Attacked url: http://mvsys.se/
Attack type: SERP-hijacking (see http://ikyon.com/attack-types/ for description)
Attack detected Mon, 03 Jun 2013 07:12:34 +0000

Visitors with referer are redirected to http://iris-freiburg.de/clik.php

HTTP traffic without referer:
HTTP headers sent:
HEAD / HTTP/1.1
Host: mvsys.se
Connection: Close

HTTP headers recieved:
HTTP/1.1 302 Found
Date: Mon, 03 Jun 2013 07:09:11 GMT
Server: Apache/2.2.22 (FreeBSD) PHP/5.4.6 mod_ssl/2.2.22 OpenSSL/0.9.8q
X-Powered-By: PHP/5.4.6
Set-Cookie: PHPSESSID=2fcd391d2b5618588cefb098a3a89d9e; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Location: http://mvsys.se/login
Connection: close
Content-Type: text/html


HTTP traffic with referer:
HTTP headers sent:
HEAD / HTTP/1.1
Host: mvsys.se
Referer: http://www.google.com/search?q=mvsys.se
Connection: Close

HTTP headers recieved:
HTTP/1.1 301 Moved Permanently
Date: Mon, 03 Jun 2013 07:09:11 GMT
Server: Apache/2.2.22 (FreeBSD) PHP/5.4.6 mod_ssl/2.2.22 OpenSSL/0.9.8q
Location: http://iris-freiburg.de/clik.php
Connection: close
Content-Type: text/html; charset=iso-8859-1

mvsys.se is on 194.9.94.194
ASN for 194.9.94.194: 39570
Abusix contact information: abuse@loopia.se (information only)
194.9.94.194 corresponds with s407.loopia.se
Abuse.net has 1 reliable address(es) for loopia.se
Found address(es): abuse@loopia.se