Visitors of the restaurantsite iens.nl got Wednesday to do with malware code on the homepage and a trojan tried to install it. Also with the help of GoT-users is the malware removed from the site.
On GoT went into the Wednesday afternoon of the first postings where it was reported that virus scanners alarm pitched at a visit to iens.nl. In an iframe on the home page was a pdf document to call which would use of Acrobat Reader. After different GoT-visitors mention was made of the malware and also more details about the attack had been posted, was, among others, the hosting provider of iens.nl the battle to limit the damage.
In the course of the evening is the code that made it possible for the malware to call iens.nl removed. According to Roel van der kraan of iens.nl knew a still unknown attacker in an empty folder of a file to upload. The administrators have a suspect ip-address from Russia can trace in the server logs, though this is anything but conclusive.
Van der kraan claims that there are no cases reported of those who actually become infected. He states, however, that iens.nl busy is the security of the site to tighten.