recipient-auth-verify.com
Open in
urlscan Pro
2606:4700:3034::6815:424d
Malicious Activity!
Public Scan
Effective URL: https://recipient-auth-verify.com/Login.php
Submission Tags: krdprod
Submission: On August 14 via api from JP — Scanned from JP
Summary
TLS certificate: Issued by E1 on August 13th 2022. Valid for: 3 months.
This is the only time recipient-auth-verify.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Santander (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 9 | 2606:4700:303... 2606:4700:3034::6815:424d | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
8 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
recipient-auth-verify.com
1 redirects
recipient-auth-verify.com |
435 KB |
8 | 1 |
Domain | Requested by | |
---|---|---|
9 | recipient-auth-verify.com |
1 redirects
recipient-auth-verify.com
|
8 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.santander.co.uk |
retail.santander.co.uk |
business.santander.co.uk |
corporate.santander.co.uk |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.recipient-auth-verify.com E1 |
2022-08-13 - 2022-11-11 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://recipient-auth-verify.com/Login.php
Frame ID: CA39270CD115F867A067D6B337309864
Requests: 8 HTTP requests in this frame
Screenshot
Page Title
Personal Online Banking: Log on or sign upPage URL History Show full URLs
-
https://recipient-auth-verify.com/
HTTP 302
https://recipient-auth-verify.com/Login.php Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
11 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Title: Sign up
Search URL Search Domain Scan URL
Title: Personal
Search URL Search Domain Scan URL
Title: Business
Search URL Search Domain Scan URL
Title: Corporate
Search URL Search Domain Scan URL
Title: Forgotten details?
Search URL Search Domain Scan URL
Title: Learn more
Search URL Search Domain Scan URL
Title: Online Banking Guarantee
Search URL Search Domain Scan URL
Title: Site Help & Accessibility
Search URL Search Domain Scan URL
Title: Security & Privacy
Search URL Search Domain Scan URL
Title: Terms & Conditions
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://recipient-auth-verify.com/
HTTP 302
https://recipient-auth-verify.com/Login.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
Login.php
recipient-auth-verify.com/ Redirect Chain
|
38 KB 6 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jquery.js
recipient-auth-verify.com/files/js/ |
266 KB 79 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
styles.d639dea2316e6d785b32.css
recipient-auth-verify.com/files/css/ |
181 KB 30 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
header-logo.png
recipient-auth-verify.com/files/img/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
asset-3-3-x.png
recipient-auth-verify.com/files/img/ |
35 KB 35 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
asset-2.png
recipient-auth-verify.com/files/img/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
SantanderTextW05-Regular.77501c6e88280139f847.ttf
recipient-auth-verify.com/files/fonts/ |
138 KB 139 KB |
Font
application/x-font-ttf |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
SantanderHeadlineW05-Rg.838addf7f1e08ecb31f9.ttf
recipient-auth-verify.com/files/fonts/ |
138 KB 138 KB |
Font
application/x-font-ttf |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Santander (Banking)10 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation function| $ function| jQuery0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
recipient-auth-verify.com
2606:4700:3034::6815:424d
1b9ae974349132777167c86ab039a2934326b5f0a458a24d87b2ce14631d5118
1bca034dc76dab33232d41f7f9705fced08c4b48c90e23bd737e4b610d1b6df8
3a1b7863c59caf1cb8c5e14792598b1504b15072ed91aac22d7b45e06e924c02
3c34b516dc489a5ff3cb121a73b6cfc25ec0920394b2d3b742d30201e71e6e24
84086bb634fc6fd223918894c6b74641811e06e84007937c5809942b7a02ddff
aea43c26eb89854384a3eebecc68f997caa852529e1a55eeea466e9d0692a880
cf2166ed0037c6f2797c0774063ecc0275cd08473aeff74cf79dc510bb60398b
f700c3638638b62b07e614c8cae5665cf4bfa956452ab4e6fea5a15965fc40f7