How does built-in Phishing and Malware Protection work? (2024)

Download Firefox

  • Systems and Languages
  • What's New
  • Privacy

Give Firefox a tune up

Refresh Firefox

  • How does it work?
  • Download a fresh copy

Firefox contains built-in Phishing and Malware Protection to help keep you safe online. These features will warn you when a page you visit has been reported as a deceptive site (sometimes called “phishing” pages), as a source of unwanted software or as an attack site designed to harm your computer. This feature also warns you if you download files that are detected as malware.

Table of Contents

  • 1 What are deceptive/phishing sites, attack sites, malware and unwanted software?
    • 1.1 Deceptive site (also known as “phishing”)
      • 1.1.1 How to report a deceptive site
    • 1.2 Attack sites
    • 1.3 Malware
    • 1.4 Unwanted software
  • 2 How does Phishing and Malware Protection work in Firefox?
    • 2.1 How do I use the Phishing and Malware Protection features?
      • 2.1.1 What happens when a page is blocked?
      • 2.1.2 What happens when you download a file identified as unsafe?
    • 2.2 What information is sent to Mozilla or its partners when Phishing and Malware Protection is enabled?
  • 3 I’ve confirmed that my site is safe, how do I get it removed from the lists?

Deceptive site (also known as “phishing”)

This is a form of identity theft that occurs when a malicious website impersonates a legitimate one in order to trick you into giving up sensitive information such as passwords, account details or credit card numbers. Phishing attacks usually come from email messages that attempt to lure the recipient into updating their personal information on fake but very real-looking websites. More information on phishing can be found at the Anti-Phishing Working Group, and there are a number of examples and resources available at Wikipedia's Phishing page.

How to report a deceptive site

To report a deceptive website you are currently visiting, click the Firefox menu button How does built-in Phishing and Malware Protection work? (2), click the Help menu and then select Report deceptive site…

Attack sites

Attack sites are websites that try to infect your computer with malware when you visit. These attacks can be very difficult to detect; even a site that looks safe may be secretly trying to attack you. Sometimes even the website’s owner doesn’t realize that the site has become an attack site.

Malware

Malware (short for “Malicious software”) is software designed to infect your computer without your knowledge. Malware is most often used to steal personal information, send junk email (spam), or spread more malware.

Unwanted software

Unwanted software sites are websites that try to trick you into installing programs that harm your browsing experience (for example, by changing your homepage or showing extra ads on sites you visit). You can learn more about such software on the Google Unwanted Software Policy.

Phishing and Malware Protection works by checking the sites that you visit against lists of reported phishing, unwanted software and malware sites. These lists are automatically downloaded and updated every 30 minutes or so when the Phishing and Malware Protection features are enabled.

When you download an application file, Firefox checks the site hosting it against a list of sites known to contain “malware”. If the site is found on that list, Firefox blocks the file immediately, otherwise it asks Google’s Safe Browsing service if the software is safe by sending it some of the download’s metadata.*

* Windows users: This online check will only be performed in Firefox on Windows for those downloaded files that don’t have a known good publisher. Most of the common and safe software for Windows is signed, and so this final check won’t always need to happen.

How do I use the Phishing and Malware Protection features?

These features are turned on by default so, unless your security settings have been changed, you are likely already using them. Phishing and Malware Protection settings can be found on the Privacy & Security panel:

  1. In the Menu bar at the top of the screen, click Firefox and then select Preferences or Settings, depending on your macOS version.Click the menu button How does built-in Phishing and Malware Protection work? (3) and select Settings.
  2. Click the Privacy & Security panel.
  3. In the Security section, put a check mark next to the following settings to activate them:
    • Block dangerous and deceptive content: Check this box if you want Firefox to block potential malware or content that can trick you into downloading malware or unintentionally entering information. You can also refine your choices by checking or unchecking the following items:
      • Block dangerous downloads: Blocks potential viruses and other malware.
      • Warn you about unwanted and uncommon software: Lets you know if you're about to download potentially unwanted software or uncommon software that may contain a virus or make unexpected changes to your computer.
    How does built-in Phishing and Malware Protection work? (4)
  4. Close the Settings page. Any changes you've made will automatically be saved.

