How does built-in Phishing and Malware Protection work?

Firefox Firefox Igcine ukuvuselelwa: 68% of users voted this helpful
Akekho umuntu osesize ukuhumusha le athikhili okwamanje. Uma usuvele sewazi ukuthi kusebenza kanjani ukuhunyushwa kwe-SUMO, qala ukuhumusha manje. Uma usafuna ukufunda ukuthi ahunyushwa kanjani ama-athikhili e-SUMO, uyacelwa uqale lapha.

Firefox contains built-in Phishing and Malware Protection to help keep you safe online. These features will warn you when a page you visit has been reported as a deceptive site (sometimes called “phishing” pages), as a source of unwanted software or as an attack site designed to harm your computer. This feature also warns you if you download files that are detected as malware.

What are deceptive/phishing sites, attack sites, malware and unwanted software?

Deceptive site (also known as “phishing”)

This is a form of identity theft that occurs when a malicious website impersonates a legitimate one in order to trick you into giving up sensitive information such as passwords, account details or credit card numbers. Phishing attacks usually come from email messages that attempt to lure the recipient into updating their personal information on fake but very real-looking websites. More information on phishing can be found at the Anti-Phishing Working Group, and there are a number of examples and resources available at Wikipedia's Phishing page.

How to report a deceptive site

To report a deceptive website you are currently visiting, click the Firefox menu button Fx89menuButton, click the Help menu and then select Report deceptive site…

Attack sites

Attack sites are websites that try to infect your computer with malware when you visit. These attacks can be very difficult to detect; even a site that looks safe may be secretly trying to attack you. Sometimes even the website’s owner doesn’t realize that the site has become an attack site.

Malware

Malware (short for “Malicious software”) is software designed to infect your computer without your knowledge. Malware is most often used to steal personal information, send junk email (spam), or spread more malware.

Unwanted software

Unwanted software sites are websites that try to trick you into installing programs that harm your browsing experience (for example, by changing your homepage or showing extra ads on sites you visit). You can learn more about such software on the Google Unwanted Software Policy.

How does Phishing and Malware Protection work in Firefox?

Phishing and Malware Protection works by checking the sites that you visit against lists of reported phishing, unwanted software and malware sites. These lists are automatically downloaded and updated every 30 minutes or so when the Phishing and Malware Protection features are enabled.

When you download an application file, Firefox checks the site hosting it against a list of sites known to contain “malware”. If the site is found on that list, Firefox blocks the file immediately, otherwise it asks Google’s Safe Browsing service if the software is safe by sending it some of the download’s metadata.*

* Windows users: This online check will only be performed in Firefox on Windows for those downloaded files that don’t have a known good publisher. Most of the common and safe software for Windows is signed, and so this final check won’t always need to happen.

How do I use the Phishing and Malware Protection features?

These features are turned on by default so, unless your security settings have been changed, you are likely already using them. Phishing and Malware Protection settings can be found on the Privacy & Security panel:

  1. In the Menu bar at the top of the screen, click Firefox and then select Preferences or Settings, depending on your macOS version.Click the menu button Fx89menuButton and select Settings.
  2. Click the Privacy & Security panel.
  3. In the Security section, put a check mark next to the following settings to activate them:
    • Block dangerous and deceptive content: Check this box if you want Firefox to block potential malware or content that can trick you into downloading malware or unintentionally entering information. You can also refine your choices by checking or unchecking the following items:
      • Block dangerous downloads: Blocks potential viruses and other malware.
      • Warn you about unwanted and uncommon software: Lets you know if you're about to download potentially unwanted software or uncommon software that may contain a virus or make unexpected changes to your computer.
    Fx89Security-DeceptiveContent
  4. Close the Settings page. Any changes you've made will automatically be saved.

To turn these features off, follow the preceding steps to return to the Privacy & Security panel and remove the check marks.

To see if Phishing Protection is active, visit our phishing test site. Likewise, you can visit our malware test site to confirm that Firefox is blocking Attack Sites as well as our unwanted software test site. With Phishing and Malware Protection turned on, all these sites should be blocked from loading.

What happens when a page is blocked?

Firefox will block the page from loading and display a Deceptive Site warning for phishing sites, Reported Unwanted Software Page for unwanted software sites and Reported Attack Page for malware sites.

What happens when you download a file identified as unsafe?

If you download a file identified as malware or other software that is potentially unwanted or uncommon, the downloaded file will remain under a temporary name in the Downloads folder and Firefox will display a message about the file in the Downloads panel.

Fx121-MaliciousFileInDownloadsPanel.png

You can click the item in the Downloads panel to see more details about it, then choose Remove file to delete the downloaded file, or select Allow download to ignore the warning and rename the temporary file to its final name. (You can also right-click the item it in the Downloads panel and select Allow download.)

Fx121-MaliciousFileInDownloadsPanel-Details.png
For more information about unsafe download warnings in Firefox, see Where to find and manage downloaded files in Firefox.

What information is sent to Mozilla or its partners when Phishing and Malware Protection is enabled?

There are two times when Firefox will communicate with Mozilla’s partners while using Phishing and Malware Protection for sites. The first is during the regular updates to the lists of reporting phishing and malware sites. No information about you or the sites you visit is communicated during list updates. The second is in the event that you encounter a reported phishing or malware site. Before blocking the site, Firefox will double-check to make sure the reported site has not been removed from the list since your last update. This request does not include the complete address of the visited site, it only contains partial information derived from the address.

In addition to the regular list updates mentioned above, when using Malware Protection to protect downloaded files, Firefox may communicate with Mozilla's partners to verify the safety of certain executable files. In these cases, Firefox will submit some information about the file, including the name, origin, size and a cryptographic hash of the contents, to the Google Safe Browsing service which helps Firefox determine whether or not the file should be blocked.

The Mozilla Privacy Policy describes what data Firefox and Mozilla each receive and how it's handled. The Google Privacy Policy explains how Google handles collected data.

I’ve confirmed that my site is safe, how do I get it removed from the lists?

If you own a site that was attacked and you have since repaired it, or if you feel that your site was reported in error, you can request that it be removed from the lists. We encourage site owners to investigate any such report thoroughly, though; a site can often be turned into an attack site without any visible change.

  • To request removal from the list of reported phishing sites, use this form provided by Google.

Ingabe le athikhili ibe usizo?

Sicela ulinde...

These fine people helped write this article:

Illustration of hands

Volunteer

Grow and share your expertise with others. Answer questions and improve our knowledge base.

Learn More