... Which basically tries to pull another JavaScript from another compromised server - this one being at massartsandcrafts. It does this by making an iframe on our site which is positioned well off the visible screen.
The reason safari didn't pick it up as a malicious page is because that particular script doesn't exist on the compromised server. Presumably the owners have found out about it and got rid of it. So the script here ends up doing nothing. I guess the other checkers notice the suspicious behaviour and are responding accordingly.
Btw we installed the new ad server this afternoon. Maybe the change of name to "revive adserver" will help :-)
Last edited by: car4play on Fri 27 Jun 14 at 23:34
|