To turn these features off, follow the preceding steps to return to the Privacy & Security panel and remove the check marks.

To see if Phishing Protection is active, visit our phishing test site. Likewise, you can visit our malware test site to confirm that Firefox is blocking Attack Sites as well as our unwanted software test site. With Phishing and Malware Protection turned on, all these sites should be blocked from loading.

What happens when a page is blocked?

Firefox will block the page from loading and display a Deceptive Site warning for phishing sites, Reported Unwanted Software Page for unwanted software sites and Reported Attack Page for malware sites.

What happens when you download a file identified as unsafe?

If you download a file identified as malware or other software that is potentially unwanted or uncommon, the downloaded file will remain under a temporary name in the Downloads folder and Firefox will display a message about the file in the Downloads panel.

How does built-in Phishing and Malware Protection work? (5)

You can click the item in the Downloads panel to see more details about it, then choose Remove file to delete the downloaded file, or select Allow download to ignore the warning and rename the temporary file to its final name. (You can also right-click the item it in the Downloads panel and select Allow download.)

How does built-in Phishing and Malware Protection work? (6)

For more information about unsafe download warnings in Firefox, see Where to find and manage downloaded files in Firefox.

What information is sent to Mozilla or its partners when Phishing and Malware Protection is enabled?

There are two times when Firefox will communicate with Mozilla’s partners while using Phishing and Malware Protection for sites. The first is during the regular updates to the lists of reporting phishing and malware sites. No information about you or the sites you visit is communicated during list updates. The second is in the event that you encounter a reported phishing or malware site. Before blocking the site, Firefox will double-check to make sure the reported site has not been removed from the list since your last update. This request does not include the complete address of the visited site, it only contains partial information derived from the address.

In addition to the regular list updates mentioned above, when using Malware Protection to protect downloaded files, Firefox may communicate with Mozilla's partners to verify the safety of certain executable files. In these cases, Firefox will submit some information about the file, including the name, origin, size and a cryptographic hash of the contents, to the Google Safe Browsing service which helps Firefox determine whether or not the file should be blocked.

The Mozilla Privacy Policy describes what data Firefox and Mozilla each receive and how it's handled. The Google Privacy Policy explains how Google handles collected data.

If you own a site that was attacked and you have since repaired it, or if you feel that your site was reported in error, you can request that it be removed from the lists. We encourage site owners to investigate any such report thoroughly, though; a site can often be turned into an attack site without any visible change.

  • To request removal from the list of reported phishing sites, use this form provided by Google.

These fine people helped write this article:

AliceWyman, Chris Ilias, philipp, Underpass, Tonnes, Michael Verdi, Gingerbread Man, ideato, Mozinet, user669794, Francois Marier, Lan, pollti, Meghraj Suthar, Dyvik Chenna, guigs, Imen, scootergrisen, Joni, Artist, Jithin Mathew, maral2, otherechoes, mikaland2, Andrew Pfeiffer, Marcelo Ghelman, Kaartic

How does built-in Phishing and Malware Protection work? (8)

Volunteer

Grow and share your expertise with others. Answer questions and improve our knowledge base.

Learn More

Related Articles

How does built-in Phishing and Malware Protection work? (9)

Troubleshoot Firefox issues caused by malware

Malware is short for "Malicious Software". It is a term generally used for software installed on your computer that is designed to infiltrate or...

How does built-in Phishing and Malware Protection work? (10)

I found a fake Firefox update

We have received reports from many users who were interrupted in their browsing experience and who got redirected to a fake page pretending to...

How does built-in Phishing and Malware Protection work? (2024)

FAQs

How does built-in Phishing and Malware Protection work? ›

Phishing and Malware Protection works by checking the sites that you visit against lists of reported phishing, unwanted software

unwanted software
A potentially unwanted program (PUP) or potentially unwanted application (PUA) is software that a user may perceive as unwanted or unnecessary. It is used as a subjective tagging criterion by security and parental control products.
https://en.wikipedia.org › wiki › Potentially_unwanted_program
and malware sites. These lists are automatically downloaded and updated every 30 minutes or so when the Phishing and Malware Protection features are enabled.

