In addition:
If you look at your source code you see:
Code: Select all
<div class="plugin_comment_wrap"><div class="plugin_comment_subject"><p>fotos de hombres peludos en tangas</p>===skipped===</div>
<div class="plugin_comment_date">Sat, 01.01.2011 23:34</div>
<div class="plugin_comment_body"><p>hombres follando a las mujeres dormidas</p>===skipped===<p>hombres viejos desnudos</p>Ha...Now you know why I didn't
post any [...]</div>
which means this is some sort of comment spam on the one hand
Since you only allow comments to registered users, you should check which user did this to you.
This points to a totally new direction.
- The registration of users is potentionally vulnerable and open
or
- some of your registered users got highjacked and their login is open to the hacker.
Thats is why there are also entries with spam in the keywords and the description meta tag, which should got infected by editing entries via the metadesc plugin.
I think now you know what to do.
Good luck.
Ian
Edit:
I never really understood that
http://angelicreikiamerica.com isn't yours and it just takes your content.
If this isn't some sort of
dns highjacking, it
must be inside your htaccess or you web servers config pointing your site to the mentioned one.