Well, I visited the "dangerous" page and whatever iWeb site was there before is long gone - someone has removed it and installed their own minimal bit of HTML with a "coming soon" and a countdown timer script (which isn't working) and a Wordpress logo, though WP itself is not installed. The details in the dangerous site warning say that the site was used for phishing - so the home page is not the page that has the phish installed.
So - first off, you need to get access to Cpanel again, change the password for Cpanel and then you do indeed need to wipe the site out. COMPLETELY. No telling where they've buried the bodies - but there could be scripts and redirects and all sorts of nasty stuff on there. Spamhaus thinks there is a bot/malware that is associated with ransomware. Bad stuff.
You don't, btw, need an actual website to have working domain email. You need to have email hosting somewhere, attached to the domain - but you (your wife) may want to investigate other options besides MacHighway for that. You will, however, have to deal with the blacklisting if you want to keep those email addresses.
The site is on Spamhaus' blacklist and as that's one used by many, many ISPs, it's pretty obvious why email just isn't going.
https://mxtoolbox.com/SuperTool.aspx?action=blacklist%3aelliff-legal-med.com&run=toolpageHere's the info from Spamhaus (go directly to their site and put in the IP address if you want to see it directly. IP address is below)
199.204.248.169 has 1 listing
Robot speaking
Please don’t be alarmed! We understand finding your IP address, domain, URL or ASN on a blocklist can be worrying. This website will give you information about why you are listed and what you can do to ensure you don’t get listed again.
Where it is possible to request removal, we will help you through the process. However, if your IP is listed on the Spamhaus Blocklist (SBL), removal can only be requested by your Internet Service Provider (ISP).
eXploits Blocklist (XBL) - Why was this IP address listed?
The machine using this IP is infected with malware that is emitting spam or is sharing a connection with an infected device.
As a result, this IP address is listed in the eXploits Blocklist (XBL)
Click on Show Details to see if you can request a delisting from this blocklist. This will also display any further information we have relating to this listing.
Hide details
Why was this IP listed?
A machine using 199.204.248.169 is infected with malware associated with the avalanche/andromeda family.
199.204.248.169 initiated contact with a nymaim command and control server, using contents unique to nymaim C&C command protocols.
Technical details of the nymaim detection
199.204.248.169 initiated a tcp connection from 199.204.248.169 using source port 48164, to the sinkhole IP address 216.218.185.162 on destination port 80.
The most recent detection was on: April 19 2024, 17:40:35 UTC.
Information about the nymaim botnet
The Andromeda/Avalanche botnet was associated with 80 different malware families: Andromeda, Win3/Dofoil, Gamarue, Smoke Loader, W32/Zurgop.BK!tr.dldr, and many others. The Avalanche network also provided the Command & Control communications for these other botnets: TeslaCrypt, Nymaim, Corebot, GetTiny, Matsnu, Rovnix, Urlzone, QakBot, etc. This botnet was taken down in 2016 but malware associated with it remains active.
Additional information on nymaim can be found on Wikipedia.
What should be done about it?
If this is a shared server, please call your hosting company or ISP!
This listing is the result of what we believe to be a security issue. Your machine is still infected, and it is probable that there is more than one type of malware present. To stop ongoing listings and to secure your network, websites, devices and data we recommend both prevention and remediation of the issue.
Prevention
Spamhaus has an FAQ about general security best practices that should be followed.
Remediation
If this is a server, please set up logging to find the source of the problem. Check for compromised websites and follow the directions on our FAQ
If you have a Windows machine; To find and remove the malware please see the Microsoft website and run Microsoft Defender to catch any other related malware that may be present.
Removal from XBL
XBL listings expire automatically some time after the last detection. If necessary, once the security issue is solved, you can request removal.
********************
At this point, if your wife doesn't need the website, the email addresses can be easily changed to something else (I'd suggest a Gmail addy) - yes, there will be some time spent going to the various websites using the domain email address and changing them to something else. Can she GET her email ok?? (Some sites
might send confirmation emails to the old email - though most will send it to the new one.)
I HOPE she's using a password manager that will list all these sites and their login details...that will make things 100% easier. Can't recommend the app 1Password enough if you don't have anything in place atm.
I am a little confused by "She has 3 emails and cannot send from any of them. brenda@elliff-legal-med.com, "server setting cp02 machighway.com", yahoo, icloud."
There is no reason that yahoo or iCloud email addresses should be affected by this. (is she using a Mac?)
If you do want to keep the domain & associated emails, and you want some help with this, get a new Cpanel PW, PM the login to me, and I'll have a look for you. MacHighway should also be able to clean this up - and then deal with the blacklisting by Spamhaus (the request to un-blacklist HAS to come from the host - not you) but this may take some time to take effect. I'd also tell them to move the domain to another IP - they likely have multiple servers with multiple domains. However it shouldn't be moved until it's cleaned up. And then just throw a page up there with the domain name on it or something - plain old HTML - just to be able to check the status of the danger warning etc.
You will have to request that Google review the site once it's cleaned up in order for the deceptive website warning to be removed. See:
https://kinsta.com/blog/deceptive-site-ahead/