The Definitive Resource List to Fix False Positive Virus Malware Scans

Meet Virus Total which has supplied me with these resources
to get your website unflagged from a malware attack.

got attacked by malware

If your website is flagged with malware and you believe it’s a “false positive” then the information below will help you get your site unflagged.

VirusTotal is a malware scanning service aggregator that only aggregates data from a variety of vendors. One of our clients uses VirusTotal to monitor his website.

Below are the steps to take if you think you have a false positive report.

  1. If the false positive is for a File or a URL try re-scanning first. Domain reports by definition don’t produce verdicts, just show relationships and no historic data from there will be removed.
  2. If the false positive persists please reach out to the vendor that is producing it and provide a link to the Virustotal report where your domain was flagged. List of vendor contacts can be found at the table below.
  3. VirusTotal says that it will cache some URL results. If vendors have confirmed removal but a URL is still detecting, please reach out to them along with evidence that the vendor has removed your URL from the blacklist, and they may be able to speed up propagation of clearing your website.

Below is a list of vendor contacts that may help:

ENGINE Contact
360 [email protected]
AegisLab [email protected]
Agnitum [email protected]
Ahnlab [email protected], [email protected]
Alibaba [email protected]
Alyac (Estsoft) [email protected]
Antivir [email protected], [email protected], [email protected]
Antiy [email protected]
Avast [email protected]
AVG http://www.avg.com/submit-sample

http://www.avg.com/us-en/whitelist

Babable [email protected]
Baidu [email protected], [email protected]
BitDefender [email protected]
Bkav [email protected], [email protected]
ByteHero [email protected]
Certego https://www.certego.net/en/contatti/
ClamAV http://www.clamav.net/reports/fp
Clean-MX [email protected]
CMC [email protected], [email protected]
Comodo [email protected]
CrowdStrike [email protected]
Cybereason [email protected]
Cylance [email protected]
CyRadar [email protected]
DNS8 [email protected]
DrWeb: [email protected]
eGambit (Tehtris) https://tehtris.com/egambit_fp.php

[email protected]

Emsisoft [email protected] or [email protected] (false positives)

https://www.emsisoft.com/en/support/contact/

Endgame [email protected]
ESET https://support.eset.com/kb141/?page=content&id=SOLN141
F-Prot [email protected]
F-Secure [email protected], [email protected]
Forcepoint (websense) [email protected]
Fortinet [email protected]
GData https://www.gdatasoftware.com/faq/consumer/submit-a-suspicious-file-app-or-url
Hacksoft [email protected]
Hauri [email protected]
Ikarus [email protected], [email protected]
Invincea [email protected]
Jiangmin [email protected], [email protected]
K7 [email protected], [email protected]
Kaspersky: [email protected]
Kingsoft (Cheetah) [email protected]
MAX (SaintSecurity) [email protected]
MaxSecure [email protected]
McAfee [email protected]
McAfee-GW [email protected]
Microsoft [email protected]
Microworld [email protected]
NANO http://www.nanoav.ru/index.php?option=com_content&view=article&id=15&Itemid=83&lang=en

[email protected]

Norman: [email protected], [email protected]
nProtect (Inca) [email protected]
Palo Alto [email protected]
Panda [email protected], [email protected]
Phising Database https://github.com/mitchellkrogza/Phishing.Database#please-remove-my-domain-from-this-list-
Rising http://mailcenter.rising.com.cn/filecheck_en/
QuickHeal [email protected]
Sangfor [email protected]
Sentinel One [email protected]
Sophos: [email protected]
Symantec https://submit.symantec.com/false_positive/, [email protected]
Tencent [email protected]
TheHacker

 

Trapmine

[email protected], [email protected]

 

[email protected]

TrendMicro ·

https://www.trendmicro.com/en_us/about/legal/detection-reevaluation.html

·        [email protected], [email protected]

·        http://esupport.trendmicro.com/solution/en-us/1037634.aspx

Webroot https://www.webroot.com/us/en/business/support/vendor-dispute-contact-us
Trustwave [email protected]
VBA32: [email protected]
VirusDie [email protected]
Yomi [email protected]
Yandex [email protected]
Zillya [email protected]
ZoneAlarm [email protected]
Zoner [email protected]

 

Top Featured Posts

Don’t miss out!
Sign up for our newsletter:

Loading

Tell us about your marketing challenges. We’ll be in touch soon to see if we can help.