0 Members and 1 Guest are viewing this topic.
Quote from: KDibble on April 30, 2014, 03:44:13 PMI'm getting this on the Wiggio calendar website also; it just started today.http://wiggio.comProduces:TROJAN HORSE BLOCKEDObject: http:/.../wiggio-in.jgz?lastmod=20140429161Infection: JS:Decode-BUL [Trj]People here have been using this website for shared calendar activity for weeks. It's definitely a legitimate website.I will post this separately as a query on "False Positive on Wiggio Website?".I think your site is a FP.However, check this is on th ASN.. http://urlquery.net/report.php?id=1398869423234THe report on the Download is 13/51 Malicious. https://www.virustotal.com/en/file/77547470097e7d4537eb8adaa06f5c38db81436be96158d5377c09d7f6b24fc9/analysis/1398832706/No other reports on wiggio.com.
I'm getting this on the Wiggio calendar website also; it just started today.http://wiggio.comProduces:TROJAN HORSE BLOCKEDObject: http:/.../wiggio-in.jgz?lastmod=20140429161Infection: JS:Decode-BUL [Trj]People here have been using this website for shared calendar activity for weeks. It's definitely a legitimate website.I will post this separately as a query on "False Positive on Wiggio Website?".
Hi Michael,There is iFrame malware flagged on site: Suspiciousblank dot html' *noop dot html' **noop dot html'" Security issue with IFrame based HTML hosting. This results in serious issues with the IFrame staying on top and obscuring important pop-ups.the iFrame is hidden temporarily while the pop-up is dismissed. Impact is Cross Domain Information Disclosure Vulnerability. A malicious site may be able to modify the iframe of a site in an arbitrary external domain. Attackers could exploit this to gain access to sensitive information that is associated with the external domain. Other attacks are also possible, such as executing script code in other browser security zones. info credits SecurityFocus - mozilla,** Funny that Web Security scan finds the iFrame flag on the no-op tag, used in assembler-level programming as filler for data or patch areas,No-op tag could for instance be used to mark out the start and end of a chunk of HTML to be Ajaxedhttps site seems OK: http://toolbar.netcraft.com/site_report?url=https://wiggio.zendesk.comThis external link also been checked: htxps://itunes.apple.com/us/app/wiggio/id424059394?mt=8Scan for uri as given malicious: http://zulu.zscaler.com/submission/show/6be9191a38118fc874c468728c1b9fcc-1398877896Malware could be a generic worm detection but also riskware. Reason also to concluse a false positive detection. polonus
We have been using this website with Avast here for several months but today was the first time Avast displayed a warning about it. Is it possible to know whether this is because something on the website changed, or did something in Avast change since yesterday?