-
Notifications
You must be signed in to change notification settings - Fork 0
Reported Misuse of GitHub-Hosted Files for Phishing Activities #30
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Can you explain HOW is that any fishing for the Interac braind?? rawgit2.com is not a fishing site, but a site that serves Github files with appropriate content type.
The whole domain is now disabled:
So now these semantic resources, and my home page and publications are inaccessible. PS: also emailed abusereply@cloudflare.com |
I believe there’s been a bit of confusion. I’m the operator of rawgit2.com, which I’ve recently shut down following an abuse report related to this repository. The report came from PhishLabs: https://www.phishlabs.com/. I’m not sure how this repo was being misused for phishing, but to be safe, I’ve taken the service offline. If you were relying on rawgit2.com, I strongly recommend setting up your own proxy using a simple Cloudflare Worker. It can cache and forward requests, giving you full control and security. In hindsight, rawgit2.com shouldn’t have been used for critical projects, since any proxy service like this could theoretically be used to manipulate payloads. For a more secure setup, please create your own Worker and restrict access to only the repositories you trust. |
@icodeforlove thanks for keeping rawgit2 running for all these years! Previously I used https://rawgit.com/, and I see it was shut down for a similar reason
I'll switch to some other way. It's a pity that the address of my home page and publications will change... |
I've disabled a service you were using as it was flagged in a recent abuse report.
While I’m not familiar with the specific GitHub repository, it appears it may have been misused for phishing based on the information provided by the reporter.
You'll need to update your implementation accordingly.
I recommend either hosting the files yourself or finding a reliable alternative. For reference, the affected usage can be found here:
https://github.com/search?q=repo%3Astatnett%2FTalk2PowerSystem%20rawgit2.com&type=code
The text was updated successfully, but these errors were encountered: