descriptionURLhaus Malicious URL blocklist for uBlock Origin (uBO)
homepage URLhttps://gitlab.com/curben/urlhaus-filter
repository URLhttps://gitlab.com/curben/urlhaus-filter.git
ownercurben@users.noreply.repo.or.cz
last changeMon, 14 Mar 2022 00:11:38 +0000 (14 00:11 +0000)
last refreshSat, 27 Apr 2024 05:13:08 +0000 (27 07:13 +0200)
content tags
add:
README.md

Malicious URL Blocklist

A blocklist of malicious websites that are being used for malware distribution, based on the Database dump (CSV) of Abuse.ch URLhaus. Blocklist is updated twice a day.

There are multiple formats available, refer to the appropriate section according to the program used:

Not sure which format to choose? See Compatibility page in the wiki.

Check out my other filters:

URL-based

Import the following URL into uBO to subscribe (includes online and offline malicious websites):

<details> <summary>Mirrors</summary>

</details>


Lite version (online links only):

enabled by default in uBO >=1.28.2

<details> <summary>Mirrors</summary>

</details>

Note: Lite version is 99% smaller by excluding offline urls. The status of urls is determined by the upstream Abuse.ch. However, the test is not 100% accurate and some malicious urls that are otherwise accessible may be missed. If bandwidth (9 MB/day) is not a constraint, I recommend the regular version; browser extensions may utilise HTTP compression that can save 70% of bandwidth.

Regular version contains >260K filters, do note that uBO can easily handle 500K filters.

If you've installed the lite version but prefer to use the regular version, it's better to remove it beforehand. Having two versions at the same time won't cause any conflict issue, uBO can detect duplicate network filters and adjust accordingly, but it's a waste of your bandwidth.

AdGuard Home users should use this blocklist.

URL-based (AdGuard)

Import the following URL into AdGuard browser extensions to subscribe (includes online and offline malicious websites):

<details> <summary>Mirrors</summary>

</details>


Lite version (online links only):

<details> <summary>Mirrors</summary>

</details>

URL-based (Vivaldi)

Requires Vivaldi Desktop/Android 3.3+, blocking level must be at least "Block Trackers"

Import the following URL into Vivaldi's Tracker Blocking Sources to subscribe (includes online and offline malicious websites):

<details> <summary>Mirrors</summary>

</details>


Lite version (online links only):

<details> <summary>Mirrors</summary>

</details>

Domain-based

This blocklist includes domains and IP addresses.

<details> <summary>Mirrors</summary>

</details>


Lite version (online domains/IPs only):

<details> <summary>Mirrors</summary>

</details>

Domain-based (AdGuard Home)

This AdGuard Home-compatible blocklist includes domains and IP addresses.

<details> <summary>Mirrors</summary>

</details>


Lite version (online domains/IPs only):

<details> <summary>Mirrors</summary>

</details>

Hosts-based

This blocklist includes domains only.

<details> <summary>Mirrors</summary>

</details>


Lite version (online domains only):

<details> <summary>Mirrors</summary>

</details>

Dnsmasq

This blocklist includes domains only.

Install

# Create a new folder to store the blocklist
mkdir -p /usr/local/etc/dnsmasq/

# Create a new cron job for daily update
printf '#!/bin/sh\ncurl -L "https://curben.gitlab.io/malware-filter/urlhaus-filter-dnsmasq.conf" -o "/usr/local/etc/dnsmasq/urlhaus-filter-dnsmasq.conf"\n' > /etc/cron.daily/urlhaus-filter

# cron job requires execution permission
chmod 755 /etc/cron.daily/urlhaus-filter

# Configure dnsmasq to use the blocklist
printf "\nconf-file=/usr/local/etc/dnsmasq/urlhaus-filter-dnsmasq.conf\n" >> /etc/dnsmasq.conf

<details> <summary>Mirrors</summary>

</details>


Lite version (online domains only):

<details> <summary>Mirrors</summary>

</details>

BIND

This blocklist includes domains only.

Install

# Create a new folder to store the blocklist
mkdir -p /usr/local/etc/bind/

# Create a new cron job for daily update
printf '#!/bin/sh\ncurl -L "https://curben.gitlab.io/malware-filter/urlhaus-filter-bind.conf" -o "/usr/local/etc/bind/urlhaus-filter-bind.conf"\n' > /etc/cron.daily/urlhaus-filter

# cron job requires execution permission
chmod 755 /etc/cron.daily/urlhaus-filter

# Configure BIND to use the blocklist
printf '\ninclude "/usr/local/etc/bind/urlhaus-filter-bind.conf";\n' >> /etc/bind/named.conf

Add this to "/etc/bind/null.zone.file" (skip this step if the file already exists):

$TTL    86400   ; one day
@       IN      SOA     ns.nullzone.loc. ns.nullzone.loc. (
               2017102203
                    28800
                     7200
                   864000
                    86400 )
                NS      ns.nullzone.loc.
                A       0.0.0.0
@       IN      A       0.0.0.0
*       IN      A       0.0.0.0

Zone file is derived from here.

