Author Topic: False Positive: Site Blocked - HTML:Script-inf  (Read 25646 times)

0 Members and 1 Guest are viewing this topic.

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 34051
  • malware fighter
Re: False Positive: Site Blocked - HTML:Script-inf
« Reply #30 on: September 07, 2024, 08:39:33 PM »
Additionally, AI-driven reports of detection.

"We noticed that Quttera has flagged wXw.leonestore.shop for containing a potentially malicious file located at /media/attachments/slideritem/1715170207/bomboniere_1_2.jpeg, which is reported to have malicious PHP content
and is associated with the threat name Heur.HTML.Defacement.gen.F4279.
Avast flags this malware as HTNL:Script-inf.

This raises serious concerns about the security of the mentioned website and the safety of its users.
It's essential for the website administrators to take immediate action by removing this file.
scanning for additional threats, and restoring from a clean backup if possible.

Ensuring that all software is up to date can help prevent future incidents.
Users should be cautious, and I recommend employing a security service to safeguard against further issues.
Protecting both the site's integrity and user trust should be a top priority."

polonus
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 34051
  • malware fighter
Re: False Positive: Site Blocked - HTML:Script-inf
« Reply #31 on: September 07, 2024, 08:48:52 PM »
And about it being hosted at 45.227.161.44 -> Key Findings:
Hosting Details:

IP Address: 45.227.161.44
Location: Argentina
Hosting Provider: Allytech S.A.
Server Software: Apache HTTP Server version 2.4.38
Vulnerabilities Identified:
The list reveals multiple CVEs (Common Vulnerabilities and Exposures) affecting various parts of the Apache HTTP Server. Some notable issues include:

CVE-2024-40898: SSRF vulnerability in Apache mod_rewrite allowing NTLM hash leakage.
CVE-2024-38476: Vulnerability leading to information disclosure or local script execution.
CVE-2023-45802: Memory exhaustion issue in HTTP/2 streams.
Numerous other vulnerabilities related to information leakage, request smuggling, and buffer overflows.
Open Ports:

Ports 21 (FTP), 25 (SMTP), 80 (HTTP), 443 (HTTPS), and 3306 (MariaDB) are open, indicating active services that could potentially be exploited.
Recommendations:
Immediate Updates:

Upgrade the Apache HTTP Server to the latest version, as many of the vulnerabilities listed have patches in higher versions. This is critical to protect against known exploits.
Harden Server Configuration:

Review the server and application configurations to minimise exposure to typical attack vectors, such as disabling unnecessary modules, configuring secure headers, and employing rate-limiting on inputs.
Firewall and Security Rules:

Implement strict firewall rules to allow access only from trusted IPs and block unnecessary ports from being accessible externally.
Regularly review the firewall rules and adjust as needed based on usage patterns.
Regular Security Scans:

Schedule frequent vulnerability scans using tools such as Nessus, OpenVAS, or Qualys to identify new vulnerabilities as they arise.
Monitoring and Log Analysis:

Set up monitoring for unusual server activity, which can be a sign of attempted exploitation or an active attack. Utilisation of intrusion detection/prevention systems (IDPS) can bolster monitoring efforts.
Backup and Recovery Plan:

Ensure regular backups of both the server configurations and website data. This makes recovery easier in case of a breach or data loss.
User and Access Management:

Review user access and permissions across all services. Ensure that only necessary accounts have administrative privileges, and employ SSH key authentication for server access.
SSL/TLS Configuration:

Ensure that the web server is configured to use secure protocols and cyphers to protect data in transit and consider implementing HSTS (HTTP Strict Transport Security) to enforce secure connections.
Educate Team Members:

Conduct training for team members about secure coding practices and awareness of phishing and social engineering attacks.
Engage Third-party Audits:

Consider periodic security audits from external consultants to provide an objective review of the security stance.
By taking a proactive approach to security based on your findings, the risk of exploitation can be markedly reduced, safeguarding both the server and the data it hosts.

polonus (AI-enhanced report).
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!