Attacked url: http://khal.se/
Attack type: SERP-hijacking (see http://ikyon.com/attack-types/ for description)
Attack detected Wed, 21 Jun 2017 12:49:20 +0200

Visitors with referer are redirected to http://vados.biz/cialisse?keyword=&pill=

HTTP traffic without referer:
HTTP headers sent:
HEAD / HTTP/1.1
Host: khal.se
Connection: Close

HTTP headers recieved:
HTTP/1.1 200 OK
Server: nginx/1.10.3
Date: Wed, 21 Jun 2017 10:49:20 GMT
Content-Type: text/html; charset=utf-8
Connection: close
Vary: X-Forwarded-For
X-Powered-By: PHP/5.6.30
Set-Cookie: c025e142ae5dd797a899add9154e4949=918l5gefh5p468j32ang3llbo5; path=/; HttpOnly
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Wed, 21 Jun 2017 10:49:20 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache


HTTP traffic with referer:
HTTP headers sent:
HEAD / HTTP/1.1
Host: khal.se
Referer: http://www.google.com/search?q=khal.se
Connection: Close

HTTP headers recieved:
HTTP/1.1 302 Found
Server: nginx/1.10.3
Date: Wed, 21 Jun 2017 10:49:19 GMT
Content-Type: text/html; charset=UTF-8
Connection: close
Vary: X-Forwarded-For
X-Powered-By: PHP/5.6.30
Location: http://vados.biz/cialisse?keyword=&pill=

khal.se is on 194.9.94.137
ASN for 194.9.94.137: 39570
Abusix contact information: abuse@loopia.se (information only)
194.9.94.137 corresponds with s529.loopia.se
Abuse.net has 1 reliable address(es) for loopia.se
Found address(es): abuse@loopia.se