Avast WEBforum

Consumer Products => Avast Free Antivirus / Premium Security (legacy Pro Antivirus, Internet Security, Premier) => Topic started by: Anacunga on May 10, 2012, 02:42:14 PM

Title: Network Shield: WHY not configurable to "ASK"-mode???
Post by: Anacunga on May 10, 2012, 02:42:14 PM
Had to visit a website that is blocked by Network-Shield.

The only way is to totally disable Network-Shield - there is no ASK-mode provided ...

WHY???
Title: Re: Network Shield: WHY not configurable to "ASK"-mode???
Post by: DavidR on May 10, 2012, 03:09:21 PM
Well because the Network Shield has no user defined settings and it is blocking what it considers a malicious site.

You would be surprised by the number of people reporting false positive alerts on web sites in the virus and worms forum, only to find after investigation that it isn't an FP.

Avast has always followed a policy not to make it too easy, e.g. one click to exclude a file/site, etc. in a detection as the resultant damage to a users system either through accidental clicking or insufficient information to make a decision if it is clean or not.

So it has to be a deliberate act by a user to exclude or in this case disable to override the alert.

What you should be doing is reporting the detection as a possible FP (network shield) in the viruses and worms forum and it can be investigated. If found to be an FP then it can be modified in the viruses definitions, this usually happens quickly and benefits all avast users and not just one.

You can also use the on-line contact form, to ask for a review (network shield) in the site - http://www.avast.com/contact-form.php?loadStyles (http://www.avast.com/contact-form.php?loadStyles) for:  * Sales inquiries; Technical issues; Website issues; Report false virus alert in file; Report false virus alert on website; Undetected Malware; Press (Media), issues.
Title: Re: Network Shield: WHY not configurable to "ASK"-mode???
Post by: polonus on May 10, 2012, 03:11:56 PM
Hi Anacunga,

I was putting this down while reading a similar sort of response from DavidR, still I will post it here to give some additional information towards the same end.
Because the alerts of the Network Shield are very accurate and will block you from getting infected by malware. You cannot make that configurable with an ASK mode! What if I ask you, "Do you like to get infected with malcode", and you would answer: "Yes, I like to disable this, because I rather like to visit a possible malcious site?". I think the answer to that question is clear and obvious. Always have the Web and Network Shields up and running in the everchanging malware landscape of the Internet. A site may be clean one minute and a few minutes later may have been hacked and injected automattically with malicious code to infest the visitors thereof. If a Network Shield block really puzzles you, you can give an image of the Network Sield alert message and the URL that was blocked in non-click-through form like hztp or wXw on the virus and worms section to be checked. If then it would appear the site has been cleansed or an IP block could be lifted you should file a false positive report to avast, because they finally will decide what is alerted and what is not. Bringing an ASK"-mode to Network Shield would be as unwise as the reasoning of some gamers to disable av solutions and firewalls  because it "slows down" their gaming comps,

polonus
Title: Re: Network Shield: WHY not configurable to "ASK"-mode???
Post by: Anacunga on May 10, 2012, 04:05:26 PM
OK - so far ... but in that specific case, there is more behind! My first question was very simple - but ...

First of all, you have to know that the website is one of those sites that huge commercial software companies do not want that they exist - so it is not to exclude that blocking could be "politically motivated"; there is an other reason that could indicate to that. But let's first analyze the whole procedure.

And secondly you have to know that the whole procedure here was done with scripting turned off. I'll come back to the consequences this detail can have fürther below.

1. First level blocking: "network-shield blocks a malicous website".

Infection: URL:Mal

Very informative - isn't it?

so let's disable network-shield and look what's comin on.

2. second level blocking: Virus found

Infection: JS:ScriptIP-inf [Trj]

There is no direct info that this was the web-shield; you can only notice it by realizing that the infected object itself is in the shape of a web-url! You only can see it directly if you go to the web-shield window in the main menu and observe the red traffic shield event line move.

Clicking "abort connection" as action to take.

OK, so let's stop web-shield too.

3. third level blocking: again "virus found", again JS:ScriptIP-inf [Trj] - this time the object is the html-file for that page inside the IE-browser-cache.

So, let's click on OK with the action "move to chest" or "delete" or just click the window-close-x (on top right of the alert-popup). What happens? Immediately the alert-popup comes again - and when moving to chest, there is nothing in the chest if you check what's in there. Only solution is to set "block" as action - then the website opens.