How does phishing protection work? ›

Phishing messages can be used to deliver malware (ransomware, infostealers, etc.), trick employees into handing over sensitive information, or trick the victim into sending money to the attacker. Phishing protection solutions help organizations to manage their phishing risk by identifying and blocking phishing attacks.

How does malware phishing work? ›

Phishing is when attackers send scam emails (or text messages) that contain links to malicious websites. The websites may contain malware (such as ransomware) which can sabotage systems and organisations.

How does anti-phishing software work? ›

It analyses various attributes such as sender reputation, email headers, URL structures, and content patterns to identify potential threats. Once a potential phishing attack is detected, the software automatically blocks or flags the suspicious content, preventing it from reaching your inbox or web browser.

How do I enable phishing and malware protection? ›

Apply advanced security settings
  1. Turn on attachment protection.
  2. Turn on suspicious email link protection for IMAP users.
  3. Turn on external images and links protection.
  4. Turn on spoofing and authentication protection.

What is phishing and how to protect it? ›

Phishing is a popular form of cybercrime because of how effective it is. Cybercriminals have been successful using emails, text messages, and direct messages on social media or in video games, to get people to respond with their personal information. The best defense is awareness and knowing what to look for.

Does antivirus protect against phishing? ›

Use security software: The best internet security software will have a good antivirus tool and a secure web browser to automatically detect phishing attacks and prevent you from engaging with them.

How do I get rid of malware and phishing? ›

Follow these six steps to malware removal on a PC.
  1. Step 1: Disconnect from the internet. ...
  2. Step 2: Enter safe mode. ...
  3. Step 3: Check your activity monitor for malicious applications. ...
  4. Step 4: Run a malware scanner. ...
  5. Step 5: Fix your web browser. ...
  6. Step 6: Clear your cache.

Can you get malware from phishing? ›

Clicking on a phishing link can transmit basic information like your location and device stats, redirect you to a fake website, or download malware.

What do hackers use for phishing? ›

Phishing attacks include: Email phishing – A hacker sends an email message containing a link with the intention to cause you concern, worry, or intrigue. The purpose of the email is for you to click on the link. Vishing – A threat actor calls a landline, mobile, or VoIP phone to engage the user in a conversation.

What are the three anti-phishing tactics? ›

Some tips that can help end-users prevent phishing are knowing what a phishing scam looks like, avoiding clicking links, never giving away information to an unsecured site, ignoring pop-ups, and opening suspicious documents in an isolated environment.

Does Windows Defender scan for phishing? ›

Checking the visited sites against a dynamic list of reported phishing sites and malicious software sites. If it finds a match, Microsoft Defender SmartScreen shows a warning to let the user know that the site might be malicious.

Does Gmail block malware? ›

Many malware and phishing attacks start with an email. Gmail blocks more than 99.9% of spam, phishing attempts, and malware from reaching you.

What is the best antivirus for phishing protection? ›

🥇 1. Norton — Best overall antivirus for email protection in 2024 (checks incoming emails for threats). 🥈 2. Bitdefender — Great antivirus with real-time protection that checks links for suspicious content.

What are the 4 steps to protect yourself from phishing attacks? ›

Four Ways To Protect Yourself From Phishing
  • Protect your computer by using security software. ...
  • Protect your cell phone by setting software to update automatically. ...
  • Protect your accounts by using multi-factor authentication. ...
  • Protect your data by backing it up.

What happens if you fall victim to phishing? ›

Once the link has directed the victim to a fraudulent website, the victim is then duped into entering their login credentials or financial information, which is funneled through to the hacker.

Top Articles
Latest Posts
Article information

Author: Aracelis Kilback

Last Updated:

Views: 5961

Rating: 4.3 / 5 (44 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Aracelis Kilback

Birthday: 1994-11-22

Address: Apt. 895 30151 Green Plain, Lake Mariela, RI 98141

Phone: +5992291857476

Job: Legal Officer

Hobby: LARPing, role-playing games, Slacklining, Reading, Inline skating, Brazilian jiu-jitsu, Dance

Introduction: My name is Aracelis Kilback, I am a nice, gentle, agreeable, joyous, attractive, combative, gifted person who loves writing and wants to share my knowledge and understanding with you.