<details> <summary>Mirrors</summary>

</details>


Lite version (online domains only):

<details> <summary>Mirrors</summary>

</details>

Response Policy Zone

This blocklist includes domains only.

<details> <summary>Mirrors</summary>

</details>


Lite version (online domains only):

<details> <summary>Mirrors</summary>

</details>

Unbound

This blocklist includes domains only.

Install

# Create a new folder to store the blocklist
mkdir -p /usr/local/etc/unbound/

# Create a new cron job for daily update
printf '#!/bin/sh\ncurl -L "https://curben.gitlab.io/malware-filter/urlhaus-filter-unbound.conf" -o "/usr/local/etc/unbound/urlhaus-filter-unbound.conf"\n' > /etc/cron.daily/urlhaus-filter

# cron job requires execution permission
chmod 755 /etc/cron.daily/urlhaus-filter

# Configure Unbound to use the blocklist
printf '\n  include: "/usr/local/etc/unbound/urlhaus-filter-unbound.conf"\n' >> /etc/unbound/unbound.conf

<details> <summary>Mirrors</summary>

</details>


Lite version (online domains only):

<details> <summary>Mirrors</summary>

</details>

dnscrypt-proxy

Install

# Create a new folder to store the blocklist
mkdir -p /etc/dnscrypt-proxy/

# Create a new cron job for daily update
printf '#!/bin/sh\ncurl -L "https://curben.gitlab.io/malware-filter/urlhaus-filter-dnscrypt-blocked-names.txt" -o "/etc/dnscrypt-proxy/urlhaus-filter-dnscrypt-blocked-names.txt"\n' > /etc/cron.daily/urlhaus-filter
printf '\ncurl -L "https://curben.gitlab.io/malware-filter/urlhaus-filter-dnscrypt-blocked-ips.txt" -o "/etc/dnscrypt-proxy/urlhaus-filter-dnscrypt-blocked-ips.txt"\n' >> /etc/cron.daily/urlhaus-filter

# cron job requires execution permission
chmod 755 /etc/cron.daily/urlhaus-filter

Configure dnscrypt-proxy to use the blocklist:

[blocked_names]
+  blocked_names_file = '/etc/dnscrypt-proxy/urlhaus-filter-dnscrypt-blocked-names.txt'

[blocked_ips]
+  blocked_ips_file = '/etc/dnscrypt-proxy/urlhaus-filter-dnscrypt-blocked-ips.txt'

<details> <summary>Mirrors</summary>


Lite version (online domains only):

<details> <summary>Mirrors</summary>

Tracking Protection List (IE)

This blocklist includes domains only. Supported in Internet Explorer 9+.

<details> <summary>Mirrors</summary>

</details>


Lite version (online domains only):

<details> <summary>Mirrors</summary>

</details>

Snort2

This ruleset includes online URLs only. Not compatible with Snort3.

Install

# Download ruleset
curl -L "https://curben.gitlab.io/malware-filter/urlhaus-filter-snort2-online.rules" -o "/etc/snort/rules/urlhaus-filter-snort2-online.rules"

# Create a new cron job for daily update
printf '#!/bin/sh\ncurl -L "https://curben.gitlab.io/malware-filter/urlhaus-filter-snort2-online.rules" -o "/etc/snort/rules/urlhaus-filter-snort2-online.rules"\n' > /etc/cron.daily/urlhaus-filter

# cron job requires execution permission
chmod 755 /etc/cron.daily/urlhaus-filter

# Configure Snort to use the ruleset
printf "\ninclude \$RULE_PATH/urlhaus-filter-snort2-online.rules\n" >> /etc/snort/snort.conf

<details> <summary>Mirrors</summary>

</details>

Snort3

This ruleset includes online URLs only. Not compatible with Snort2.