4. please remember that scripting is still disabled - so malware that is bound to scripting can't do any harm. So next step falls away - but would be to expect that fourth level blocking would be Script-Shield. But I did not go so far.

Coming back to the infection itself called "JS:ScriptIP-inf [Trj]" ... If you google it, you don't really find what kind of malware that ought to be - and it really looks like a "preventive dummy alert" provocated by heuristics to ban disagreeable stuff.

So what's really going on?

The next step you could be instructed by the big sw-companies could be to find new names for that kind of malware so that the user can't see anymore that the malware can be immunized by disabling scripting? Or would that just a little too much conspiration theory?

Why are you not proposing the possiblility to access a website with scripting turned off when it's clear that the malware is inside a script - and by turning scripting off it can't do any harm?

And the main question remains: why is network-shield not overridable in the same way as other shields are?

And when we just discuss it: it's a kind of questionable to have windows that are in front of all - even in front of the system tray and the main menu on the bottom of the screen ... as it's making it very difficult to trace down the source of a problem without the possibility to get the entire alert info (including file path, registry change request range etc.) into a simple editable and (in a text file) pastable format.
Title: Re: Network Shield: WHY not configurable to "ASK"-mode???
Post by: Pondus on May 10, 2012, 04:14:20 PM
could you also post the url so we may have a look?
post it none clickable......http as hxxp and www as wxw
Title: Re: Network Shield: WHY not configurable to "ASK"-mode???
Post by: Anacunga on May 10, 2012, 04:17:03 PM
if you dare: download-crack-serial (without the w's in front; standard commercial tld).
Title: Re: Network Shield: WHY not configurable to "ASK"-mode???
Post by: DavidR on May 10, 2012, 04:35:59 PM
So you just had to visit that site, but avast's network shield wouldn't let you. Reality check, the network shield doesn't block because "the website is one of those sites that huge commercial software companies do not want that they exist."

It blocks it because it considers the site malicious and cracks aside from any moral or legal implications, they are very high risk as they frequently come with uninvited guests.
Title: Re: Network Shield: WHY not configurable to "ASK"-mode???
Post by: polonus on May 10, 2012, 05:25:15 PM

What if you know  this  JS:ScriptIP-inf malware from hxtp://download-crack-serial.com/search.php?s= is now dead, but was found to be active from there for 7202.8 hrs.
Would not you blacklist the site, like Bitdefender does actually. 
PUA.Packed.ASPack malware was found active for a 3333,5 hrs period before finally being closed down.
These findings are supported by this http://www.mywot.com/en/scorecard/downloadcrackserialkeygen.com?utm_source=addon&utm_content=popup-donuts
And the website av warning from here: http://www.webutation.net/go/review/downloadcrackserialkeygen.com
That it has this IDS warning: Suricata /w Emerging Threats   
Timestamp   Source IP   Destination IP   Alert
2012-05-10 17:04:19   85.159.233.95   urlQuery Client   ET RBN Known Russian Business Network IP (386)
see: http://urlquery.net/report.php?id=53518
This all could imply that that the contents of the site is being frowned upon by US officials to say the least,
aside from the risks of receiving additional adware/spyware/malware (who is going to complain in the aftermath?)
that could be an additional bonus for visiting such sites.,

polonus
Title: Re: Network Shield: WHY not configurable to "ASK"-mode???
Post by: Anacunga on May 10, 2012, 05:56:05 PM
@DavidR:

I had to visit that website at a customers disposition to trace down some possible sources of problems he had. And as I use AVAST as protection, I ran into the described problem of just getting blocked that website without usable information why it is blocked - not more and not less.

But your answer seem to be a confirmation that the site is blocked only "for political reasons" - and that seems to be even confirmed as the detailed information about the blocking reason is not given. That's also what I complain about: just only "URL:Mal" is not enough information to see what's the problem with the site! And to find out, you have to disable part of your protection.

It blocks it because it considers the site malicious
The problem here is still: you do not get ANY information why AVAST considers this site as being malicious! And the way you are answering implies that you'd like to deny the right of the user to know what the reason for blocking is. Considering it as justifide just by knowing that it is a "crack-serial"-website is another question ...

and cracks aside from any moral or legal implications
... that's another battlefield ... but considering crack-websites per se as "virus/malware-infected" is just a lie to the user (I don't use only "malicious" here!) - and the consequence can be that the user is disabling protection and opens the doors for much worse problems. That's also why it is necessary to have appropriate information.

they are very high risk as they frequently come with uninvited guests.
... that's known - but a valuable protection is intercepting that - as long as it was not disabled because of the reasons mentioned above.

