Author Topic: Right detection by avast! Web Shield for HTML:Script-inf  (Read 2100 times)

0 Members and 1 Guest are viewing this topic.

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33900
  • malware fighter
Detected /wp-login.php|{gzip} as such, see: https://www.virustotal.com/nl/url/ad91145eb40661e6566c6280c6ed459f2aaeb6e233965fc20c0916433a46817d/analysis/1368284961/
because WP software on site is out of date: Wordpress internal path: /usr/local/apache/www/htdocs/mojdommojaprzyszlosc.pl/wp-content/themes/petcharms/index.php  version update required...as reported here: http://sitecheck.sucuri.net/results/mojdommojaprzyszlosc.pl
Flagged as suspicious here: http://wepawet.iseclab.org/view.php?hash=cec34ffec8923e2672fd14c0c3ff6a0c&t=1367703453&type=js

So I cannot stress enough for avast! users to have the avast! shields up and active as they are a major part of your protection!

polonus
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33900
  • malware fighter
Re: Right detection by avast! Web Shield for HTML:Script-inf
« Reply #1 on: May 11, 2013, 05:34:06 PM »
Netart dot pl is known to be a bad webshost.
See: http://com.geek-tools.org/en/web-hosting/netart.pl-1
For this particular IP: http://com.geek-tools.org/ipuri/85.128.138.191
Sending this IP to urlquery with my urlquery extension in Google Chrome, I get: http://urlquery.net/report.php?id=2423119
See at recent reports on the AS for what goes on there, also sitevet report on this AS:
AS Name: NETART NetArt Spolka Akcyjna Spolka Komandytowo-Akcyjna
IPs allocated: 98304
Blacklisted URLs: 21

Hosts...
...malicious URLs? Yes 
...badware? Yes 
...Current Events? Yes 
bad webhost honeypot report: http://www.projecthoneypot.org/ip_85.128.138.191

pol
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!