Forum Moderators: DixonJones
It had a JavaScript include, and that file had something like this:
exgo='h' + 't' + 't' + 'p://' + 'example' + '.com/in.p' + 'hp?id=2&ul=1&ref_s='+encodeURIComponent(document.referrer)+'&ref_d='+encodeURIComponent(document.URL);
document.write('<a href="'+exgo+'" id="xyz" target="_self" style=display:none>click here</a>');window.open("", "_self");
document.getElementById("xyz").click(); It LOOKS like harmless tracking code, but the deliberate URL obfuscation tells me it's naughty.
It wasn't "example.com". It was a .name domain.
Anyone have any explanation?
The page full of gibberish is a "Google magnet." It pushes the page high (it was one of the first hits in a search -I can't remember what for). The absence of valid URIs in the page means that Google won't think it's a link farm page, and won't be able to match the URI against a blacklist.
The JS is supposed to force a redirect to their naughty page, when you click on the link that shows up in Google.