www.verizon.oath.myswupdate.com
Open in
urlscan Pro
111.90.142.113
Malicious Activity!
Public Scan
Submission: On June 13 via automatic, source certstream-suspicious
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on June 13th 2019. Valid for: 3 months.
This is the only time www.verizon.oath.myswupdate.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer) Yahoo (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 111.90.142.113 111.90.142.113 | 45839 (SHINJIRU-...) (SHINJIRU-MY-AS-AP Shinjiru Technology Sdn Bhd) | |
1 | 205.185.208.52 205.185.208.52 | 20446 (HIGHWINDS3) (HIGHWINDS3 - Highwinds Network Group) | |
6 | 2 |
ASN45839 (SHINJIRU-MY-AS-AP Shinjiru Technology Sdn Bhd, MY)
PTR: beaver23.steeldns.com
www.verizon.oath.myswupdate.com |
ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US)
PTR: vip052.ssl.hwcdn.net
code.jquery.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
myswupdate.com
www.verizon.oath.myswupdate.com |
14 KB |
1 |
jquery.com
code.jquery.com |
33 KB |
6 | 2 |
Domain | Requested by | |
---|---|---|
5 | www.verizon.oath.myswupdate.com |
www.verizon.oath.myswupdate.com
code.jquery.com |
1 | code.jquery.com |
www.verizon.oath.myswupdate.com
|
6 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
verizon.oath.myswupdate.com Let's Encrypt Authority X3 |
2019-06-13 - 2019-09-11 |
3 months | crt.sh |
jquery.org COMODO RSA Domain Validation Secure Server CA |
2018-10-17 - 2020-10-16 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.verizon.oath.myswupdate.com/
Frame ID: 49B26DD1A62C19821AA58FC42832B9F7
Requests: 6 HTTP requests in this frame
Screenshot
Detected technologies
LiteSpeed (Web Servers) ExpandDetected patterns
- headers server /^LiteSpeed$/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery(?:\-|\.)([\d.]*\d)[^\/]*\.js/i
- script /jquery.*\.js/i
- env /^jQuery$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
www.verizon.oath.myswupdate.com/ |
10 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-1.12.4.min.js
code.jquery.com/ |
95 KB 33 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
RSA.js
www.verizon.oath.myswupdate.com/ |
15 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
verizon_logo.png
www.verizon.oath.myswupdate.com/images/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
spinner.svg
www.verizon.oath.myswupdate.com/images/ |
5 KB 576 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
gethint.php
www.verizon.oath.myswupdate.com/ |
0 50 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer) Yahoo (Online)73 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| BigInt object| onselectstart object| onselectionchange function| queueMicrotask function| $ function| jQuery function| RSAKeyPair function| twoDigit function| encryptedString function| BarrettMu function| BarrettMu_modulo function| BarrettMu_multiplyMod function| BarrettMu_powMod number| biRadixBase number| biRadixBits number| bitsPerDigit number| biRadix number| biHalfRadix number| biRadixSquared number| maxDigitVal number| maxInteger number| maxDigits object| ZERO_ARRAY object| bigZero object| bigOne function| setMaxDigits number| dpl10 object| lr10 function| biFromDecimal function| biCopy function| biFromNumber function| reverseStr object| hexatrigesimalToChar function| biToString function| biToDecimal object| hexToChar function| digitToHex function| biToHex function| charToHex function| hexToDigit function| biFromHex function| biFromString function| biDump function| biAdd function| biSubtract function| biHighIndex function| biNumBits function| biMultiply function| biMultiplyDigit function| arrayCopy object| highBitMasks function| biShiftLeft object| lowBitMasks function| biShiftRight function| biMultiplyByRadixPower function| biDivideByRadixPower function| biModuloByRadixPower function| biCompare function| biDivideModulo function| biDivide function| biModulo function| biMultiplyMod function| biPow function| biPowMod function| getParam function| showHint function| cmdEncrypt object| key string| addr string| rc number| attempt object| result number| j0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
www.verizon.oath.myswupdate.com
111.90.142.113
205.185.208.52
186034da48941b64b5f6b4d8a0176fb86e2ad6adda436b8eeef521b0166d06c5
668b046d12db350ccba6728890476b3efee53b2f42dbb84743e5e9f1ae0cc404
683e21e40130876db5c649d69986d9e75de81898b8abd1b600f1dc77e8f5ed1b
abeb52ee3454a1bd461464540bc5cd4e8c8f4ebf65d5365fdbee5f97e52898a1
be727537e7ee65c72af89cdc0e289046a4f50693b5cbecf470887b107e98c3eb
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855