@polonus:

My complaint is not the fact that the mentioned site is blocked by network shield, but that you do not get enough information why it was blocked - without disabling part of the protection! If you want to know some minor details, you have to disable protection. That's what I am complaing about!

btw: urlQuery reports: - No alerts detected

Sorry, but that a crack-serial-site has a poor reputation by it's own (just by the stuff itself that is put there), and that (some of the) cracks found there additionally are infected with ghastly and excruciating malware is also well known. So that's not the real topic here. Topic here is the behaviour of AVAST in such cases - and the lack of information you get by AVAST about the flaw  - without disabling part of the protection!
Title: Re: Network Shield: WHY not configurable to "ASK"-mode???
Post by: DavidR on May 10, 2012, 06:33:55 PM
First there was no mention in your post that you were trying to investigate this site, just that you wanted/had to visit it - that would have put a different spin on things as my comments are also a general warning to others who may be reading this topic.

We frequently investigate suspect sites which are reported in the in the viruses and worms forum (but most would be taking other pro-active precautions) and we have to in some cases disable the Network Shield, but in most cases we don't need to disable it as we use several other on-line analysis tools (some polonus mentioned) to do that.

So in your investigating the site, is more an exception than the rule so giving configurability and exclusion to "more than 150,107,324 active users" isn't something I think avast! would do as they are looking at protecting the majority of their average users.

You say people shouldn't have to disable a part of avast to get more information, well by having an exclusion to be able to visit that site is one and the same thing.

As I said the network shied does what it says on the tin, blocks what it considers malicious sites, not political or commercial blocking. It also isn't blocking just on the fact it has cracks or because of a bad rep, but that because it has had multiple actual malware detections previously.

I have no personal wish (or influence, I'm just another avast user) that all crack sites are blocked, there are plenty that aren't. So there clearly is no policy to block crack/serials sites by avast to do so, the blocking is based on prior actual detections.

If you want to ignore that, the that is entirely up to you.
Title: Re: Network Shield: WHY not configurable to "ASK"-mode???
Post by: Anacunga on May 10, 2012, 07:00:14 PM
First there was no mention in your post that you were trying to investigate this site, just that you wanted/had to visit it - that would have put a different spin on things as my comments are also a general warning to others who may be reading this topic.
Sorry to confess - but that was also on purpose for provocating answers that show how such kind of problems are intercepted here in the forum - and what the tenor here is ...

We frequently investigate suspect sites which are reported in the in the viruses and worms forum (but most would be taking other pro-active precautions) and we have to in some cases disable the Network Shield, but in most cases we don't need to disable it as we use several other on-line analysis tools (some polonus mentioned) to do that.
OK ... but where are the links to further investigation tools if you click on "more info" in the alert window?

So in your investigating the site, is more an exception than the rule so giving configurability and exclusion to "more than 150,107,324 active users" isn't something I think avast! would do as they are looking at protecting the majority of their average users.
Just a huge number of cases AVAST was active does not tell anything about the quality of one single problem. And to be honest: I would not expect to have a default setting set to "ask" for the network shield; but I assume not only me considers it as a better solution to override a protection just once (with the ASK-option) than needing to disable the protection itself and later on reenable it.

You say people shouldn't have to disable a part of avast to get more information, well by having an exclusion to be able to visit that site is one and the same thing.
Yes and no! Yes, overriding it once by ASK-option is just disabling it once - but also: No, disabling it once (by overriding the ask-option) reactivates it immediately and automatically - as it was just disabled once; and you even don't have not to forget to reactivate it manually. It's not totally the same - even if it has the same effect on the one affected website.

As I said the network shied does what it says on the tin, blocks what it considers malicious sites, not political or commercial blocking. It also isn't blocking just on the fact it has cracks or because of a bad rep, but that because it has had multiple actual malware detections previously.
Sure, that imputation was on purpose - with a wink ... But the thing is that by clicking on "more info" you even don't really get more (and detailed) info about the flaw: first of all, you only get the infor that you could read before in the alert windo - and secondly you only get it if you have script turned on - otherwise you do not get any info at all about the flaw. Additionally you get an (own) "commercial recommenation" to use AVAST Pro; nothing more!

