hmmm

Hammett, any chance you can update Wordpress to latest (there’s a file 
permissions issue that stops it from happening automatically or throughout the 
admin UI)? Perhaps this will make the issue go away.

This aside, perhaps we should consider moving the website to github pages…


-- 
Krzysztof Kozmic

From: Tim Perry [email protected]
Reply: [email protected] 
[email protected]
Date: 4 July 2014 at 5:27:53 pm
To: [email protected] [email protected]
Subject:  Re: Note to Admin - Website Malware Issue  

I'm still seeing this issue today. Additionally, if you search for 'Castle 
Project' in Google, the first result looks like:

Castle Project | Castle Project – build your .NET projects on ...

www.castleproject.org/  
News. December 1, 2013. Last release of where can i purchase cialis Core had 
the unfortunate side-effect that one of the fixes included was susceptible to 
...

I think there's malicious scripts on the site itself, rewriting some of the 
content, and that's what AVG is blocking.

On Wednesday, 2 April 2014 21:35:35 UTC+1, Mauricio Scheffer wrote:
I don't think black-hat SEO is malware, at all. Their description ( 
http://www.avgthreatlabs.com/virus-and-malware-information/info/blackhat-seo/ ) 
seems incorrect.
Here's a better definition: http://www.webopedia.com/TERM/B/Black_Hat_SEO.html 
. Black-hat SEO is targeted at search engines, so it has little to no impact 
(and certainly not harmful) for users.

Also, if you check the comments you'll see that someone got one of these 
warnings from browsing bing.com. So it looks like a bug in AVG.

That said, the alert is probably triggered by a couple of script blocks that 
use document.write, which don't seem to be doing anything, so they might as 
well be removed.

Cheers




--
Mauricio


On Wed, Apr 2, 2014 at 12:51 PM, Stephen Wicklund <[email protected]> wrote:
While navigating to the main site, castleproject.org, I got an AVG popup saying 
it removed a "Blackhat SEO" exploit.

Here's the info page the popup linked me to: 
http://www.avgthreatlabs.com/website-safety-reports/domain/castleproject.org/linkreport/www.castleproject.org%252F/?utm_source=TDPU&utm_medium=OS

It seems someone has injected the malicious code by some means into your 
website, as the warning/malware-removed-popup shows up on each subpage as I 
navigate to it.
--
You received this message because you are subscribed to the Google Groups 
"Castle Project Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
Visit this group at http://groups.google.com/group/castle-project-users.
For more options, visit https://groups.google.com/d/optout.

--
You received this message because you are subscribed to the Google Groups 
"Castle Project Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
Visit this group at http://groups.google.com/group/castle-project-users.
For more options, visit https://groups.google.com/d/optout.

-- 
You received this message because you are subscribed to the Google Groups 
"Castle Project Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
Visit this group at http://groups.google.com/group/castle-project-users.
For more options, visit https://groups.google.com/d/optout.

Reply via email to