Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add Reputation KB entry #91

Merged
merged 5 commits into from
Oct 26, 2023
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
9 changes: 9 additions & 0 deletions MOBILE_CLIENT/COMMON/_HIGH/REPUTATION_SCAN/description.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
Reputation analysis for domain names and IP addresses scanned by multiple APIs and public databases.

Low reputation IPs and domain names may not have proper security measures in place, making your application vulnerable to security breaches and data leaks. These entities could be susceptible to hacking, phishing, and other cyberattacks, putting your users' data and privacy at risk.

Low reputation IPs and domain names may not be reliable in terms of uptime and availability. They could experience frequent downtime, slow response times, or even sudden shutdowns, causing disruptions to your application's functionality and user experience.

Some low reputation domains and IPs may infringe upon intellectual property rights, contain malicious content, or engage in unethical or illegal activities. Associating your application with such entities can lead to legal issues, reputational damage, and potential regulatory compliance problems.

If your application relies on low reputation domain names, it can negatively affect your search engine rankings. Search engines like Google consider the reputation and quality of the domains you link to. If you associate with low-quality domains, your application's visibility in search results may suffer.
12 changes: 12 additions & 0 deletions MOBILE_CLIENT/COMMON/_HIGH/REPUTATION_SCAN/meta.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
{
"risk_rating": "high",
"short_description": "Report for domain name and IP addresses reputation score using multiple scanning APIs and databases.",
"references": {
"UrlScan" : "https://urlscan.io/",
"AbuseIPDB" : "https://www.abuseipdb.com/",
"GoogleSaveBrowsing" : "https://safebrowsing.google.com/"
},
"title": "Domain name and IP address reputation report",
"privacy_issue": false,
"security_issue": true
}
11 changes: 11 additions & 0 deletions MOBILE_CLIENT/COMMON/_HIGH/REPUTATION_SCAN/recommendation.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,11 @@
If you discover that one of the domain names/IP addresses associated with your application has a bad reputation or is flagged as malicious, it's important to take action to address the issue and ensure the security and reliability of your application.
Actions you need to take will depend on the nature of the asset, your control over it, and the severity of the reputation issue.
Here are some recommendations on what to do in such a situation:

* Determine why the asset has a bad reputation score. It could be due to various factors, such as hosting malicious content, spam, or being associated with a history of cyberattacks. Investigate the specifics of the problem.

* Ensure that the reputation score is accurate and up-to-date. Sometimes, these scores can change over time due to legitimate reasons. Verify the source of the reputation score and try to understand the reasons behind it.

* Consider isolating it from your primary systems. You may want to temporarily disable or quarantine the asset to prevent further potential issues while you investigate.

* If the asset is associated with a service you control, take steps to patch and secure it. This might involve updating software, implementing stronger security measures, and ensuring it is not used for malicious purposes.
Loading