Please confirm these before moving forward
UniGetUI Version
3.2.4
Windows version, edition, and architecture
Windows 11 Pro 25H2 x64
Describe your issue
Summary
The gnupg entry in WebBasedData/screenshot-database-v2.json (lines 17128-17135) references www.tech-faq.com, a domain that has been compromised and is now serving malicious redirects through DGA infrastructure.
Affected Code
https://github.com/Devolutions/UniGetUI/blob/1121c35de6b9a60fddaa96864c473069cb64da62/WebBasedData/screenshot-database-v2.json#L17128-L17135
"gnupg": {
"icon": "https://www.tech-faq.com/wp-content/uploads/gnupg-shell.png",
"images": [
"https://www.tech-faq.com/gnupg-shell/keyring_editor.png",
"https://www.tech-faq.com/gnupg-shell/create_new_keyring.png",
"https://www.tech-faq.com/gnupg-shell/file_manager.png"
]
}
What is happening
The domain tech-faq.com was previously a legitimate tech FAQ site but is now parked (nameservers point to fleyo.com) and being used for malvertising. When visited, it:
- Serves a minimal ~175 byte HTML page with JavaScript
- Redirects to a rotating DGA (Domain Generation Algorithm) domain (e.g.
xenorivaq.xenorivaq.shop)
- Routes through a Cloudflare Pages cloaking layer (
nectar-shore-wood.pages.dev)
- Redirects to Amazon.com with a fraudulent affiliate tag
The domain exhibits cloaking behavior - it non-deterministically serves either cached WordPress content or the malicious redirect chain.
Impact
UniGetUI makes HTTP requests to these URLs to fetch package icons/screenshots. This causes DNS filtering and security tools to flag and block UniGetUI's network requests, since the domain is now on threat lists.
Evidence
Cloudflare Radar scans confirming the malicious redirect chain:
DGA domain classified as malicious by Cloudflare:
Suggested Fix
Replace the icon URL with the official GnuPG logo: https://gnupg.org/share/logo-gnupg-light-purple-bg.png
For screenshots, consider sourcing from GnuPG's own site or removing the images entry if no suitable replacement is available on a trustworthy domain.
Steps to reproduce the issue
- Open UniGetUI
- Find a package that references tech-faq.com as a source/homepage URL
- Click the tech-faq.com link
- Observe the redirect chain through DGA domains to Amazon with affiliate tag
Alternatively, simply visit http://tech-faq.com in a browser (use a sandboxed environment) and observe the JavaScript redirect.
UniGetUI Log
N/A - This is a data/content issue, not a runtime bug. No logs relevant.
Package Managers Logs
N/A - This is a data/content issue, not a package manager issue.
Relevant information
- Domain WHOIS: tech-faq.com registered 2004-05-16, expires 2033-05-16, NameCheap registrar
- Current nameservers: ns1.fleyo.com, ns2.fleyo.com (parking/monetization service)
- The domain has been reported to NameCheap abuse team separately
- This appears to be a case of a previously legitimate domain being repurposed for affiliate fraud after expiry/sale
- The redirect infrastructure uses DGA domains and Cloudflare Pages for cloaking, suggesting organized operation
Screenshots and videos
See Cloudflare Radar scan links in the description above for visual evidence of the redirect chain.
Please confirm these before moving forward
UniGetUI Version
3.2.4
Windows version, edition, and architecture
Windows 11 Pro 25H2 x64
Describe your issue
Summary
The
gnupgentry inWebBasedData/screenshot-database-v2.json(lines 17128-17135) referenceswww.tech-faq.com, a domain that has been compromised and is now serving malicious redirects through DGA infrastructure.Affected Code
https://github.com/Devolutions/UniGetUI/blob/1121c35de6b9a60fddaa96864c473069cb64da62/WebBasedData/screenshot-database-v2.json#L17128-L17135
What is happening
The domain
tech-faq.comwas previously a legitimate tech FAQ site but is now parked (nameservers point to fleyo.com) and being used for malvertising. When visited, it:xenorivaq.xenorivaq.shop)nectar-shore-wood.pages.dev)The domain exhibits cloaking behavior - it non-deterministically serves either cached WordPress content or the malicious redirect chain.
Impact
UniGetUI makes HTTP requests to these URLs to fetch package icons/screenshots. This causes DNS filtering and security tools to flag and block UniGetUI's network requests, since the domain is now on threat lists.
Evidence
Cloudflare Radar scans confirming the malicious redirect chain:
DGA domain classified as malicious by Cloudflare:
Suggested Fix
Replace the icon URL with the official GnuPG logo:
https://gnupg.org/share/logo-gnupg-light-purple-bg.pngFor screenshots, consider sourcing from GnuPG's own site or removing the images entry if no suitable replacement is available on a trustworthy domain.
Steps to reproduce the issue
Alternatively, simply visit http://tech-faq.com in a browser (use a sandboxed environment) and observe the JavaScript redirect.
UniGetUI Log
Package Managers Logs
Relevant information
Screenshots and videos
See Cloudflare Radar scan links in the description above for visual evidence of the redirect chain.