Avast mobile warning my Website as infected

Hi !

I just found that my Website when accessed via WhatsApp interface shows an Awast pop up as “Malware Detected !”.

I scanned the website and found that a link was probably causing the problem. It has been removed.

Now http://www.web-malware-removal.com/ and https://quttera.com/ and https://sitecheck.sucuri.net/

show the Website as clean.

The site in question is strokesupportdotin

Please advise how can this warning be removed ? Also in the future how can I be immediately advised if any of my sites are so flagged by Avast ?

Thanks much

I wouldn’t say there is nothing wrong with strokesupport.in

Classed as a Medium Security Risk at - https://sitecheck.sucuri.net/results/strokesupport.in
Some software out of date - Update jQuery to version 3.6.0 - https://awesometechstack.com/analysis/website/strokesupport.in/?protocol=https%3A
Some points here, notably Security points - https://webhint.io/scanner/1c24c43d-0de2-4c12-8f81-7d353bb46c24

These may or may not be the reason (probably not) but they should be addresses as they could lead to exploit.

I’m not entirely sure if this include sites detected on the mobile Reporting Possible False Positive File or Website - https://www.avast.com/false-positive-file-form.php.

Thanks much for your reply and analysis @David . As I am not a programmer I am hesitant to mess up with anything unless absolutely necessary. For example I won’t know wheher I can update Jquery and if so how - I am using standard wordpress install and plugins.

Which one of these would lead to Avast declaring my site as infected so that I may focus on those ?

Have sent request to Avast in the form link provided. Let us see.

I think Avast should have a system of advising site owners the moment their software detects a website as infected so that the site owners can take actions.

Hi applym3,

There is one major issue with your Word Press website, you should look in a.s.a.p.
Directory Indexing
In the test an attempt was made to list the directory contents of the uploads and plugins folders to determine if Directory Indexing is enabled. This is a common information leakage vulnerability that can reveal sensitive information regarding your site configuration or content.

Path Tested Status
/wp-content/uploads/ enabled
/wp-content/plugins/ disabled
Directory indexing is tested on the /wp-content/uploads/ and /wp-content/plugins/ directores. Note that other directories may have this web server feature enabled, so ensure you check other folders in your installation. It is good practice to ensure directory indexing is disabled for your full WordPress installation either through the web server configuration or .htaccess.

Also check WordPress Plugins
The following plugins were detected by reading the HTML source of the WordPress sites front page.

Plugin Update Status About
wptelegram-widget Unknown latest release (2.1.2)
https://t.me/
ml-slider Unknown latest release (3.20.3)
https://www.metaslider.com
newsletter Unknown latest release (7.2.0)
https://www.thenewsletterplugin.com/plugins/newsletter
business-directory-plugin Unknown latest release (5.12.2)
https://businessdirectoryplugin.com
wp-whatsapp Unknown latest release (3.1.1)
https://ninjateam.org/wordpress-whatsapp-chat
simple-banner Unknown latest release (2.10.2)
https://github.com/rpetersen29/simple-banner
weaver-for-bbpress Unknown latest release (1.4)
https://weavertheme.com/weaver-for-bbpress/
ocean-extra Unknown latest release (1.7.7)
https://oceanwp.org/extension/ocean-extra/
tablepress Unknown latest release (1.13)
https://tablepress.org/
wordpress-seo 16.6 Current latest release (16.6)
https://yoa.st/1uj
user-submitted-posts Unknown latest release (20210212)
https://perishablepress.com/user-submitted-posts/
Plugins are a source of many security vulnerabilities within WordPress installations, always keep them updated to the latest version available and check the developers plugin page for information about security related updates and fixes.

There are likely more plugins installed than those listed here as the detection method used here is passive. While these results give an indication of the status of plugin updates, a more comprehensive assessment should be undertaken by brute forcing the plugin paths using a dedicated tool.

polonus (volunteer 3rd party cold recon website security analyst and website error-hunter)

  1. I would suggest that you talk to your website Host for advice on updating your software. For me maintaining your site is absolutely necessary to protect your visitors.

  2. As I said I don’t know if they would directly cause avast to alert.

  3. You should be contacted by avast in a day or two.

  4. I don’t think that that is ever going to happen for many reasons.
    a. The shear number of web sites in the whole of the internet is enormous.
    b. The cost of this function would be large and as a business where would they recover that.
    c. Where they find the contact details of every site unless this was offered as a paying service.
    d. I don’t know of any other Antivirus Software company doing this, if it were possible and everyone did it you would get multiple contacts by several AV companies.