Scanned pages/files
Request | Server response | Status |
http://transflor.com.br/ | 200 OK Content-Length: 8373 Content-Type: text/html | suspicious |
Deface/Content modification. The following signature was found: HACKED BY ...[6011 bytes skipped]... sets/js/scripts.js"></script> <body oncontextmenu='return false;' onkeydown='return false;' onmousedown='return false;'> <footer id="ftr" style="position:fixed; left:0px; right:0px; bottom:0px; background:transparent); text-align:center;"> <font color="#58FAF4" size="1" face="Courier New"> <font color="#FF6600" face="Courier New" size="3"><font color="#008000"><b>HACKED BY <a href="http://www.zone-h.org/archive/notifier=4Z15" target="_blank">Carswell</a>, I'M WAS SHADOWS </b></font> <marquee scrollamount="5" scrolldelay="50" width="100%"> <b>Jock =|= Chernobyl =|= Ade Root =|= SynX =|= Kaheni =|= Jhon Carswell =|= Everyone Brazil | Rajaoui PS CEO and FOUNDER | </b> </marquee> </font><br>Copyright © 2015 | Ciencia Hacker | Lordesc| <a href="https://www.faceboo ...[2955 bytes skipped]... | ||
http://www.vip-s3c.com/Grativy/assets/js/jquery-1.11.1.min.js | 200 OK Content-Length: 95785 Content-Type: application/x-javascript | clean |
http://www.vip-s3c.com/Grativy/assets/js/bootstrap.min.js | 200 OK Content-Length: 31819 Content-Type: application/x-javascript | clean |
http://www.vip-s3c.com/Grativy/assets/js/jquery.cycle.min.js | 200 OK Content-Length: 24132 Content-Type: application/x-javascript | clean |
http://www.vip-s3c.com/Grativy/assets/js/jquery.backstretch.min.js | 200 OK Content-Length: 4234 Content-Type: application/x-javascript | clean |
http://www.vip-s3c.com/Grativy/assets/js/scripts.js | 200 OK Content-Length: 16814 Content-Type: application/x-javascript | clean |
http://transflor.com.br/test404page.js | 404 Not Found Content-Length: 464 Content-Type: text/html | clean |
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: transflor.com.br
Result:
HTTP/1.1 200 OK
Connection: close
Date: Thu, 29 Jan 2015 14:37:23 GMT
Server: Apache/2.2.29 (Unix) mod_ssl/2.2.29 OpenSSL/1.0.1e-fips mod_bwlimited/1.4
Content-Length: 8373
Content-Type: text/html
X-Powered-By: PHP/5.4.33
...8373 bytes of data.
GET / HTTP/1.1
Host: transflor.com.br
Result:
HTTP/1.1 200 OK
Connection: close
Date: Thu, 29 Jan 2015 14:37:23 GMT
Server: Apache/2.2.29 (Unix) mod_ssl/2.2.29 OpenSSL/1.0.1e-fips mod_bwlimited/1.4
Content-Length: 8373
Content-Type: text/html
X-Powered-By: PHP/5.4.33
...8373 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: transflor.com.br
Referer: http://www.google.com/search?q=transflor.com.br
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: transflor.com.br
Referer: http://www.google.com/search?q=transflor.com.br
Result:
The result is similar to the first query. There are no suspicious redirects found.
Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=transflor.com.br
Result: This site is not currently listed as suspicious.
Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://transflor.com.br/
Result: transflor.com.br is not infected or malware details are not published yet.
Result: transflor.com.br is not infected or malware details are not published yet.