Hi team, I usually don’t post what appears on the antivirus, but know I’m curiouss, can you explain me?
I get a constant attack from l1s.strn-test.pl what does exactly this mean? that somebody is trying to hit my ports?
But I’m using a VPN, how they know my adress?
is there a way to stop them?
this is the ID of the attack 6df891ec2d10/2023-03-21T19:49:28.127Z
jquery 1.11.0 Found in htxps://www.clarodrive.com/js/jquery.min.js _____Vulnerability info:
Medium 2432 3rd party CORS request may execute CVE-2015-9251
Medium CVE-2015-9251 11974 parseHTML() executes scripts in event handlers
Medium CVE-2019-11358 jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, …) because of Object.prototype pollution
Medium CVE-2020-11022 Regex in its jQuery.htmlPrefilter sometimes may introduce XSS
Medium CVE-2020-11023 Regex in its jQuery.htmlPrefilter sometimes may introduce XSS
Stay safe and secure both online and offline, pozdrawiam,
’
polonus (volunteer 3rd party cold reconnaissance website security analyst and website error-hunter)
A VPN doesn’t specifically protect from malware, it might hide your location, from the recipient. But when your computer connects to a site (VPN connection or otherwise) it has to be able to send back to the originating IP or you wouldn’t be able to browse the internet.
So if the connection originates from your system then the return comes back to your system and Avast would alert if it considers it malicious. That is why we are asking for a screenshot of the alert.
The alleged Filecoin phishing site does not resolve now anymore,
so was only short-lived.
Being behind a VPN or not; it is now “water under the bridge”.
Nothing to do with the security of Filecoin (on strn.network)
It is vulnerability probably through lousy Java code implementation,
and then as DavidR correctly states a VPN will not protect
the end-user against such scam and phishing,