I have no personal wish (or influence, I'm just another avast user) that all crack sites are blocked, there are plenty that aren't. So there clearly is no policy to block crack/serials sites by avast to do so, the blocking is based on prior actual detections.
There would not be any reason not to believe you. But as mentioned above: protection IS a multilevel affair with several levels of protection - that ALL should be configurable to a certain extent - and even it is only to include an ASK-option not to be forced to disable network protection manually.

If you want to ignore that, the that is entirely up to you.
Do I really look like as I'm doing that?
Title: Re: Network Shield: WHY not configurable to "ASK"-mode???
Post by: Pondus on May 10, 2012, 07:04:20 PM
also vipre detect this

https://www.virustotal.com/file/72314130bb400e0354834e1809c040b33744e9dc0e0c8aef1777108f0e966681/analysis/1336669083/

First seen by VirusTotal
 2012-05-10 16:58:03 UTC
Title: Re: Network Shield: WHY not configurable to "ASK"-mode???
Post by: polonus on May 10, 2012, 07:32:51 PM
There is a script there with recurring repeated //eval display() &  pre.js:249: InternalError: too much recursion
Insecure is the fact that the server gives away the full version of it out to the world and that should be remedied,
because these sites give away too much info to be eventually abused.

No alerts were detected but that IP still is listed with
Quote
2012-05-10 17:04:19   85.159.233.95   urlQuery Client   ET RBN Known Russian Business Network IP (386)
according to Suricata /w Emerging Threats list.
I guess you know what Client RBN stands for and that has nothing to do with political issues and keygen cracks.
For that site is hosted in the Netherlands (a 3 man firm) we see: DNS: ns2.p8.ru, ns1.p8.ru
Also consider: http://www.mywot.com/en/scorecard/85.159.233.95?utm_source=addon&utm_content=popup-donuts
RBN has been known as a nebulous organization, see: https://community.mcafee.com/community/security/gti/webthreats/blog/2011/11/29/russian-business-network-malware-sites-and-ip-addresses. But all this has apparently this nothing to do with the recent avast flag.
The reason for Network Shield blocking is solely known to the avast team member(s)  that implemented it.
Pondus now says avast/GData are not the only ones to flag it,

polonus
Title: Re: Network Shield: WHY not configurable to "ASK"-mode???
Post by: Anacunga on May 10, 2012, 07:44:39 PM
Sorry that I have to clarify again: I did not make ANY remark about the "grade or quality and quantity of infection" of the implied website. That's also why I did not mention it in the beginning! My complaint is SOLELY about the behaviour of the AVAST network shield: that there is no "short override just for once" (as it is with the other shields) and you have mandatorily disable that protection level to get some further info - and that the information about the reason for the alert is insufficient.
Quote
The reason for Network Shield blocking is solely known to the avast team member(s) that implemented it.
You mean that the information policy of network-shield is really insufficient?
Title: Re: Network Shield: WHY not configurable to "ASK"-mode???
Post by: polonus on May 10, 2012, 11:42:16 PM
There are just two options have the Network Shield installed or disabled. There are other scanning methods to analyze why the Network Shield might be alerting a certain site. In most cases it is because it has come accross a malicious site or IP. Why that IP or site has been blocked can be explained by those that have implemented the configuration of it. Overriding it in order to get further info is not advisable for the unaware user, because he would get infected or wan't blocked eventaully to visit a malicious site. In case of FP's the normal; procedure is to report a FP and avast team will look into the matter. Checking Network Shield flags by temporarily disabling it is bad practice and putting user protection at risk. If this prodecure is even used to circumvent the blocking of certain IPs and sites it seems even more questionable, even as it is being presented in a "luring" way in order to evaluate detection,

polonus
Title: Re: Network Shield: WHY not configurable to "ASK"-mode???
Post by: !Donovan on May 10, 2012, 11:48:32 PM
Coming back to the infection itself called "JS:ScriptIP-inf [Trj]" ... If you google it, you don't really find what kind of malware that ought to be - and it really looks like a "preventive dummy alert" provocated by heuristics to ban disagreeable stuff.

Lets break it down.

