Quote from another forum:
"This is probably an issue on Brian's end...
In a nutshell, someone used an exploit or vulnerability to get server level access to this site. Probably some dateless, pimplefaced, snotnosed, hot pocket snarfing, script kiddie living in their mom's basement as this is amateur hour stuff. Sometimes low rent no talent "hackers" hack sites and get paid by crooks for driving traffic to their illicit urls.
I can only guess since I do not have access to cpanel, but it sounds like someone has hijacked and redirected this site's traffic to url2short.info. It's a fake "tinyurl" type site that plants a redirect trojan on vulnerable machines. If your anti virus is up to date you should be ok. I just tested Avast and it does recognize the exploit.
This has been done before to other vBulletin (I am guessing that this is what Brian is using) forums. Here is how to determine if this is the case and correct it (note: some of this is from memory):
1 Go into cPanel and under Remote MySQL you should either see either no hosts configured or, if you have a specific database of your own enabled, the name of that
database(s). Now this is the important part; if you see a "%" character, DELETE IT. That character is a wildcard that allows any server to connect.
2. Make sure you change your passwords in cPanel and MySQL.
3. Pick any add-on, disable it, then re-enable it to clear the datastore.
4. Found this tidbit which should make fixing things up easier. Download the tool_reparse.php from this thread: http://www.vbulletin...ad.php?t=220967 . It
will rebuild your templates if they are corrupted. Read through the thread first so you understand what's going on and what the tool does.
That should do it. If you ask me how I know all this, let's just say that if you have ever seen me shoot, you know I sure don't do THAT for a living...
One last thing. I did a little checking and it does not appear to be a dns exploit, so that's good. It seems odd that that url is not on my blacklist yet my software just ignored the redirect without even throwing up a warning, which is a little odd. I would not have known about this if I hadn't seen this thread. I will have to look into that.
HTH
Updated with more explanation..."