Attacked url: http://vmfordon.se/service/
Attack type: SERP-hijacking (see http://ikyon.com/attack-types/ for description)
Attack detected Tue, 13 Jan 2015 07:31:46 +0100

Visitors with referer are redirected to http://www.basketball-clothes.com/

HTTP traffic without referer:
HTTP headers sent:
HEAD / HTTP/1.1
Host: vmfordon.se
Connection: Close

HTTP headers recieved:
HTTP/1.1 200 OK
Server: nginx/1.0.14
Date: Tue, 13 Jan 2015 06:31:46 GMT
Content-Type: text/html; charset=UTF-8
Connection: close
Vary: X-Forwarded-For
X-Powered-By: PHP/5.3.10
Set-Cookie: USERID=twotime; path=/
X-Pingback: http://vmfordon.se/xmlrpc.php
Accept-Ranges: bytes
X-Varnish: 1507771377
Age: 0
Via: 1.1 varnish
X-Loopia-Cache: MISS


HTTP traffic with referer:
HTTP headers sent:
HEAD / HTTP/1.1
Host: vmfordon.se
Referer: http://www.google.com/search?q=vmfordon.se
Connection: Close

HTTP headers recieved:
HTTP/1.1 200 OK
Server: nginx/1.0.14
Date: Tue, 13 Jan 2015 06:31:46 GMT
Content-Type: text/html; charset=UTF-8
Connection: close
Vary: X-Forwarded-For
X-Powered-By: PHP/5.3.10
Set-Cookie: USERID=shine-check; path=/
Location: http://www.basketball-clothes.com/
X-Pingback: http://vmfordon.se/xmlrpc.php
Content-Length: 14406
Accept-Ranges: bytes
X-Varnish: 1507771374
Age: 0
Via: 1.1 varnish
X-Loopia-Cache: MISS

vmfordon.se is on 194.9.94.213
ASN for 194.9.94.213: 39570
Abusix contact information: abuse@loopia.se (information only)
194.9.94.213 corresponds with s368.loopia.se
Abuse.net has 1 reliable address(es) for loopia.se
Found address(es): abuse@loopia.se