A malware has been detected - Action Required (false positive)

ITHKBO

Active Member
Jun 23, 2020
41
39
18
Netherlands
cPanel Access Level
Root Administrator
We received an automated alert from ImunifyAV through cPanel that one of our customer sites had potentional malware.
It did not specify what it found only that the mainpage was infected and doing a manual scan from ImunifyAV also showed the site as clean on the same day. We checked our resources at Sucuri and no scan came up with any false positives or potential threats. Modsec also did not show any strange records and Wordfence on the site itself did not show any discrepancies.

I than after the audit send a ticket to Cloudlinux to inform them of this false positive and a question why this trigger happened. They made a internal case (id: DEFA-5624) and now there support is asking us to contact Cpanel why this was send from ImunifyAV.

I find it very odd that Cloudlinux is not able to tell why there own program triggered this mail response or simply contact you guys directly but here I am on behest of CloudLinux why the following mail was send even though nothing was found as suspicious in the dashboard. Is there anything cPanel can check with regards to these kind of messages or is there some action log we ourselves can check? It is not shown in the ImunifyAV back-end of WHM as far as we can tell.
I can naturally provide the original not censored mail if needed.

From: cPanel on *****
<__cpanel__service__auth__icontact__xyonkhf9mmucaguh@ ***** >
Sent: Tuesday, 14 February 2023 04:17
To: ***** @ *****
Subject: [ ***** l] A malware has been detected - Action Required: *****



Dear Administrator,
We want to make sure that you are aware of any security threat that your server is exposed to.
With this message we are letting you know that a malware was found on your server(s):
* ***** [.]nl
o Location: hXXp:// ***** [.]nl/ (main page of the website)
Leaving malware files untreated puts your entire environment at risk and creates significant
security threats.
We urge you to take action immediately.
* Option 1: Please make sure that server administrator(s) take appropriate actions to remove
malware as soon as possible to mitigate security risks.
* Option 2: Upgrade from ImunifyAV to Imunify360. With the use of comprehensive security
features, such as real-time malware protection and Malware Database Scanner (MDS) the
server-wide risk that malware infections create will be mitigated in a fully automated way.
Should you have any questions, please reach out to our support team.
Faithfully,
Your Imunify360 Security Team
Manage subscriptions
The system generated this notice on Tuesday, February 14, 2023 at 3:17:20 AM UTC.
“Imunify::Generic” notifications are currently configured to have an importance of “High”. You
can change the importance or disable this type of notification in WHM’s Contact Manager at:
https:// ***** :2087/scripts2/editcontact?event=Application
Do not reply to this automated message.

Copyright© 2023 cPanel, L.L.C.
 
Last edited by a moderator:

ITHKBO

Active Member
Jun 23, 2020
41
39
18
Netherlands
cPanel Access Level
Root Administrator
If you have access to CloudLinux zendesk sure.

cPanel ticket has been closed without our approval by Cloudlinux because they wanted to continue in there own ticket.
Even though it was them that requested us to contact cPanel in the first place.
cpanel ID #94534741

Communication from CloudLinux is a mess (not to any fault of cPanel) if all is going well (and I have no idea) there should be communication with cPanel technicians and CloudLinux

If you can't access the supportcase at their zendesk and want it I can send you a digest in a private message
But there is not much cPanel can do as far as I see it.
 

ITHKBO

Active Member
Jun 23, 2020
41
39
18
Netherlands
cPanel Access Level
Root Administrator
They have not confirmed anything yet besides that they cannot at present find anything wrong with the domain that gave the result.
They wanted to do more research which is fine. Iam at this stage not involved its something between cPanel and Cloudlinux I am monitoring the ticket for any input they need from my side but at this time besides initialy informing cPanel on there behest no requests have been made.

If there is any news I will update you in this thread.
 
  • Like
Reactions: cPRex

ITHKBO

Active Member
Jun 23, 2020
41
39
18
Netherlands
cPanel Access Level
Root Administrator
Got an update from CloudLinux,

The exact cause of the original message is unknown. They however suspect interference with clamd service which caused the GUI to not show any results.
They also checked some other notifications we did not ask for that was 11 days later not related to the case.

There suggestion is for us to stop clamd service and any other Antimalware solutions which is something we are not willing to do.
I have asked for instructions how to disable, remove ImunifyAV from cPanel.
Iam sure they have a lovely product that they want to sell but I am not willing to throw our entire antispam, firewall and exploit detection framework out the window.

This can be considered resolved.
Thank you for your attention cPRex on this matter.
 
Last edited: