://mydreamtoreality.com/test404page.js | 404 Not Found Content-Length: 575 Content-Type: text/html | clean |
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: mydreamtoreality.com
Result:
HTTP/1.1 200 OK
Connection: close
Date: Tue, 08 Sep 2015 21:19:19 GMT
Accept-Ranges: bytes
ETag: "b1355b-558-51ea6074caa74"
Server: Apache/2.2.29 (Unix) FrontPage/5.0.2.2635
Content-Length: 1368
Content-Type: text/html
Last-Modified: Tue, 01 Sep 2015 02:08:39 GMT
...1368 bytes of data.
GET / HTTP/1.1
Host: mydreamtoreality.com
Result:
HTTP/1.1 200 OK
Connection: close
Date: Tue, 08 Sep 2015 21:19:19 GMT
Accept-Ranges: bytes
ETag: "b1355b-558-51ea6074caa74"
Server: Apache/2.2.29 (Unix) FrontPage/5.0.2.2635
Content-Length: 1368
Content-Type: text/html
Last-Modified: Tue, 01 Sep 2015 02:08:39 GMT
...1368 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: mydreamtoreality.com
Referer: http://www.google.com/search?q=mydreamtoreality.com
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: mydreamtoreality.com
Referer: http://www.google.com/search?q=mydreamtoreality.com
Result:
The result is similar to the first query. There are no suspicious redirects found.
Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=mydreamtoreality.com
Result: This site is not currently listed as suspicious.
Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://mydreamtoreality.com/
Result: mydreamtoreality.com is not infected or malware details are not published yet.
Result: mydreamtoreality.com is not infected or malware details are not published yet.