Question If the site contains malware, should frontline page be blocked

Please provide comments and solutions that are helpful to the author of this topic.
Status
Not open for further replies.

Moonhorse

Level 40
Thread author
Verified
Top Poster
Content Creator
Well-known
Forum Veteran
May 29, 2018
2,908
1
16,392
3,880
32
Finland
One of the games i play is runescape/oldschool runescape and its quite popular game in mmorpg genre. Typical to mmorpg games is that every game tends to have their own currency like runescape has gold as currency....this gold is sold on 3rd party sites /blackmarkets for real money so the game is used as in real life money maker for some people

things i have seen in runescape to happen
- doxxing/ ddos
- botting for levels / gold
- advertising malware sites/ gold / service selling sites
+ many more illegal stuff

Currently there is phishing campaing going on wich noone is talking about ( i mean the runescape community)
In game there are bots advertising this runescape private server that once existed but was closed by jagex ( owns runescape)
Not many people know that the server made comeback with new name, but these phishers are using servers old name for this phishing campaing

In game bots are advertising this game like this
1754897038338.png


and when you type ikov into google
Näyttökuva 2025-08-11 102421.png


The logo, texturing and the site itselfs looks like legit private server

but if you download the client you download malware that is somekind of infostealer?

This scam has been going for 4 months wich is kinda strange, i mean there is every world in runescape being spammed by this server and still there is many antivirus vendors that wont block the site

My question is that, should the ''frontline'' page always be blocked and described as malware if the site itself contains malware but isnt malicious otherwise?

frontpage: VirusTotal

ps. reported to sophos, trend micro and mcafee and only sophos blocked the frontpage yet
 
Last edited:
But should we be happy that most of engines probably detect that JAR file or should they block the frontline page aswell?

But im starting to think that antiviruses and browsers are bit late to detection of phishing/malware frontline sites and dns is kinda ahead of them like controld/nextdns are doing pretty well against them. Also what i see going throught phishing sites is that often bashed webroot is top of detecting these sites but its antimalware engine is worst there, whats their secret about being so good against malicious sites?
 
The jar file is not detected by several major AVs, including McAfee; could it be a false positive by B and K?

View attachment 290137
A key point is that the engines used on VirusTotal are often command-line versions, and sometimes companies specialize their engines for VirusTotal, potentially employing different heuristics or levels of aggressiveness compared to the desktop versions that home users have installed. This might mean desktop versions could include features like behavioral analysis, cloud-based detection, and personal firewalls that the VirusTotal engines might not utilize or rely on differently.
Potential detection rate differences, VirusTotal engines might sometimes have a lower malware detection rate compared to their full desktop product equivalents.
 
Potential detection rate differences, VirusTotal engines might sometimes have a lower malware detection rate compared to their full desktop product equivalents
and this applies to all contributing AV engines to VT, so this means those AVs which did not detect the jar file rely on behavioral analysis and have less efficient signatures than those which detected it, such as B and K.
 
and this applies to all contributing AV engines to VT, so this means those AVs which did not detect the jar file rely on behavioral analysis and have less efficient signatures than those which detected it, such as B and K.
That’s one file out of millions new malware pieces every day. They all have engines that detect them and engines that don’t.
 
That’s one file out of millions new malware pieces every day. They all have engines that detect them and engines that don’t.
Occasional situations, such as this file, contribute to malware tests for ranking AVs.
 
When you see that, it’s not Edge. It’s NextDNS. The warning from Edge appears because for NextDNS to redirect you, you have to install the root certificate.
I think @Parkinsond hasn't woken up yet on how to use NextDNS? :) Wake up, my friend Lol :D
 
  • Hundred Points
Reactions: Trident
Some of AVs provide VT with behavioral analysis while some other AVs do not?
Yes that is correct, some of the antivirus engines aggregated by VirusTotal incorporate behavioral analysis in their detection methodologies, while others primarily rely on signature-based detection or heuristics. While some individual antivirus engines do leverage behavioral analysis, the level and type of analysis can vary significantly between vendors and may not always mirror the full capabilities of their end-user products.
 
Yes that is correct, some of the antivirus engines aggregated by VirusTotal incorporate behavioral analysis in their detection methodologies, while others primarily rely on signature-based detection or heuristics. While some individual antivirus engines do leverage behavioral analysis, the level and type of analysis can vary significantly between vendors and may not always mirror the full capabilities of their end-user products.
That’s indicated on VirusTotal as well. Not sure why we have to cite and recite something that’s been clearly stated on VT for years.
 
Status
Not open for further replies.