Author Topic: JS:iframe-EPM [Trj]  (Read 9190 times)

0 Members and 1 Guest are viewing this topic.

REDACTED

  • Guest
JS:iframe-EPM [Trj]
« on: February 08, 2016, 04:52:40 PM »
Avast wyrzuca monit o JS:iframe-EPM [Trj], gdy wchodzą w różne panele Wordpress na jednym serwerze, niezależnie od przeglądarki i komputera. Trojan uniemożliwia edycję treści w panelu Wordpress - nie wyświetla konkretnej ramki iframe.

Co zrobić? Nie mogę znaleźć odpowiedzi nigdzie w sieci. Dzięki za pomoc.

Offline Eddy

  • Avast Evangelist
  • Maybe Bot
  • ***
  • Posts: 31079
  • Watching (over?) you
    • Malware removal, Biljart and other things.
Re: JS:iframe-EPM [Trj]
« Reply #1 on: February 08, 2016, 04:55:23 PM »
This is a English forum.
Post in English here or use one of the non-English forums.

Offline Asyn

  • Avast Überevangelist
  • Certainly Bot
  • *****
  • Posts: 76037
    • >>>  Avast Forum - Deutschsprachiger Bereich  <<<
Re: JS:iframe-EPM [Trj]
« Reply #2 on: February 08, 2016, 04:56:18 PM »
W8.1 [x64] - Avast Free AV 23.3.8047.BC [UI.757] - Firefox ESR 102.9 [NS/uBO/PB] - Thunderbird 102.9.1
Avast-Tools: Secure Browser 109.0 - Cleanup 23.1 - SecureLine 5.18 - DriverUpdater 23.1 - CCleaner 6.01
Avast Wissenswertes (Downloads, Anleitungen & Infos): https://forum.avast.com/index.php?topic=60523.0

REDACTED

  • Guest
Re: JS:iframe-EPM [Trj]
« Reply #3 on: February 08, 2016, 05:01:31 PM »
Sorry for Polish ;)

Avast is giving me alert about JS:iframe-EPM [Trj], when I'm using Wordpress panels to edit some pages (multiple Wordpress instalation on one server, multiple browsers and computers). I'm unable to edit some content in the iframe. What should I do?

Thanks for your help.

Offline Asyn

  • Avast Überevangelist
  • Certainly Bot
  • *****
  • Posts: 76037
    • >>>  Avast Forum - Deutschsprachiger Bereich  <<<
Re: JS:iframe-EPM [Trj]
« Reply #4 on: February 08, 2016, 05:02:59 PM »
Which page/site..? Post the link non clickable.
W8.1 [x64] - Avast Free AV 23.3.8047.BC [UI.757] - Firefox ESR 102.9 [NS/uBO/PB] - Thunderbird 102.9.1
Avast-Tools: Secure Browser 109.0 - Cleanup 23.1 - SecureLine 5.18 - DriverUpdater 23.1 - CCleaner 6.01
Avast Wissenswertes (Downloads, Anleitungen & Infos): https://forum.avast.com/index.php?topic=60523.0

REDACTED

  • Guest
Re: JS:iframe-EPM [Trj]
« Reply #5 on: February 08, 2016, 05:04:58 PM »
zkp.krakow.pl/27
messiaen.pl

Offline Asyn

  • Avast Überevangelist
  • Certainly Bot
  • *****
  • Posts: 76037
    • >>>  Avast Forum - Deutschsprachiger Bereich  <<<
W8.1 [x64] - Avast Free AV 23.3.8047.BC [UI.757] - Firefox ESR 102.9 [NS/uBO/PB] - Thunderbird 102.9.1
Avast-Tools: Secure Browser 109.0 - Cleanup 23.1 - SecureLine 5.18 - DriverUpdater 23.1 - CCleaner 6.01
Avast Wissenswertes (Downloads, Anleitungen & Infos): https://forum.avast.com/index.php?topic=60523.0



REDACTED

  • Guest
Re: JS:iframe-EPM [Trj]
« Reply #9 on: February 08, 2016, 08:21:26 PM »
Hi all,

Newbie here; sorry if not clear how to seek guidance. 

