Stay Tuned!

Subscribe to our newsletter to get our newest articles instantly!

Feature Security

Get in Touch with Security Vendors: Your Guide to Contacting VirusTotal and Beyond

Background

As we wrote this blog – Managing the Aftermath of a Web Phishing Attack: Strategies from Detection to Last Vendor False Positive Cleared (see the link below), we then created an extended blog dedicated to how to contact the security vendor for VirusTotal and Non-VirusTotal vendors. This list might grow, especially for the Non-VirusTotal list.

Dewapost Post

VirusTotal and other 85+ Security Vendors

VirusTotal only aggregates data from a variety of vendors. They produce no verdicts, so they can’t modify these results. They are not intended to be an authoritative reputation engine but rather provide intelligence and context to users so that the user can make the best decision. 1/60 and even 5/60 doesn’t automatically mean “Bad”, and 0/60 doesn’t always mean good. Each decision on whether something is malicious ultimately the responsibility of users or the security vendors who use the data to improve their services.

Below are the steps to take if you want to fix a false positive report. 

  1. If the false positive is for a File or a URL, try re-scanning first.
  2. If the false positive persists, please contact the vendor, providing a link to the Virustotal report. A list of vendor contacts can be found in the table below.
  3. If you do reach out to VirusTotal, we will tell you to contact the vendors, as we cannot modify any results of scans.
  4. VirusTotal caches some URL results. If vendors have confirmed removal, but a URL is still detecting, please reach out to us along with evidence that the vendor has removed their URL from the blacklist, as they may be able to speed up propagation.

Below is a list of vendor contacts that may help:




EngineContact
360[email protected]
Acronis[email protected]
ADMINUSLabs[email protected], [email protected], [email protected]
AegisLab[email protected]
Agnitum[email protected]
Ahnlab[email protected], [email protected]
Alibaba[email protected]
AlienVault[email protected]
AlphaMountain[email protected]
Alyac (Estsoft)[email protected]
Antivir[email protected], [email protected], [email protected]
Antiy[email protected]
Avast[email protected]
AVGhttp://www.avg.com/submit-sample http://www.avg.com/us-en/whitelist
Babable[email protected]
Baidu[email protected], [email protected]
BitDefender[email protected]
BforeAihttps://bfore.ai/support
Bkav[email protected], [email protected]
ByteHero[email protected]
Certegohttps://www.certego.net/en/contatti/
Chong Lua Dao[email protected]
ClamAVhttp://www.clamav.net/reports/fp
Clean-MX[email protected]
CMC[email protected]
CRDFhttps://threatcenter.crdf.fr/false_positive.html
CrowdStrike[email protected]
CyanSecurity[email protected]
Cybereason[email protected]
Cylance[email protected]
Cynet[email protected]
CyRadar[email protected]
DNS8[email protected]
DrWeb:[email protected]
eGambit (Tehtris)https://tehtris.com/egambit_fp.php [email protected]
Elastic[email protected] , https://discuss.elastic.co/t/submitting-false-positives/232322
Emsisoft[email protected] or [email protected] (false positives) https://www.emsisoft.com/en/support/contact/
Endgame[email protected]
ESEThttps://support.eset.com/kb141/?page=content&id=SOLN141
FireEye[email protected]
F-Prot[email protected]
F-Secure[email protected], [email protected]
Forcepoint (Websense)[email protected]
Fortinethttps://www.fortiguard.com/faq/classificationdispute http://www.fortinet.com/support/contact_support.html
GDatahttps://www.gdatasoftware.com/faq/consumer/submit-a-suspicious-file-app-or-url
Gridinsoft[email protected]
Hacksoft[email protected]
Hauri[email protected]
Heimdal[email protected]
Hoplite Industries[email protected]
Ikarus[email protected]
Invincea[email protected]
Jiangmin[email protected], [email protected]
K7[email protected], [email protected]
Kaspersky:[email protected]
Kingsoft (Cheetah)[email protected]
Lionichttps://www.lionic.com/reportfp/ [email protected]
Lumu[email protected]
Malbeacon[email protected]
Malwarebyteshttps://forums.malwarebytes.com/forum/122-false-positives/
Malwares.com (Saint Security)[email protected]
MAX (SaintSecurity)[email protected]
MaxSecure[email protected]
McAfee[email protected]
McAfee-GW[email protected]
Microsofthttps://www.microsoft.com/en-us/wdsi/filesubmission
Microworld[email protected]
NANOhttp://www.nanoav.ru/index.php?option=com_content&view=article&id=15&Itemid=83&lang=en [email protected]
Netcrafthttps://report.netcraft.com/report/mistake
Norman:[email protected], [email protected]
nProtect (Inca)[email protected]
Palo Alto[email protected]
Panda[email protected], [email protected]
Phishing Databasehttps://github.com/mitchellkrogza/Phishing.Database#please-remove-my-domain-from-this-list-
Qihoo360[email protected]
QuickHeal[email protected]
Quttera[email protected]
Risinghttp://mailcenter.rising.com.cn/filecheck_en/
Sangfor[email protected]
Safe Browsing (Google)https://safebrowsing.google.com/safebrowsing/report_error/?hl=en
Scumware.orghttps://www.scumware.org/removals.php
SecureAgehttps://www.secureaplus.com/features/antivirus/report-false-positive/
Seclookup[email protected]
Segasec[email protected]
Sentinel One[email protected]
Sophoshttps://support.sophos.com/ [email protected]
Spamhaushttps://www.spamhaus.org/dbl/removal/form/
Symantechttps://submit.symantec.com/false_positive/, [email protected]
Tencent[email protected]
TheHacker[email protected] , [email protected]
Trapmine[email protected]
TrendMicrohttps://www.trendmicro.com/en_us/about/legal/detection-reevaluation.html[email protected], [email protected]http://esupport.trendmicro.com/solution/en-us/1037634.aspx
Trustwave[email protected]
Trustlook[email protected]
VBA32:[email protected]
Viettel Threat Intelligence[email protected]
Vipre[email protected]

https://helpdesk.vipre.com/hc/en-us/requests/new
(We added this manually on 2023-04-02 )
VirIT[email protected]
VirusDie[email protected]
Webroothttps://www.webroot.com/us/en/business/support/vendor-dispute-contact-us
Xcitium Verdict Cloud (Comodo)[email protected]
Yomi[email protected]
Yandex[email protected]
Zillya[email protected]
ZoneAlarm[email protected]
Zoner[email protected]


Non-VirusTotal

Not all security vendors are listed on the VirusTotal, but the majority does – 85+ of them.

Here’s the Non-Virus Total

EngineContact
Cisco Talos Intelligencehttps://talosintelligence.com
Microsoft Defender SmartScreen (Microsoft Edge Browser)https://feedback.smartscreen.microsoft.com/feedback.aspx ***

Email: [email protected]

Note: *** VirusTotal has one from Microsoft, BUT this one is different, so we put it under non-VirusTotal.

If you know any security vendor not listed on the VirusTotal, please let us know via the contact us form or Dewachat.com, and we will put them on this list.

Credits

Dewacorp Support

About Author

You may also like

Feature Tech

A Complete Setup Guide for Contabo VPS Ubuntu 20.04 with preinstalled Webmin + LAMP

Background I haven’t touched the Linux server for ages and getting used to it with Cpanel or Parallel. However, as
Feature Security

How to Harden the Ubuntu Server in 2022

Background As I wrote the blog – A Complete Setup Guide for Contabo VPS Ubuntu 20.04 with preinstalled Webmin +