Avast WEBforum

Other => Viruses and worms => Topic started by: saepudin on June 21, 2022, 05:29:38 AM

Title: Please Remove My Site From URL:PHISHING
Post by: saepudin on June 21, 2022, 05:29:38 AM
Hi, our website is being blocked by Avast for URL:Phishing.  Here is our website.  https://portal.qwords.com/ & https://client.goldenfast.net  We are sure our website is clean and would like you to have it removed from your blacklist. 

We would like to give the Result Test here:
https://www.virustotal.com/gui/url/d4d000e44e6a6395623865909d763dac1f88f2706dfa8ee26bcead3613de6d75

We already submit report here:
https://www.avast.com/false-positive-file-form.php

As you may consider that the website is really important to many people who use it, please remove the false positive ASAP

Thank you for your time and consideration.
Title: Re: Please Remove My Site From URL:PHISHING
Post by: Asyn on June 21, 2022, 09:19:13 AM
You need to wait for the verdict from threat labs. You should get a reply within 48 hours.
Title: Re: Please Remove My Site From URL:PHISHING
Post by: polonus on June 22, 2022, 08:00:45 AM
Indeed, wait for a final verdict from avast team for Beranda - Goldenfast Networks, Indonesia Raja.

Check retirable code.

bootstrap   4.0.0   Found in -https://client.goldenfast.net/templates/seven/js/bootstrap.min.js _____Vulnerability info:
Medium   28236 XSS in data-template, data-content and data-title properties of tooltip/popover CVE-2019-8331   1
Medium   20184 XSS in data-target property of scrollspy CVE-2018-14041   1
Medium   20184 XSS in collapse data-parent attribute CVE-2018-14040   1
Medium   20184 XSS in data-container property of tooltip CVE-2018-14042   1

bootstrap   3.4.1   Found in -https://client.goldenfast.net/templates/seven/assets/js/scripts.min.js

Nothing in particular found, but just the run of the mill tracking here:
https://themarkup.org/blacklight?url=portal.qwords.com
nor here: https://themarkup.org/blacklight?url=client.goldenfast.net

Just check retirables with bootstrap. Best greetings from,

polonus (volunteer 3rd aprty cold recon website security analyst and website error-hunter)