Author Topic: ET INFO Suspicious Darkwave Popads Pop Under Redirect on website detected?  (Read 2437 times)

0 Members and 1 Guest are viewing this topic.

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33897
  • malware fighter
Has -c1.popads.net tracking...read on that from: https://malwaretips.com/blogs/remove-popads-net/

Re: https://urlquery.net/report/563d19c5-86a0-4261-a667-15a9f7acb17b
Re: https://privacyscore.org/site/143359/
Re: https://securityheaders.com/?q=cric7.net&followRedirects=on
Re: https://aw-snap.info/file-viewer/?protocol=not-secure&ref_sel=GSP2&ua_sel=ff&chk-cache=&fs=1&tgt=Xn1bXjcubnt0~enc
moved permanently Namecheap abuse: https://www.abuseipdb.com/check/162.255.119.170
Retirable code: bootstrap   3.3.4   Found in -https://mylivecricket.github.io/my/bootstrap.min.js
Vulnerability info:
High   28236 XSS in data-template, data-content and data-title properties of tooltip/popover CVE-2019-8331   
Medium   20184 XSS in data-target property of scrollspy CVE-2018-14041   
Medium   20184 XSS in collapse data-parent attribute CVE-2018-14040   
Medium   20184 XSS in data-container property of tooltip CVE-2018-14042
ReferenceError: $ is not defined
 /:358
Forcepoint Threatseeker flags: https://www.virustotal.com/gui/url/dce2c6339a33d0ea7d2193afc5d3773f0aa20222909e5d433669160d5fc3bf2e/detection

polonus
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!