Report Guidelines

Everything you need to know about submitting effective threat reports to QuariShield.

What We Accept

We accept reports for the following types of malicious content:

  • Phishing sites - Fake websites impersonating legitimate services
  • Malware distribution - Sites hosting viruses, trojans, or ransomware
  • Scam websites - Fraudulent e-commerce or investment scams
  • Botnet C&C servers - Command and control infrastructure
  • Exploit kits - Tools designed to exploit vulnerabilities

What We Don't Accept

  • Personal disputes - Issues between individuals
  • Copyright violations - Use DMCA process instead
  • Spam emails - Unless they contain malicious links
  • Legitimate websites - Even if you disagree with their content

Priority Levels

We prioritize reports based on threat level and potential impact:

  • HIGH - Active malware campaigns, widespread phishing
  • MEDIUM - Targeted phishing, smaller scale threats
  • LOW - Dormant or low-impact threats

Required Information

Include as much detail as possible to help us process your report quickly:

  • URL - Full URL of the malicious site.
  • Threat Type - Phishing, malware, scam, etc.
  • Severity - The severity of the attack.
  • Description - Description of the attack.
Example Report:
URL: https://paypalscam.example.com/login
Type: Phishing
Severity: Medium
Description: Fake PayPal login page stealing credentials

Processing Timeline

  • Initial Review: Within 2 hours
  • Analysis: 1-4 hours for high priority
  • Takedown Initiated: 2-6 hours average
  • Complete Removal: 2-48 hours depending on host response

Evidence Guidelines

Strong evidence significantly speeds up processing:

  • Provide us with the targeted brand for easier understanding
  • Provide us with any email adresses used to spread the malicious site
  • Capture any error messages or suspicious behavior
  • For malware, include hash values if you have them
  • Network logs or traffic captures are valuable

Your Privacy

We respect your privacy and security:

  • Anonymous reports are accepted
  • Your contact info is only used for updates
  • We never share reporter information with targets
  • All data is encrypted and stored securely