Jump to content

beta.bigpress.net


bigpress

Recommended Posts

 

 

We have users reporting that beta.bigpress.net is being reported as phishing.  Our website is

https://bigpress.net

 We are the owners of that domain. We use it to provide services to multiple newspapers.  For example it was reported to us that the message appears at

https://www.elidealgallego.com/

 which is one of our customers

 

 

image.png.60a851c1be6a641db2304d1c5785d7bb.png

Edited by TeMerc
Disabled link
Link to post
Share on other sites

  • Staff
1 hour ago, bigpress said:

 

 

We have users reporting that beta.bigpress.net is being reported as phishing.  Our website is

https://bigpress.net

 We are the owners of that domain. We use it to provide services to multiple newspapers.  For example it was reported to us that the message appears at

https://www.elidealgallego.com/

 which is one of our customers

 

 

image.png.60a851c1be6a641db2304d1c5785d7bb.png

Hello-

We do not show either the domain nor the IP which the domain resides on in our database, was this perhaps a Browser Guard block only?

Link to post
Share on other sites

11 minutes ago, TeMerc said:

Hello-

We do not show either the domain nor the IP which the domain resides on in our database, was this perhaps a Browser Guard block only?

Malwarebytes
www.malwarebytes.com

-Log Details-
Protection Event Date: 2/15/24
Protection Event Time: 1:35 PM
Log File: 7249d29e-cc39-11ee-bb1c-001a7dda7102.json

-Software Information-
Version: 4.6.8.311
Components Version: 1.0.2259
Update Package Version: 1.0.80979
License: Premium

-System Information-
OS: Windows 10 (Build 19045.4046)
CPU: x64
File System: NTFS
User: System

-Blocked Website Details-
Malicious Website: 1
, C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe, Blocked, -1, -1, 0.0.0, ,

-Website Data-
Category: Phishing
Domain: bigpress.net
IP Address: 46.183.115.164
Port: 443
Type: Outbound
File: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Malwarebytes
www.malwarebytes.com

-Log Details-
Protection Event Date: 2/15/24
Protection Event Time: 1:40 PM
Log File: 094bdc6e-cc3a-11ee-bb40-001a7dda7102.json

-Software Information-
Version: 4.6.8.311
Components Version: 1.0.2259
Update Package Version: 1.0.80979
License: Premium

-System Information-
OS: Windows 10 (Build 19045.4046)
CPU: x64
File System: NTFS
User: System

-Blocked Website Details-
Malicious Website: 1
, C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe, Blocked, -1, -1, 0.0.0, ,

-Website Data-
Category: Phishing
Domain: elidealgallego.cdn.bigpress.net
IP Address: 79.143.93.75
Port: 443
Type: Outbound
File: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

 

(end)

 

image.png.73192651c8c689d4187b23064b870c86.pngimage.png.ded6dbc91a53a2fb445d547ece68ec05.png

Edited by Porthos
  • Like 1
Link to post
Share on other sites

 

Sorry I am not very familiar with your product (it was reported by users and now we installed Malwarebytes to check) The message appears in both Firefox and Chrome. Probably that meas it's a Browser Guard block as you say.

 

The affected domain seems to be bigpress.net and all it's subdomains. We have multiple IPs and seems to affect all of them. Here is an screenshot of the detection history. 

 

image.thumb.png.c3e33f08c70cd4526793936202f35721.png

 

Link to post
Share on other sites

Sample for domain bigpress.net

 

 

Malwarebytes
www.malwarebytes.com

-Log Details-
Protection Event Date: 2/15/24
Protection Event Time: 8:48 PM
Log File: 2e700762-cc3b-11ee-ad6f-bc2411dc42e8.json

-Software Information-
Version: 4.6.8.311
Components Version: 1.0.2259
Update Package Version: 1.0.80977
License: Trial

-System Information-
OS: Windows 10 (Build 19045.3086)
CPU: x64
File System: NTFS
User: System

-Blocked Website Details-
Malicious Website: 1
, C:\Program Files\Google\Chrome\Application\chrome.exe, Blocked, -1, -1, 0.0.0, ,

