wxw.errorsmart.com You won`t know about it until it is already on your system.
Please ‘modify’ your post change the URL from http to hXXp or www to wXw, to break the link and avoid accidental exposure to suspect sites, thanks.
- Currently the on-line contact form, http://www.avast.com/contact-form.php?loadStyles doesn’t cater for reporting Undetected malicious/phishing sites only reporting FPs on sites.
Since avast doesn’t specifically have phishing sites on the VPS only malicious/infected sites, there isn’t a specific way to report them for inclusion in the VPS for Network Shield.
Also see http://forum.avast.com/index.php?topic=82635.0, extract below.
Reporting a phishing/malicious/hacked site not detected by the Network/Web Shield/s:
Essentially it is sending an email to virus (at) avast (dot) com (no attachment as there is no physical file) outlining the issue and giving the URL in the body of the email.
The email Subject is probably more crucial as I would say it still has to be called ‘Undetected Malware’ for it to be filtered within the receipt system for action. I would go further and include ‘Network Shield’ in the subject to further define the problem and possibly attract attention. So the subject would be something like “Undetected Malware - Network Shield - Phishing/Malicious site” (whichever is applicable), without the Quotes.
Hello,
thanks for info. It will be detected as PUP
Thanks for the prompt response Jan.
Hi jimmy06,
Thanks for reporting, WOT also does not like it: http://www.mywot.com/en/scorecard/errorsmart.com?utm_source=addon&utm_content=popup-donuts
and detections here: http://www.urlvoid.com/scan/errorsmart.com/ classifications: Malicious Domain Request 2 & Fraudulent software and website
See also: http://safeweb.norton.com/report/show?url=errorsmart.com and IDS here: http://urlquery.net/report.php?id=1043060
Good it is added as PUP detection…
polonus
hpHosts class it as FSA
[b]FSA[/b] - sites engaged in the selling or distribution of bogus or fraudulent applications This classification is assigned to site's being used for the distribution of "rogue" security or other such applications, for example: SpyFalcon, SpywareQuake, AdwareAlert etc.Note: This classification also covers sites involved in fraudulent activity.
First seen by VirusTotal
2011-11-12 02:21:58 UTC ( 1 år, 3 måneder ago )
Hi Pondus,
Also here: http://www.ipvoid.com/scan/75.125.241.58
With this as an important scan result, because it gives the infection name: http://www.malwaredomainlist.com/mdl.php?search=75.125.241.58
Infected with Rogue Winfixer: http://en.wikipedia.org/wiki/WinFixer
pol