Install

# Download ruleset
curl -L "https://curben.gitlab.io/malware-filter/urlhaus-filter-snort3-online.rules" -o "/etc/snort/rules/urlhaus-filter-snort3-online.rules"

# Create a new cron job for daily update
printf '#!/bin/sh\ncurl -L "https://curben.gitlab.io/malware-filter/urlhaus-filter-snort3-online.rules" -o "/etc/snort/rules/urlhaus-filter-snort3-online.rules"\n' > /etc/cron.daily/urlhaus-filter

# cron job requires execution permission
chmod 755 /etc/cron.daily/urlhaus-filter

Configure Snort to use the ruleset:

# /etc/snort/snort.lua
ips =
{
  variables = default_variables,
+  include = 'rules/urlhaus-filter-snort3-online.rules'
}

<details> <summary>Mirrors</summary>

</details>

Suricata

This ruleset includes online URLs only.

Install

# Download ruleset
curl -L "https://curben.gitlab.io/malware-filter/urlhaus-filter-suricata-online.rules" -o "/etc/suricata/rules/urlhaus-filter-suricata-online.rules"

# Create a new cron job for daily update
printf '#!/bin/sh\ncurl -L "https://curben.gitlab.io/malware-filter/urlhaus-filter-suricata-online.rules" -o "/etc/suricata/rules/urlhaus-filter-suricata-online.rules"\n' > /etc/cron.daily/urlhaus-filter

# cron job requires execution permission
chmod 755 /etc/cron.daily/urlhaus-filter

Configure Suricata to use the ruleset:

# /etc/suricata/suricata.yaml
rule-files:
  - local.rules
+  - urlhaus-filter-suricata-online.rules

<details> <summary>Mirrors</summary>

</details>

Third-party mirrors

<details> <summary>iosprivacy/urlhaus-filter-mirror</summary>

</details>

Issues

This blocklist operates by blocking the whole website, instead of specific webpages; exceptions are made on popular websites (e.g. https://docs.google.com/), in which webpages are specified instead (e.g. https://docs.google.com/malware-page). Malicious webpages are only listed in the URL-based filter, popular websites are excluded from other filters.

Popular websites are as listed in the Umbrella Popularity List (top 1M domains + subdomains), Tranco List (top 1M domains) and this custom list.

If you wish to exclude certain website(s) that you believe is sufficiently well-known, please create an issue or merge request. If the website is quite obscure but you still want to visit it, you can add a new line ||legitsite.com^$badfilter to "My filters" tab of uBO; use a subdomain if relevant, ||sub.legitsite.com^$badfilter.

This filter only accepts new malware URLs from URLhaus.

Please report new malware URL to the upstream maintainer through https://urlhaus.abuse.ch/api/#submit.

Cloning

Since the filter is updated frequently, cloning the repo would become slower over time as the revision grows.

Use shallow clone to get the recent revisions only. Getting the last five revisions should be sufficient for a valid MR.

git clone --depth 5 https://gitlab.com/curben/urlhaus-filter.git

FAQ

See FAQ.

License

Creative Commons Zero v1.0 Universal

badge.sh & .gitlab/ contain badges that are licensed by Shields.io under CC0 1.0

URLhaus: CC0

Tranco List: MIT License

Umbrella Popularity List: Available free of charge by Cisco Umbrella

This repository is not endorsed by Abuse.ch.

shortlog
2022-03-14 curben-botFilter updated: Mon, 14 Mar 2022 00:11:37 +0000master
2022-03-13 curben-botFilter updated: Sun, 13 Mar 2022 00:11:10 +0000
2022-03-12 curben-botFilter updated: Sat, 12 Mar 2022 00:11:17 +0000
2022-03-11 curben-botFilter updated: Fri, 11 Mar 2022 00:11:52 +0000
2022-03-10 curben-botFilter updated: Thu, 10 Mar 2022 00:11:16 +0000
2022-03-09 curben-botFilter updated: Wed, 09 Mar 2022 00:11:19 +0000
2022-03-08 curben-botFilter updated: Tue, 08 Mar 2022 00:11:15 +0000
2022-03-07 curben-botFilter updated: Mon, 07 Mar 2022 00:11:14 +0000
2022-03-06 curben-botFilter updated: Sun, 06 Mar 2022 00:11:09 +0000
2022-03-05 curben-botFilter updated: Sat, 05 Mar 2022 00:11:06 +0000
2022-03-04 curben-botFilter updated: Fri, 04 Mar 2022 00:11:10 +0000
2022-03-03 curben-botFilter updated: Thu, 03 Mar 2022 00:11:13 +0000
2022-03-02 curben-botFilter updated: Wed, 02 Mar 2022 00:11:18 +0000
2022-03-01 curben-botFilter updated: Tue, 01 Mar 2022 00:11:18 +0000
2022-02-28 curben-botFilter updated: Mon, 28 Feb 2022 00:11:16 +0000
2022-02-27 curben-botFilter updated: Sun, 27 Feb 2022 00:11:12 +0000
...
heads
2 weeks ago main
2 years ago master