How get out from the yandex and opera blacklists!

by Ruchira on February 19, 2012

About 2 months ago my blog was listed on yandex search engine and opera browsers infected site blacklist.  You can read the post about it here – https://www.ruchirablog.com/opera-and-yandex-reports-blog-phishing-site/

But Google and other blacklist databases were reporting this blog as clean.  As all of you think it raised big question about accuracy of yandex,opera blacklist because even Google listed it as clean and my through virus scans revealed nothing.

Black listing on opera was a big problem because visitors using opera as their web browser weren’t able to access my site.  Opera and yandex uses same company Sophos for virus analysis and that’s why they both were reporting the same thing.  basically yandex is using sophos and opera is using yandex blacklist database. So I turned up to yandex and was able to fix the problem within a week.

I know most of you web masters have the same problem and even today when I was going through pending comments I saw a comment asking how to get around this problem.

 

  • Register on Yandex Webmaster portal

At first I thought google is God of these things and yandex thing should be crap. But hey I was wrong. For me Yandex Webmaster portal provides more accurate information and great stats of my sites. Its located here http://webmaster.yandex.com you need to register and add your sites. Verification of sites is same as google and when you logged in, It will show your web sites health

 

 

So if your web site is infected it will show it. So actually if you find any viruses manually you can work on removing it and then ask  on the web interface to recheck the site. So after 2 or 3 days it will recheck and if the virus is gone your web site will be removed from blacklist.

But  In my case it reported a virus but even after going through some tough inspection I wasn’t able to find any infection on my files.

 

  • Email Yandex team and ask them

Yandex portal doesn’t report much details about the exact file which is infected. So I turned up to their support team to clear up this mess. This is their email address  support@search.yandex.com actually they turned up pretty quickly and provided all the details about the file and how to get through it and ask for recheck. They were very friendly and informative. If you email to google most of the time you wont receive a reply but yandex is too cool 🙂

I'm Ruchira Sahan and all posts on this blog are completely my thoughts and writings. I love DIY and Technology. So feel free to contact me for anything about this blog and don't forget to add a comment if this blog helped you! Thanks
Ruchira
View all posts by Ruchira

{ 3 comments… read them below or add one }

1 Ayesh February 20, 2012 at 6:03 AM

As your previous post about infected email, just wondering how Yandex sent you and email about phishing forgery before verifying your ownership of the site. I don’t believe Yandex will send emails to each and every infected site’s WHOIS records.
or probably ? (just kidding).

May be, it’s better to invest some time to find out the roots of the probably. May projecthoneypot or stopbadsoftware or such has some wrong reports about the site.

I have been hosting a proxy site, and recently got an email from Google Webamster central about a phoshing request – but it was a real problem. Proxy was open and they could access gmail, facebook, etc login pages through the proxy. Proxy can deal with https at the server but not between user and my proxy server. I couldn’t afford for a SSL cert crap.

Reply

2 Ruchira February 20, 2012 at 9:51 PM

yes it sent the email to whois address in case if you are wondering 🙂
I have had more than 5 proxies in the past, one of them had like 2500 visitors a day and hogging more than 100GB bandwidth a day. Never had that kind of problem. Sweet memories 😀

Reply

3 Ayesh February 21, 2012 at 4:16 AM

100GB bw per day!!!
Well, mine wasn’t that bloody bandwidth sucking 🙂 I could manage to stay between 10 – 20 BW per month.

Reply

Leave a Comment

Previous post:

Next post: