Scanned pages/files
Request | Server response | Status |
http://mysweetstory.com/ | 200 OK Content-Length: 7231 Content-Type: text/html | suspicious |
Deface/Content modification. The following signature was found: Hacked By Hamzah Uygun ...[148 bytes skipped]... ar scrl = " Free Palestine ";function scrlsts() { scrl = scrl.substring(1, scrl.length) + scrl.substring(0, 1); document.title = scrl; setTimeout("scrlsts()", 300); }// End --></script></head><body bgColor="BLACK" onload="teclear();"oncontextmenu='return false;' onkeydown='return false;' onmousedown='return false;'> <head> </script> <head> <title>Hacked By Hamzah Uygun</title> <meta name="keywords" content="Hacked BY Hamzah Uygun"> <meta content='Hacked BY Hamzah Uygun' name='subject'/> <meta content='Hacked BY Hamzah Uygun' name='Abstract'/> <meta content='Hacked BY Hamzah Uygun' name='description'/> <SCRIPT LANGUAGE="JavaScript"><!-- Beginvar scrl = " Free Palestine ";function scrlsts() { scrl = scrl.substring(1, scrl.length) + scrl.substring(0, 1); document.title = ...[7050 bytes skipped]... | ||
https://ajax.googleapis.com/ajax/libs/jquery/1.6.1/jquery.min.js | 200 OK Content-Length: 91342 Content-Type: text/javascript | clean |
http://mysweetstory.com/test404page.js | 200 OK Content-Length: 7231 Content-Type: text/html | clean |
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: mysweetstory.com
Result:
HTTP/1.1 200 OK
Connection: close
Date: Sat, 21 Mar 2015 02:47:11 GMT
Server: Apache/2.2.23 (Unix) mod_ssl/2.2.23 OpenSSL/1.0.0-fips DAV/2 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 mod_perl/2.0.6 Perl/v5.8.8
Vary: Accept-Encoding,User-Agent
Content-Type: text/html
X-Powered-By: PHP/5.4.10
GET / HTTP/1.1
Host: mysweetstory.com
Result:
HTTP/1.1 200 OK
Connection: close
Date: Sat, 21 Mar 2015 02:47:11 GMT
Server: Apache/2.2.23 (Unix) mod_ssl/2.2.23 OpenSSL/1.0.0-fips DAV/2 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 mod_perl/2.0.6 Perl/v5.8.8
Vary: Accept-Encoding,User-Agent
Content-Type: text/html
X-Powered-By: PHP/5.4.10
Second query (visit from search engine):
GET / HTTP/1.1
Host: mysweetstory.com
Referer: http://www.google.com/search?q=mysweetstory.com
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: mysweetstory.com
Referer: http://www.google.com/search?q=mysweetstory.com
Result:
The result is similar to the first query. There are no suspicious redirects found.
Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=mysweetstory.com
Result: This site is not currently listed as suspicious.
Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://mysweetstory.com/
Result: mysweetstory.com is not infected or malware details are not published yet.
Result: mysweetstory.com is not infected or malware details are not published yet.