JS:ScriptIP-inf [Trj] <-- We have a potentially malicious JavaScript element
JS:ScriptIP-inf [Trj] <-- The script contains a blacklisted IP by avast, presumably the potentially malicious site

avast! is blocking a potentially malicious javascript element that contains a blacklisted IP that is most likely the potentially malicious site you were trying to visit.
Title: Re: Network Shield: WHY not configurable to "ASK"-mode???
Post by: polonus on May 11, 2012, 01:05:45 AM
Hi !Donovan,

This is confirmed here: http://safeweb.norton.com/report/show?url=download-crack-serial.com

    Drive-bydownloads
Found threats 1

Name of Threat:    Malicious Site: Malicious Domain Request 2
Location:    htxp://download-crack-serial.com

polonus

Title: Re: Network Shield: WHY not configurable to "ASK"-mode???
Post by: Anacunga on May 11, 2012, 02:53:36 AM
Thanks - but again the question remains: WHY does the normal AVAST user not get more info than "Netshield: URL:Mal"??? Is AVAST really intended to be used only by stupid dummies???
Title: Re: Network Shield: WHY not configurable to "ASK"-mode???
Post by: Gargamel360 on May 11, 2012, 03:06:00 AM
Is Avast! meant to be usable by dummies? Sure, yes.  Only by dummies?  Hardly, no.  As is clearly evident at how configurable it is.  A "dummie" can really bork things up by playing with the wrong settings.

I just don't see the issue here, unless you just want more Transparency. 

If you are informed enough to be making investigations into infected websites, you surely have some kind or fall-back plan (image?) and additional security (sandboxing/VM? HIPS?) and are doing so on a "secure" PC (minimal confidential data) so that turning off the Network Shield to go to a site is not an issue.
Title: Re: Network Shield: WHY not configurable to "ASK"-mode???
Post by: Anacunga on May 11, 2012, 12:31:45 PM
Quote
Is Avast! meant to be usable by dummies? Sure, yes.
That's part of the task – so there is nothing to say against – and it's fine if that condition can be fulfilled ... :)

Quote
Only by dummies?  Hardly, no.  As is clearly evident at how configurable it is.
Here problems could begin – also if you look at how much time the "non-dumb non-dummies" would need to spoil in case something does not run as fine as the default setting covers it ...

Quote
A "dummie" can really bork things up by playing with the wrong settings.
Also this is well known – but a "high quality software" should allow both; and AVAST! IS the number one!

Quote
I just don't see the issue here, unless you just want more Transparency.
... that's what I'm asking for!!!

Quote
If you are informed enough to be making investigations into infected websites, you surely have some kind or fall-back plan (image?) and additional security (sandboxing/VM? HIPS?) and are doing so on a "secure" PC (minimal confidential data) so that turning off the Network Shield to go to a site is not an issue.
Sure – but the question always is: how much time do you have to spoil just to get the minimal info for finding out what could be the cause for any flaw that caused Avast to show a warning window. And needing to disable some protection level JUST FOR GETTING SOME MINIMAL INFO WHY A WARNING HAD OCCURRED is an issue in the security concept. It NEVER should be necessary to disable ANY protection level just for getting the information about the cause for the avast-warning.
Title: Re: Network Shield: WHY not configurable to "ASK"-mode???
Post by: polonus on May 11, 2012, 06:55:14 PM
Hi Anacunga,

You would not get that information not even if you could override Networkshield. I try to explain. Some at avast decide on ground of blacklisting or on a persistent spawn of specific malcode that there is reason to block an IP or IP-range for instance. How would you know? If you established that there should be no reason for that block because the malware has been closed, response is dead or new malware is not being spawned from there (VirusWatch list etc.) and see that there is also no more reason for that site to get re-infected (site server software does no longer give out full server version to the world, website software has been fully updated and patched and so not vulnerable to possible hacks, you could file a FP report and whenever it is found to be a real FP with a next update the block could have been lifted.
An override-feature of the Networkshield would be dangerous in the hands of the unaware and malversants alike. Who wants to play Russian Roulette?

polonus

Title: Re: Network Shield: WHY not configurable to "ASK"-mode???
Post by: mchain on May 11, 2012, 07:48:21 PM
Posted by: polonus
« on: Today at 04:55:14 PM
Quote
An override-feature of the Networkshield would be dangerous in the hands of the unaware and malversants alike. Who wants to play Russian Roulette?
I certainly don't.  You never know when that chambered bullet will come around and kill you when you pull the trigger.  You've got to trust Avast! in that they know what they are doing, and doing it at a higher level than most a/v's available out there.  Very few false positives, too!

Remember, we are just avast! users here.  Hope we have helped you out somewhat.
Title: Re: Network Shield: WHY not configurable to "ASK"-mode???
Post by: Anacunga on May 11, 2012, 08:45:59 PM
Quote
You would not get that information not even if you could override Networkshield. I try to explain. Some at avast decide on ground of blacklisting or on a persistent spawn of specific malcode that there is reason to block an IP or IP-range for instance.
So far that's the funcionality of Avast and not to criticise.

