Page 1 of 1
Yutopian Hosting Malware
Posted: Sun Dec 05, 2010 9:57 pm
by Andd
Hey recently my browser has directed me away from any site linked to yutopian enterprises because of malware being hosted on their site. Has anyone else seen this problem? I heard in the past that it was a small family company, so how would one go about letting them know their site might be compromised.
Re: Yutopian Hosting Malware
Posted: Mon Dec 06, 2010 6:01 am
by Mike Novack
Your browser won't let you get to the site even enough to see their contact address? (there are ways to do this safely or should be. Depends on what your browser can do in terms of its settings and whether you know how to set up a "user" on your computerr with minimal rights)
BTW -- how about telling us what browser and what settings? I'm not experiencing any serious problems with the site.
info@yutopian.com is the contact email address
Re: Yutopian Hosting Malware
Posted: Mon Dec 06, 2010 6:19 am
by Andd
http://www.google.com/safebrowsing/diagnostic?site=http://www.yutopian.com/go/&hl=enHere is the google diagnostics of the page.
I use google chrome and, while I'm not security illiterate I generally stay away from site that my computer outright tells me to avoid for lack of a better understanding of the risks.
Re: Yutopian Hosting Malware
Posted: Mon Dec 06, 2010 10:01 am
by RobertJasiek
Ignoring the warning in firefox, I could have a look in the source code of the webpage. It starts
#!/usr/bin/perl
and goes on with code. Not what one would expect from a serious, ordinary webpage. So it could indeed be the case that malware has attacked poor Yutopian. But I have not attempted to understand the source code. Maybe it was intentional? Anyway I suggest going back to good old plain HTML without any scripts.
Re: Yutopian Hosting Malware
Posted: Mon Dec 06, 2010 10:32 am
by kirkmc
RobertJasiek wrote:Ignoring the warning in firefox, I could have a look in the source code of the webpage. It starts
#!/usr/bin/perl
and goes on with code. Not what one would expect from a serious, ordinary webpage. So it could indeed be the case that malware has attacked poor Yutopian. But I have not attempted to understand the source code. Maybe it was intentional? Anyway I suggest going back to good old plain HTML without any scripts.
CGI scripts are usually in Perl...
Re: Yutopian allegedly hosting malware?
Posted: Mon Dec 06, 2010 5:46 pm
by PeterHB
http://www.virustotal.com/url-scan/repo ... 12916787153 out of 6 webscan sites see it as giving the impression of having malware.
Firefox, G-Data, Google suggest its a malware site,
Opera, ParetoLogic, Phishtank suggest its a clean site.
I guess there is a least something about the way the site is coded that looks suspicious to the automated testing tools.
Re: Yutopian Hosting Malware
Posted: Tue Dec 07, 2010 12:03 am
by lorill
No need to go so far, take a look at the html source : an 1x1px iframe was added on the bottom of the page, that loads the probable malware from another page.
In other words, yutopian was hacked discretely.
Re: Yutopian Hosting Malware
Posted: Thu Dec 09, 2010 7:44 pm
by Bantari
RobertJasiek wrote:Ignoring the warning in firefox, I could have a look in the source code of the webpage. It starts
#!/usr/bin/perl
and goes on with code. Not what one would expect from a serious, ordinary webpage. So it could indeed be the case that malware has attacked poor Yutopian. But I have not attempted to understand the source code. Maybe it was intentional? Anyway I suggest going back to good old plain HTML without any scripts.
Actually, going back slightly further, to paper mail and paper magazines, would be safer still.
Come to think of it, I never heard of cave drawings hosting malware neither.
Brb. Out to get a bucket of animal pigments.

Re: Yutopian Hosting Malware
Posted: Thu Dec 09, 2010 9:50 pm
by Bartleby
Bantari wrote:[Actually, going back slightly further, to paper mail and paper magazines, would be safer still.
Come to think of it, I never heard of cave drawings hosting malware neither.
Brb. Out to get a bucket of animal pigments.

No need to go so far:
http://www.fountainpennetwork.com/forum/
Re: Yutopian Hosting Malware
Posted: Fri Dec 10, 2010 2:47 am
by willemien
Norton safeweb gives the following info
Embedded Link To Malicious Site (what's this?)
Threats found: 1
Here is a complete list: (for more information about a specific threat, click on the Threat Name below)
Threat Name: Embedded link to malicious site guwtron.com
Location:
http://www.yutopian.com/
Re: Yutopian Hosting Malware
Posted: Fri Dec 10, 2010 4:32 am
by DrStraw
I have not bought from them for a long time and probably will not do so again, but in the past I have found them very easy to deal with. Perhaps someone should call them in person and direct them to this thread.
Re: Yutopian believe problem is fixed
Posted: Fri Dec 10, 2010 11:20 am
by PeterHB
I have had a reply from katherine & sidney at yutopian saying they believe this problem has been resolved.
http://www.virustotal.com/url-scan/repo ... 1292001821I see that all 6 testing sites give it a clean bill of health now, so its looking good.