Home Testimonials Company Support 1–888–873–0817
PRICING SUPPORT LOGIN
Home Notes Malware Signatures About

Malware injection - /jtoolsmini.js

We have been tracking for a while the sidename.js and cssminibar family of malware, and lately it has changed (mutated) again to use the jtoolsmini.js file instead (still attempting to compromised browsers in the same way with the blackhole exploit).
 
This is how the malware looks in a hacked site:
 

Which does the same thing as always and loads the following malicious code into the sites:
 

If you are seeing it on your own web site, it means it is hacked and you need to fix it asap to protect your users. This type of malware infects any type of web site (osCommerce, WordPress, Joomla and many others). But lately (specially the jtoolsmini.js), seems to be happening via stolen FTP credentials.
 
Sucuri identifies those type of web-based malware as: http://sucuri.net/malware/malware-entry-mwiframehd203 (since we detect the malicious iframe being generated).
 
Our support team can clean it up for you if you are infected. Sign up with us here: http://sucuri.net/signup and we will get it sorted out pretty quickly.
 
If you have any question, let us know (support@sucuri.net).
 
Update: We are also seeing the iframe injection being done with the following types of script:

For all our web-based malware signatures, go here: http://labs.sucuri.net/?malwaredb