vvtx.org
Open in
urlscan Pro
2606:4700:20::ac43:478d
Malicious Activity!
Public Scan
Effective URL: https://vvtx.org/qf3a9ebd7p25da44d91a0b595b225ddbbbb6.html&data_05
Submission: On October 13 via api from CZ — Scanned from DE
Summary
TLS certificate: Issued by WE1 on August 24th 2024. Valid for: 3 months.
This is the only time vvtx.org was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayPal (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 2606:4700:20:... 2606:4700:20::ac43:478d | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 2606:4700::68... 2606:4700::6811:180e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
6 | 2606:4700:20:... 2606:4700:20::681a:8e9 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
10 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
cybeready.net
lp.cybeready.net |
9 KB |
2 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 220 |
32 KB |
2 |
vvtx.org
vvtx.org |
2 KB |
10 | 3 |
Domain | Requested by | |
---|---|---|
6 | lp.cybeready.net |
vvtx.org
|
2 | cdnjs.cloudflare.com |
vvtx.org
|
2 | vvtx.org |
cdnjs.cloudflare.com
|
10 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
vvtx.org WE1 |
2024-08-24 - 2024-11-22 |
3 months | crt.sh |
cdnjs.cloudflare.com WE1 |
2024-09-28 - 2024-12-27 |
3 months | crt.sh |
cybeready.net E6 |
2024-10-10 - 2025-01-08 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://vvtx.org/qf3a9ebd7p25da44d91a0b595b225ddbbbb6.html&data_05
Frame ID: B05057AC5625327101EA77AB02245004
Requests: 10 HTTP requests in this frame
Screenshot
Page Title
Log in to your PayPal accountPage URL History Show full URLs
-
http://vvtx.org/qf3a9ebd7p25da44d91a0b595b225ddbbbb6.html&data_05
HTTP 307
https://vvtx.org/qf3a9ebd7p25da44d91a0b595b225ddbbbb6.html&data_05 Page URL
Detected technologies
Font Awesome (Font Scripts) ExpandDetected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://vvtx.org/qf3a9ebd7p25da44d91a0b595b225ddbbbb6.html&data_05
HTTP 307
https://vvtx.org/qf3a9ebd7p25da44d91a0b595b225ddbbbb6.html&data_05 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
qf3a9ebd7p25da44d91a0b595b225ddbbbb6.html&data_05
vvtx.org/ Redirect Chain
|
2 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
font-awesome.min.css
cdnjs.cloudflare.com/ajax/libs/font-awesome/4.3.0/css/ |
23 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sanitize.css
lp.cybeready.net/Forms/PayPal/ |
475 B 668 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
index.css
lp.cybeready.net/Forms/PayPal/ |
2 KB 940 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jquery.min.js
cdnjs.cloudflare.com/ajax/libs/jquery/2.1.3/ |
82 KB 27 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
landing-page.js
lp.cybeready.net/common/ |
4 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
validator.js
lp.cybeready.net/Forms/PayPal/ |
1 KB 1003 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.svg
lp.cybeready.net/Forms/PayPal/ |
5 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
qf3a9ebd7p25da44d91a0b595b225ddbbbb6.html&data_05
vvtx.org/ |
0 337 B |
XHR
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
lp.cybeready.net/Forms/PayPal/ |
5 KB 2 KB |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayPal (Financial)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| getcrrid function| $ function| jQuery object| validator1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
vvtx.org/ | Name: requestid Value: ca9e6584c10be5bc85bdc0b578743fe5 |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
lp.cybeready.net
vvtx.org
2606:4700:20::681a:8e9
2606:4700:20::ac43:478d
2606:4700::6811:180e
1690c4e20869c3763b7fc111e2f94035b0a7ee830311dd680ac91421daad3667
2051d61446d4dbffb03727031022a08c84528ab44d203a7669c101e5fbdd5515
52227d0b9b14b5ea88d3a9cde57e33bf433bf470ce5fa0d7d25880b65acd4b30
541ac58217a8ade1a5e292a65a0661dc9db7a49ae13654943817a4fbc6761afd
633d39e293d4a1e9f9c461323d6d3913f3ee51ab8cc901e4c45356cf022634ca
6a449b4722f14af5cb2a4bcc627a7c324c804147feab1e56230a9712131ce116
8a1e145ca088aa903a6ad45862d73f9b0c8737e4bce30ef4d8f898da8dddd794
b3cc50b9e94bbecaaeb1079b64b8ca50616d1732824964c1cc2c5422627a0ec5
de005a085d04e99623239533e8e8ca3fd8dd4731139739c4d5428661a7247833
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855