Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

False Positive | campus.ceoearagon.es #1030

Closed
sebastianciocarlan opened this issue Jan 16, 2025 · 12 comments · Fixed by Phishing-Database/phishing#742
Closed

False Positive | campus.ceoearagon.es #1030

sebastianciocarlan opened this issue Jan 16, 2025 · 12 comments · Fixed by Phishing-Database/phishing#742
Labels
wontfix This will not be worked on

Comments

@sebastianciocarlan
Copy link

What are the subjects of the false-positive (domains, URLs, or IPs)?

  • campus.ceoearagon.es

Why do you believe this is a false-positive?

This is a false positive, it's a moodle my team is developing. Im guessing that since the site changed versions and server it might has been registered as a false positive.

How did you discover this false-positive(s)?

VirusTotal

Where did you find this false-positive if not listed above?

I discovered this false-positive when a student told me that his antivirus was blocking the site, then checked it on VirusTotal

Have you requested a review from other sources?

No, i didnt request any review from other sources. I only used Virus Total on the site and discovered that no one else is registering the site as a phishing, just Phishing Database.

Do you have a screenshot?

Screenshot

Additional Information or Context

I have also noticed that...

@phishing-database-bot
Copy link
Member

Verification Required

@sebastianciocarlan, thank you for submitting a false positive report! To help us verify your ownership of the affected domain(s), please complete the following steps:

  1. Set a DNS TXT record for the domain(s) listed in this issue with the following details:

    • Record Name: _phishingdb
    • Record Value: antiphish-6d5b3af0ed19543842051b74ae17df376192e640

    Your Verification ID: antiphish-6d5b3af0ed19543842051b74ae17df376192e640

  2. Wait for DNS propagation (this may take a few minutes to a few hours).

  3. Reply to this issue once the TXT record has been set.

Important Notes

  • Verification does not guarantee whitelisting. The Phishing.Database team will review your report after verifying ownership, but the decision to whitelist depends on further investigation and analysis.
  • If the record cannot be set or you need alternative methods of verification, please contact us at [email protected] - preferably from the domain's official email address.

How to Check the TXT Record ?

You can verify that the TXT record is properly set using:

Thank you for your cooperation! We will address your issue as soon as possible after verification.

The Phishing.Database Project Team.

@sebastianciocarlan
Copy link
Author

Should be done as soon as the DNS propagate

@sebastianciocarlan
Copy link
Author

Any update on this? The TXT should be ready

@sebastianciocarlan
Copy link
Author

sebastianciocarlan commented Jan 24, 2025

Hi guys, sorry to be a nuisance but im still having students that cant enter the campus, could you pls remove us from the list? Also, could you check why did the subdomain got marked as a false positive?

Thanks in advance

@spirillen
Copy link
Contributor

ptcheck ceoearagon.es antiphish-6d5b3af0ed19543842051b74ae17df376192e640
The test value matches the DNS TXT record.

Thanks for using my tools.
Please consider a sponsor ship at https://www.mypdns.org/donate

@spirillen spirillen added the wontfix This will not be worked on label Feb 2, 2025
@spirillen
Copy link
Contributor

Maybe because you do hosts phishing and Spyware content...

https://campus.ceoearagon.es/alibaba/alibaba/login.alibaba.com/index.htm

Image

We need access to a public site, we can not support intranet sites.

@github-project-automation github-project-automation bot moved this from 🆕 New to ✅ Done in Phishing Database Backlog Feb 2, 2025
@sebastianciocarlan
Copy link
Author

That doesn't really check out on my end.

Image

These are all the logs I have from anyone trying to access anything remotely related to alibaba

Image

And this is what is currently showing the link you posted. Am i suppoused to need certain GET token to access that page?

Nothing in my webserver looks suspicious.

@sebastianciocarlan
Copy link
Author

We actually moved servers and started fresh 3 weeks ago. That might be old? I dont know the foster server hoster or so.

Also the server that is currently hosting the campus is hosting several other campuses and neither are blacklisted by your service.

I'd like to throw some light on this, Cheers.

@spirillen
Copy link
Contributor

I'd like to throw some light on this, Cheers.

I understand your perspective, but access is restricted to members of the walled garden's intranet. I am committed to human rights, democracy, and free speech - values that this "educational" center does not seem to uphold. Additionally, as I've mentioned to others, we only provide support for publicly available domains, not intranet sites.

@g0d33p3rsec
Copy link

https://campus.ceoearagon.es/alibaba/alibaba/login.alibaba.com/index.htm

I get a 404 for that URL. https://urlscan.io/result/8a4c1c2b-03a3-41ff-b9eb-44cf2a793da7/

we only provide support for publicly available domains, not intranet sites.

I can successfully scan the reported domain with urlscan https://urlscan.io/result/3ed856e9-0660-42c8-b73f-0277090b81cf/

Screenshot, click to expand.

Image

Other than the previously mentioned link, which was in our dataset, I am unable to find any other negative threat intelligence for this domain.

im still having students that cant enter the campus

While it does seem that this domain was once host to malicious content, that issue appears to have been resolved. Give me a few minutes and I'll add the domain to the falsepositive list.

@g0d33p3rsec
Copy link

g0d33p3rsec commented Feb 3, 2025

@spirillen I noticed you closed this report and added the wontfix label after I staged Phishing-Database/phishing#742

I don't want to step on your toes, but personally am okay with adding this to the falsepositive list. We are the only outlier that is flagging this domain on VirusTotal and I only see the single link which seems to have since been resolved.

@spirillen
Copy link
Contributor

Hi @g0d33p3rsec, I appreciate your enthusiasm for committing that PR and exploring domains that interest you. However, I believe it's important for us and the requestor to recognize that we shouldn't expect "support" for non-public domains. By choosing to limit access to those domains, they have made a decision that impacts our ability to assist.

If we, as supporters, can't access a domain, it becomes challenging for us to verify, scan, or address any issues related to it. If you or anyone else chooses to navigate around these restrictions, that's entirely your decision, and I respect that. However, I feel that no one should be compelled to compromise their principles or rights in order to work on an issue.

That's why I tend to close down these Cloudflare-censored "meta sheep farms" quickly; they have created their own limitations by restricting access and, in doing so, have shown a lack of support for democratic values. It's disappointing when entities prioritize their own interests over the collaborative spirit we value. Thank you for understanding my perspective!

They locked us out, not the other way around. Therefore, I won't waste much time on those issues since they excluded me.

If you can't uncover any deceitful actions, then please trust your heart, mind, and conscience.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
wontfix This will not be worked on
Projects
Status: ✅ Done
Development

Successfully merging a pull request may close this issue.

6 participants