Author Topic: Site Blocked URL:Mal  (Read 1080 times)

0 Members and 1 Guest are viewing this topic.

Offline mehuge

  • Newbie
  • *
  • Posts: 7
Site Blocked URL:Mal
« on: March 13, 2019, 03:47:14 PM »
We have a company (not customer) facing website that is accessed using a public IP address. It includes the ability to download attachments, which occasionally triggers a virus detection alert if the attachment sent to us over email is or is thought to be malicious. THATS why we have Avast / AVG installed, to protect us from those occasional malicious attachments.

Unfortunately it seems that Avast (and AVG) have now decided that download.asp (the page that embeds/downloads the attachment - dependent on type) is dangerous and won't let us download anything now! This is severely impacting our business.

This is therefore defeating the object of having protection, as we will be forced to turn browser integrated protection off in order to access the many perfectly legitimate attachments accessed through that page.

Example URL (not accessible without a login). The ID and name are significant, as they specify which attachment to download.

https://support.redskyit.com/inctrack/download.asp?ID=400632&name=0-1_image001%2Ejpg

The server where these attachments are stored (on the file system) already has AVG installed, so in theory we should not have any attachments with viruses that AVG recognises anyway!

Offline Pondus

  • Probably Bot
  • ****
  • Posts: 37533
  • Not a avast user
Re: Site Blocked URL:Mal
« Reply #1 on: March 13, 2019, 04:01:52 PM »
Report a false positive (select file or website)
https://www.avast.com/false-positive-file-form.php




Offline mehuge

  • Newbie
  • *
  • Posts: 7
Re: Site Blocked URL:Mal
« Reply #2 on: March 13, 2019, 05:57:51 PM »
Thanks.  Support are (have) since dealt with it.  But useful link for future reference.

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33904
  • malware fighter
Re: Site Blocked URL:Mal
« Reply #3 on: March 13, 2019, 06:20:34 PM »
Hi mehuge,

Be aware of this exploit on viewgenerator: https://www.exploit-db.com/exploits/46153
Persistent mail vulnerability: https://www.government-lab.com/get_content.php?id=47

polonus
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!