-Website Data-
Category: Phishing
Domain: bigpress.net
IP Address: 46.183.115.164
Port: 443
Type: Outbound
File: C:\Program Files\Google\Chrome\Application\chrome.exe



(end)
 
Link to post
Share on other sites

 

 

Sample for one of the subdomains (we have many subdomains)

 

Malwarebytes
www.malwarebytes.com

-Log Details-
Protection Event Date: 2/15/24

Protection Event Time: 8:49 PM
Log File: 594f312e-cc3b-11ee-bbff-bc2411dc42e8.json

-Software Information-
Version: 4.6.8.311
Components Version: 1.0.2259
Update Package Version: 1.0.80977
License: Trial

-System Information-
OS: Windows 10 (Build 19045.3086)
CPU: x64
File System: NTFS
User: System

-Blocked Website Details-
Malicious Website: 1
, C:\Program Files\Google\Chrome\Application\chrome.exe, Blocked, -1, -1, 0.0.0, ,

-Website Data-
Category: Phishing

Domain: elidealgallego.cdn.bigpress.net
IP Address: 79.143.93.75
Port: 443
Type: Outbound
File: C:\Program Files\Google\Chrome\Application\chrome.exe



(end)
 
 
 
Link to post
Share on other sites

  • Staff
19 minutes ago, Porthos said:

Malwarebytes
www.malwarebytes.com

-Log Details-
Protection Event Date: 2/15/24
Protection Event Time: 1:35 PM
Log File: 7249d29e-cc39-11ee-bb1c-001a7dda7102.json

-Software Information-
Version: 4.6.8.311
Components Version: 1.0.2259
Update Package Version: 1.0.80979
License: Premium

-System Information-
OS: Windows 10 (Build 19045.4046)
CPU: x64
File System: NTFS
User: System

-Blocked Website Details-
Malicious Website: 1
, C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe, Blocked, -1, -1, 0.0.0, ,

-Website Data-
Category: Phishing
Domain: bigpress.net
IP Address: 46.183.115.164
Port: 443
Type: Outbound
File: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Malwarebytes
www.malwarebytes.com

-Log Details-
Protection Event Date: 2/15/24
Protection Event Time: 1:40 PM
Log File: 094bdc6e-cc3a-11ee-bb40-001a7dda7102.json

-Software Information-
Version: 4.6.8.311
Components Version: 1.0.2259
Update Package Version: 1.0.80979
License: Premium

-System Information-
OS: Windows 10 (Build 19045.4046)
CPU: x64
File System: NTFS
User: System

-Blocked Website Details-
Malicious Website: 1
, C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe, Blocked, -1, -1, 0.0.0, ,

-Website Data-
Category: Phishing
Domain: elidealgallego.cdn.bigpress.net
IP Address: 79.143.93.75
Port: 443
Type: Outbound
File: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

 

(end)

 

image.png.73192651c8c689d4187b23064b870c86.pngimage.png.ded6dbc91a53a2fb445d547ece68ec05.png

This looks to be the IPV6 bug detection and can be ignored.

Link to post
Share on other sites

I don't know what the IPv6 bug is but thought it could be related with IPv6 being dislabled in the domain.

So decided to create a subdomain with IPv6 enabled to check if it still gets detected. It does, https://ipv6.bigpress.net gets detected

The detection happens both with the extension installed (Browser Guard) and the Windows desktop application.

Malwarebytes
www.malwarebytes.com

-Log Details-
Protection Event Date: 2/16/24
Protection Event Time: 6:07 AM
Log File: 54bae5e2-cc89-11ee-8bcb-bc2411dc42e8.json

-Software Information-
Version: 4.6.8.311
Components Version: 1.0.2259

Update Package Version: 1.0.80993
License: Trial

-System Information-
OS: Windows 10 (Build 19045.3086)
CPU: x64
File System: NTFS
User: System

-Blocked Website Details-
Malicious Website: 1
, C:\Program Files\Google\Chrome\Application\chrome.exe, Blocked, -1, -1, 0.0.0, ,

-Website Data-
Category: Phishing

Domain: ipv6.bigpress.net
IP Address: 165.22.22.250
Port: 80
Type: Outbound
File: C:\Program Files\Google\Chrome\Application\chrome.exe



(end)

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.