Quote
How would you know?
That's one of the questions that Avast should be able to give an answer - in the sense of: alone from the warning itself should be determinable why the site was blocked. Inside the warning should be a link to the "protocol" of the day that the decision was taken to blacklist that site - with of course the reason why it was blacklisted. That can be some time ago - no prob. - but as it is now, you do not get ANY usable information than "Avast blocks this site (and as for you, you have to shut up and not to ask anything further)".

Quote
If you established that there should be no reason for that block
Sorry, no! I did only complain about the information policy of Avast. Again: that was also the reason that I first did not tell what site is concerned; it is just used as example here; nothing more! The question here is still the information policy of Avast and NOT that specific site!

Quote
because the malware has been closed, response is dead or new malware is not being spawned from there (VirusWatch list etc.) and see that there is also no more reason for that site to get re-infected (site server software does no longer give out full server version to the world, website software has been fully updated and patched and so not vulnerable to possible hacks, you could file a FP report and whenever it is found to be a real FP with a next update the block could have been lifted.
That would be a totally different story that is NOT topic here!

Quote
An override-feature of the Networkshield would be dangerous in the hands of the unaware and malversants alike. Who wants to play Russian Roulette?
That's clear and obvious - and that's why I propose to be able to override it only once without the necessity to disable the protection shield for that level - and OF COURSE that would mandatorily only be accessible by extended options/settings and of course default would be turned off!
Title: Re: Network Shield: WHY not configurable to "ASK"-mode???
Post by: polonus on May 12, 2012, 12:35:06 AM
I think it would be very unwise to bring that mode into the software, because it could also be (ab)used towards other ends. Besides the malversant is an opponent that cannot be underestimated. Well anyway that is my opinion. The time saving argument you give for checking flagged sites is non-existent, because an extensive check of a suspicious site needs somewhat more time and scanning. With a small group here I am doing this all the time so I am entitled to know. Maybe I could repeat the procedure, but then without any conclusive results,

polonus
Title: Re: Network Shield: WHY not configurable to "ASK"-mode???
Post by: AntiVirusASeT on May 12, 2012, 05:11:13 AM
the fact that sites blocked by network shield under blacklist provided by avast (not some heuristics method) is almost as good as saying u should obey it. because these websites have been analysed by experts.

this is also the reason why exclusions is possible in web shield (because there is potential that it makes mistakes using heuristics). there is almost no possibility for mistakes in network shield on the other hand.

besides, if any information to explain the block will likely to be very lenghty..perhaps something like what polonus stated?
There is a script there with recurring repeated //eval display() &  pre.js:249: InternalError: too much recursion
Insecure is the fact that the server gives away the full version of it out to the world and that should be remedied,
because these sites give away too much info to be eventually abused.

No alerts were detected but that IP still is listed with
Quote
2012-05-10 17:04:19   85.159.233.95   urlQuery Client   ET RBN Known Russian Business Network IP (386)
according to Suricata /w Emerging Threats list.
I guess you know what Client RBN stands for and that has nothing to do with political issues and keygen cracks.
For that site is hosted in the Netherlands (a 3 man firm) we see: DNS: ns2.p8.ru, ns1.p8.ru
Also consider: http://www.mywot.com/en/scorecard/85.159.233.95?utm_source=addon&utm_content=popup-donuts
RBN has been known as a nebulous organization, see: https://community.mcafee.com/community/security/gti/webthreats/blog/2011/11/29/russian-business-network-malware-sites-and-ip-addresses. But all this has apparently this nothing to do with the recent avast flag.
The reason for Network Shield blocking is solely known to the avast team member(s)  that implemented it.
Pondus now says avast/GData are not the only ones to flag it,

polonus

the point is that any information provided is hard to be sufficient yet not too technical for users to digest...

on top of that, u should trust that ur antivirus is not politically motivated...uninstall anything from ur system that u cannot trust.

edit: ask mode is suicidal...u need to understand how many users would trade security for ease of usage...including accessing malicious sites. most of them will regret their actions later (if they even know that they are infected). if u look at the forums long enough, u will see what great lengths people who have no idea on how to use even the avast gui to go about doing trial and error to find the setting to allow them access to an infected webpage or file...all without proper analysis on the suspect website/file...