connect-2fa.app
Open in
urlscan Pro
2606:4700:3036::ac43:8166
Malicious Activity!
Public Scan
Effective URL: https://connect-2fa.app/direct/de-1
Submission: On October 23 via manual from DE — Scanned from DE
Summary
TLS certificate: Issued by GTS CA 1P5 on October 20th 2023. Valid for: 3 months.
This is the only time connect-2fa.app was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Commerzbank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
7 | 2606:4700:303... 2606:4700:3036::ac43:8166 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700::68... 2606:4700::6811:180e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
8 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
connect-2fa.app
connect-2fa.app |
227 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 250 |
28 KB |
8 | 2 |
Domain | Requested by | |
---|---|---|
7 | connect-2fa.app |
connect-2fa.app
|
1 | cdnjs.cloudflare.com |
connect-2fa.app
|
8 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
connect-2fa.app GTS CA 1P5 |
2023-10-20 - 2024-01-18 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-07-03 - 2024-07-02 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://connect-2fa.app/direct/de-1
Frame ID: 6075E7F0A4BE2D786140A22813445AAD
Requests: 8 HTTP requests in this frame
Screenshot
Page Title
comdirect - Ihr photoTAN-Verfahren muss aktualisiert werden!Page URL History Show full URLs
-
http://connect-2fa.app/direct/de-1
HTTP 307
https://connect-2fa.app/direct/de-1 Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://connect-2fa.app/direct/de-1
HTTP 307
https://connect-2fa.app/direct/de-1 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
de-1
connect-2fa.app/direct/ Redirect Chain
|
41 KB 11 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
MarkWeb-latin-regular.woff2
connect-2fa.app/direct/assets/fonts/ |
15 KB 15 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
MarkWeb-latin-medium.woff2
connect-2fa.app/direct/assets/fonts/ |
15 KB 15 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
MarkWeb-latin-bold.woff2
connect-2fa.app/direct/assets/fonts/ |
15 KB 15 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
styleguide-comdirect.css
connect-2fa.app/direct/assets/css/ |
1 MB 116 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
forms.css
connect-2fa.app/direct/assets/css/ |
14 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
cdnjs.cloudflare.com/ajax/libs/jquery/3.6.3/ |
88 KB 28 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
svg-symbol.svg
connect-2fa.app/direct/assets/fonts/ |
220 KB 52 KB |
Other
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Commerzbank (Banking)9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery number| timeLeft number| setTimer function| c number| dots function| type function| formatCardNumber number| timer1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
connect-2fa.app/ | Name: PHPSESSID Value: rfn18hijt6roe56rmi41fa5gbk |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
connect-2fa.app
2606:4700:3036::ac43:8166
2606:4700::6811:180e
21434445c408f9854cbec5c56ba5badf907aa3b6ccac4fca736b1322b8f4b347
3a68ac341c0429d1021a01c05e413a59c57b2fa629aa32215d20c51d9340433c
88f151f26d7582598781390eed26f60abfb543395da97d88c168e1f73a23b2f3
92678f37c302748b47f4b34dfb341d184f21f5c74a0db3b19d072151325baf27
928d21e35367cef603c9411f707ab310345e03035b161b90d9791ff5d0a07376
a6f3f0faea4b3d48e03176341bef0ed3151ffbf226d4c6635f1c6039c0500575
cd1af2ed494662d6ac322cf1048707eac9fc53561d1c9b5e0e7074599eb65773
f7d7d47140cbe5632390dde0ea2f5352369f1fa31f066b986aef83f8cd44727c