Avast flagging JPG files as phishing on my website

Avast is flagging several (but not all) JPG files as phishing. Website is hxtps://mybookcave.com. Seems to have started this morning. Why are those files flagged as phishing? They are book covers, nothing there that could make someone divulge confidential information. How do I get my website delisted?

https://sitecheck.sucuri.net/results/https/mybookcave.com
https://www.virustotal.com/gui/url/6758cbe2b61133bfc04597f20906c525eebac187172eec7ce40ae04a179ec49d/detection

You can report a suspected FP (File/Website) here: https://www.avast.com/false-positive-file-form.php

CMS configuration issues: User Enumeration
The first two user ID’s were tested to determine if user enumeration is possible.

ID User Login
1 0x0049 jordan
2 Rachel Ann Nunes rachel
It is recommended to rename the admin user account to reduce the chance of brute force attacks occurring. As this will reduce the chance of automated password attackers gaining access. However it is important to understand that if the author archives are enabled it is usually possible to enumerate all users within a WordPress installation.

Recommendations to improve website and website security, found through linting:
https://webhint.io/scanner/103802ac-5a0f-4b62-996d-168c5b4abf05

Wait for a final verdict of an avast team member as they are the only ones to come and unblock,
we are just volunteers with relative knowledge of 3rd party cold recon website security analysis and error-hunting.

See

Detected jQuery libraries to be retired:
jquery 1.11.1 Found in https://ajax.googleapis.com/ajax/libs/jquery/1.11.1/jquery.min.js
Vulnerability info:
Medium 2432 3rd party CORS request may execute CVE-2015-9251
Medium CVE-2015-9251 11974 parseHTML() executes scripts in event handlers
Low CVE-2019-11358 jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, …) because of Object.prototype pollution

I do not see the website being blocked by avast’s at the moment. :wink:

polonus (volunteer 3rd party cold recon website security analyzer and website error-hunter)

Thank you for those links. And for pointing out the user enumeration issue–I was not aware that this was even possible. I’ll be working on these as time permits.

Hello, my website is also having this same issue of muy clean site getting flagged all over the place for phishing by avast web shield. I have run multiple malware checks and wordfence cleanups and all looks ok.

The site is haciendaeltriangulo.com

Any suggestions? thank you.

First of all modify the link so it isn’t active (as I have in the quoted text) to avoid accidental exposure to a suspect site.

I don’t see anything about jpg files as the detection is on the domain, see attached image.

Avast Isn’t alone in detecting your site:
https://www.virustotal.com/gui/url/3a2a0cd8465de39c5fb6aea91b03a9a0d250acab6aeeef5d02f53498d056491a?nocache=1

Security issues reported here - https://en.internet.nl/site/haciendaeltriangulo.com/1826062/

Further issues - Webpage Security Score F
https://snyk.io/test/website-scanner/?test=221216_BiDcWT_DE&utm_medium=referral&utm_source=webpagetest&utm_campaign=website-scanner

Woah! Was not expecting all of that. Thanks for the help, I’ll start trying to fix all of those issues one by one :slight_smile:

You’re welcome.

When you have some progress you can use this:
Reporting a Possible False Positive File or Website - https://www.avast.com/false-positive-file-form.php.
You should get a response in a day or two.

As and Avast user, I can only point you in the right direction, to remove it only the Avast virus labs team can do that.

Still flagged by avast’s,
A word press security scan fails (time-out to target wp-includes), also see: https://sitecheck.sucuri.net/results/haciendaeltriangulo.com

Then there is this info on the IP address:
https://www.malwareurl.com/ns_listing.php?ip=51.254.238.160

Flu & Qack-bot infested, and with scam & spam abuse.

polonus (volunteer 3rd party cold recon website security analyst and website error-hunter)