possible to know what triggered malicious website classification on my website?

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

possible to know what triggered malicious website classification on my website?

L0 Member

I run a small website (www.milkywayidle.com) which is an online game ran directly in the browser. after a few recent updates around 2-3 weeks ago, I saw noticed that https://urlfiltering.paloaltonetworks.com/query/ classified my website as malicious. I requested reclassify and it quickly classified to "game". However around the same time many users complained about their ISP (Spectrum, Xfinity) security shield which is part of the router their ISP provided them also started classifying my website as malicious and blocked them from access. I'm able to contact them and it gets temporarily whitelisted, but every time I make an update (even tiny updates) to the website, it gets blocked again.

 

I looked at a lot of other website scanners/classifiers online and nothing else classified my website as malicious. I'm wondering if it's possible to learn what triggered the malicious content classification from PAN since it could be related to the ISP false positives as well. 

6 REPLIES 6

L6 Presenter

Maybe ask again why Palo Alto is doing this by using the webform for reclassify as they should send you email update.

 

From checking your site with the link below I see that your site is new and maybe this adds to Palo Alto and other systems monitoring for changes. Also your SSL cer is not organization verified just domain verified, so maybe increase the SSL security and it could get better clasification.

 

nikoolayy1_0-1679641440015.png

 

 

Also there is some data that you may like to hide as I see that you have a "Server" response header and this better be removed.

 

This is what I can tell as maybe other people have better ideas.

 

 

https://sitereport.netcraft.com/?url=https://www.milkywayidle.com

 

 

Also in AWS you can add also a WAF product before your site as maybe if Palo Alto sees some vunrablity maybe from the https://www.exploit-db.com/google-hacking-database it will not like it. You can scan your site with https://www.qualys.com/free-services/ as they have a free web scanner community edition that may give you some ideas.

 

 

 

It is interesting what bad category was your site added to as this may provide extra info.

 

 

 

 

Thanks for the suggestions. I will try some of these and see if it will help. I actually asked about it in the additional notes for reclassify, but all I got back is a generic response that it did get reclassified.

 

The main thing that is odd is that the site was fine for over half a year without any of these issues. The only significant change I made 2-3 weeks ago was combining all of my website SVG assets into a number of sprite files (which seems fairly benign in terms of security concerns). Nothing in terms of SSL or server responses were changed.

 

I added images for the classification results from before, but it doesn't give too much detail.

chezedude_1-1679642947154.png

 

 

chezedude_0-1679642895964.png

 

 

Strange your SSL cert says "Not valid before 21.02.2023", so for me this suggests it is a new ssl cert but you say that you did not renew it. Maybe it was autorenewed and this could have caused the issue.

I originally created the certificate sept 25 2021 on AWS certificate manager. I did not manually renew it, so I guess AWS did auto renew it.

 

Are you suggesting that there could be issues simply because the SSL cert is new? or that there may have been some problem with the renewed SSL itself?

Can't give 100% that this caused the issue but many ML engines will monitor such a thing when evaluating sites. Maybe the SSL change lowered the score then your file change may have lowered it even more.

 

Other than that if you have a licensed palo alto firewall you can ask a user to access your site and have a security rule for that user by matching source user or ip address and see if the palo alto wildfire/antivirus/vunrability profiles will block you when accessing the modified files as they may trigger a bad false positive signature and then you may submit to https://live.paloaltonetworks.com/t5/virustotal/bd-p/VirusTotal_Discussions the false positive. If a user was blocked by the security profiles and the palo alto firewall was providing telemetry to the Palo Alto cloud , this could explain why palo alto marked the website as "Malware" that suggests that the modified files triggered antivirus or wildfire protections for files. Also configure the Palo Alto antivirus and wildfire profiles to scan your sprite file types (https://docs.paloaltonetworks.com/wildfire/10-2/wildfire-admin/wildfire-overview/wildfire-file-type-... ). Palo Alto may have already fixed this with the latest content updates for antivirus signatures, so keep that in mind.

 

 

That is what I can provide you as input for this issue.

L0 Member

I had similar problems when I used unverified online gambling sites. However, everything changed after I read this review https://topcasinosreviews.in/minimum-deposit-casinos/ about an online casino that offers excellent terms of use. I liked that on this gaming platform you can start with a minimum deposit, and this significantly reduces the risk of losing a large amount of personal funds. I believe that the immersive experience and evolving technology make it more than just a pastime; it is a modern form of entertainment.

  • 3455 Views
  • 6 replies
  • 1 Likes
  • 101 Subscriptions
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!