Am receiving JS:Iframe-EPM [Trj] "infection blocked" message from AVAST FREE when trying to open seemingly benign and reputable website.  The particulars:

Target page:  http://libertyprairie.org/
URL:  http://libertyprairie.org/wp-content/themes/organic_natural/js/jquery.flexslider.js?ver=20130729|{gzip}
Infection:  JS:Iframe-EPM [Trj]
Process:  F:\Program Files\Google\Chrome\Application\chrome.exe

Your thoughts?
Thanks!
« Last Edit: February 08, 2016, 08:25:17 PM by LibDancks »

Offline Eddy

  • Avast Evangelist
  • Maybe Bot
  • ***
  • Posts: 31079
  • Watching (over?) you
    • Malware removal, Biljart and other things.
Re: JS:iframe-EPM [Trj]
« Reply #10 on: February 08, 2016, 08:33:10 PM »
And there we have another site that is using WP and JQuery and got itself into problems because it is not up-to-date.

REDACTED

  • Guest
Re: JS:iframe-EPM [Trj]
« Reply #11 on: February 08, 2016, 09:16:09 PM »
@Eddy:

Thanks, but your answer seems to be mostly for Pondus and Asyn.

From my own (user) perspective:  I'm not sure what to do about "another site" that uses WP and JQuery and gets itself into trouble.  Did my AVAST really detect a virus, or just an outdated script configuration that creates a vulnerability?  Am I supposed to notify the host they're infected? scold them for not keeping their scripts up-to-date? turn off AVAST and proceed at my own risk?

Maybe you're saying that the host site is either (i) infected or (ii) configured in a way that it's unsafe to load due to vulnerabilities ... in which case, many thanks.  But if not, blocking sites from loading because their scripts are outdated would seem to be as much an AVAST problem as it is a site problem.

Or am I missing something?  Sorry in advance.




Offline Pondus

  • Probably Bot
  • ****
  • Posts: 37527
  • Not a avast user
Re: JS:iframe-EPM [Trj]
« Reply #12 on: February 08, 2016, 09:21:02 PM »
KIllmalware >>  http://killmalware.com/libertyprairie.org/


libertyprairie.org/wp-content/themes/organic_natural/js/retina.js?ver=20130729

https://www.virustotal.com/en/file/34726a1f643337e98bbf3cd65e9f41f7b88a5da2ca2a40ed048315a6c9b56cfe/analysis/

avast and GData dont like that JS file

« Last Edit: February 08, 2016, 09:24:45 PM by Pondus »

Offline Pondus

  • Probably Bot
  • ****
  • Posts: 37527
  • Not a avast user
Re: JS:iframe-EPM [Trj]
« Reply #13 on: February 08, 2016, 09:38:56 PM »
could be related to this? ...   http://imulus.github.io/retinajs/     possible false positive ?



« Last Edit: February 08, 2016, 09:41:08 PM by Pondus »

REDACTED

  • Guest
Re: JS:iframe-EPM [Trj]
« Reply #14 on: February 08, 2016, 10:07:25 PM »
@Eddy:

Thanks, but your answer seems to be mostly for Pondus and Asyn.

From my own (user) perspective:  I'm not sure what to do about "another site" that uses WP and JQuery and gets itself into trouble.  Did my AVAST really detect a virus, or just an outdated script configuration that creates a vulnerability?  Am I supposed to notify the host they're infected? scold them for not keeping their scripts up-to-date? turn off AVAST and proceed at my own risk?

Maybe you're saying that the host site is either (i) infected or (ii) configured in a way that it's unsafe to load due to vulnerabilities ... in which case, many thanks.  But if not, blocking sites from loading because their scripts are outdated would seem to be as much an AVAST problem as it is a site problem.

Or am I missing something?  Sorry in advance.
Thanks for this question as it provides more insight to what I have suspected is going on than the answers so far.  I also need assistance with this new problem from the last update.  Avast won't allow me to proceed on a website I've used easily in the past that I upload my invoices to.  I've tried both Chrome & Firefox and Avast has taken away my auto-login to this page (http://intranet.manascisaac.com/) and I find this totally unacceptable.  When did the software not allow the user the option to quarantine or permit?