Jump to content

Website False Positive


Dave_R

Recommended Posts

  • Root Admin

I will submit a request for review to our Browser Guard team

 

https://sitecheck.sucuri.net/results/conversiobot.com

Outdated Software Detected
PHP under 7.4.6

 

Comodo Valkyrie Verdict

https://www.virustotal.com/gui/url/d952845b910d4ad72d8475a6d71e5cfbfaa8a523a0e1264cbd84070355734386/detection

 

Thanks

 

Link to post
Share on other sites

On 9/28/2020 at 10:13 AM, Dave_R said:

Please can I check in on this?

All the vendors we were successfully able to contact have confirmed it was a false positive. We've done detailed scans at our end and can confirm there's no malware.

Would really appreciate your assistance.

Hello,

Sorry for the delay, the block will be removed in the next database update.

Thanks for your help

Link to post
Share on other sites

  • 1 month later...

I'm Confused. I note on this forum the discussions regarding app.conversiobot.com dates back to August. Subsequent posts from Malwarebytes Staff/Admins say the issue has been addressed and fixed. I think not!

Before today, November 17, I'd never heard of conversiobot. Just today I received a half dozen notifications from Malwarebytes stating a website had been blocked due to conversiobot. (The blocks occurred when I was off the computer and fast asleep.) 

Can someone kindly explain?

Link to post
Share on other sites

Only one thing in History and it's not conversiobot. Whatever Windows notifications I saw must have been a fluke. If it happens again I'll make sure to screenshot it and will post here.

Malwarebytes
www.malwarebytes.com

-Log Details-
Protection Event Date: 11/1/20
Protection Event Time: 11:35 PM
Log File: f84124b1-1cdd-11eb-b0ad-8cec4b6933bd.json

-Software Information-
Version: 4.2.1.89
Components Version: 1.0.1070
Update Package Version: 1.0.32362
License: Premium

-System Information-
OS: Windows 10 (Build 19041.610)
CPU: x64
File System: NTFS
User: System

-Exploit Details-
File: 0
(No malicious items detected)

Exploit: 1
Malware.Exploit.Agent.Generic, , Blocked, 0, 392684, 0.0.0, , 

-Exploit Data-
Affected Application: Microsoft Office Word
Protection Layer: Application Behavior Protection
Protection Technique: Exploit payload macro process blocked
File Name: 
URL: 

(end)

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.